The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User-mode Linux (UML) is virtual environment software being developed for server integration, testing buggy software, and so on. However, we have been applying UML to network administrator education, since it has functions for comprising networks. The Linux Network Simulator (LiNeS) is a system that provides an environment for various network training based on virtual networks realized by UML on one...
Curators are always searching for the best educational method to exploit new technology in their educational activities. Our research group previously produced teaching materials using 3DCG animation in cooperation with the Nagoya City Science Museum. In this paper, we present a system research and development project that comprehensively supports various kinds of astronomy education by curators who...
The number and percentage of female researchers in Japan is very low than other developed countries. How to give them effective support has becoming a noticeable topic in recently years. We design a Web community for female researchers which has a community function to promote their communication, a role model function to encourage them to continue their research work. The study is ongoing and future...
Traffic aggregate information is important for Intelligent Transportation Systems. There are two issues in obtaining such information, one is how to aggregate traffic data stream efficiently, and another is how to process the "network-constrained" property of the traffic data. This paper solves this problem by proposing an index structure for network-constrained data stream, which manages...
A new method named ENP-DOM tree is proposed in this paper, which extends the document object module tree by adding two properties, i.e., entropy and relativity, to some nodes. Semantic distance is used to extract the primary content accurately from the same source based on three facts: noise blocks always have high entropy property within a given Web site; primary content blocks are often made up...
We propose a method that visualizes the topic structure of medical interviews to provide doctors with clues found in the complete narratives. We collected 15 simulated interviews in an education field and conducted the following analysis to evaluate the utility of our proposed method. By applying it to the 15 interviews, we classified the following three topics: core, expansion, and local. In review...
We propose a method for frame registration between in-vehicle omni-directional and normal cameras aimed at self-position estimation of a vehicle. We assume that the position of a vehicle is estimated by frame registration between the inputted normal camera images and the omni-directional video database with accurate position information. A DTW- based algorithm is used for nonlinear time-series matching...
In this paper, we propose a novel 2-way handshake authentication protocol to locally authorize intra-domain roaming users for efficient authentication in mobile IP networks, which is based on authentication, authorization and accounting (AAA) architecture. The performance evaluation shows that our protocol outperforms the existing authentication protocols.
Aiming at the defects exists in tradition relationship database real-time application of power system dispatcher training simulator(DTS), this paper analyzed the constitution of database system in DTS, brought forward real-time database model that composed by the combination of real-time EMS memory base and off-line ORACLE database. Meantime in order to enhance the access speed between EMS memory...
It's difficult to find contact from the image that was photographed by high-speed image sampling system because of the light reflection characteristic of switching arc, contact and interrupter. It do enhancement process to arc image by image enhancement algorithm of histogram and local histogram. In order to find the arc image and on the same time can find contact and the interrupupter's detail in...
Firstly, aiming at the limitation of research on enterprise competition model, we propose the idea to apply CAS (complex adaptive system) theory to the enterprise competition. Secondly, refer to the modeling scheme of Holland's Echo model an applied model of CAS-based enterprise competition was built. Finally, according to develop the program of Object-C based on swarm, simulating the dynamic competitive...
This paper had built inter turn short-circuit fault diagnose system of steam generator rotor windings based on the fault criterion of rotor inter turn short circuit on-line identification. The frame of diagnose system is introduced, and then the long-distance rotor inter turn short-circuit diagnose system which based on B/S module is built by combining advanced VB.net technique's Web service and SQL...
This paper reports on our development of a GIS-based traffic network analysis system, named GIS-based transport decision support system, which provides a graphical analysis platform to transportation planners and researchers for transportation network analysis. The system has the functions of designing traffic networks on digital maps and doing traffic equilibrium analysis, as well as a novel function...
Ubiquitous experience media (UEM) is the computational media for experience-oriented knowledge sharing. In this paper, we address its properties and our research approach, describing its concept and examples as communication media.
Risky steering operations are detected based on the relationship between the radius of road curvature and road design speed defined in the road construction ordinance. Vehicle motion while steering is approximated as a circular motion, and the vehicle trajectory radius is estimated from lateral acceleration and vehicle velocity captured with a drive recorder based on a circular motion equation. Steering...
This paper proposed a method for generating bird's eye view images using multi-cameras set in high points at intersections. As the generated images follows own vehicle's motion and includes the vehicle itself it enables the driver handing the surrounding situations conveniently. Experiments have shown the advantages of our method in save driving supporting.
Steganography is the science of secret message delivery using cover media. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. The proposed method is inspired from Zhang and Wang's method and Sudoku solutions. A selected Sudoku solution is used to guide cover pixels' modification in order to imply...
This paper presents a novel robust image watermarking scheme for resisting geometric attacks. In the proposed scheme, watermark synchronization is first achieved by the local circular regions, which can be generated using the scale-invariant feature transform (SIFT). Then the watermark is embedded into each local region in spatial domain by odd-even quantization. In the decoder, the watermark can...
Application for robust watermarking is one of the major branches in digital rights management (DRM) systems and related researches. Based on existing metrics to evaluate the applicability of robust watermarking, it is generally agreed that three metrics, including the quality of watermarked contents, the survivability of extracted watermark after intentional or unintentional attacks, and the number...
A simple watermarking scheme based on the discrete cosine transform (DCT) is proposed. To increase the hidden capacity while maintaining the robustness of the proposed method, the authors use quotient-embedding algorithm to hide the secret message in the selected low-frequency coefficients of a DCT block. Simulations show that the stego-images generated by the proposed method do robustness against...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.