Title of the Paper: An
Algorithm Based on Core Characteristic Extraction of Watermelon
DOWNLOAD FULL PDF
Authors: Yong Sun, Yun Bai, Lihong
Gang, Qiangguo Pu, Nikos Mastorakis
Abstract: The algorithm of extracting a series of characteristic values,
taking the flat objects, seeds, as the experiment is applied into the
auto-distinguishing seeds system software successfully. It fulfills the
blank in this area. It shows it is practical for the machine to distinguish
the flat objects with the equipment visual. It designs and realizes the new
algorithm of the length of orthogonal long and minor axis, the degree of
connecting superficial pattern and the area; brings forward the concept of
the coverage degree of black region and the way to distinguish different
colorful objects with the distribution difference of histogram gradation.
The system software has a very bright future. It is meaningful to the
distinguishing objects areas.
Keywords:
long and short axis, the degree of connecting surface patterns, the coverage
degree of black region, core characteristic extraction, watermelon seeds
Comments,
Questions, Discussion ...
Title of the Paper: Fast Pre-authentication with
Minimized Overhead and High Security for WLAN Handoff
DOWNLOAD FULL PDF
Authors: Hung-Yu Chien, Tzu-Hang
Hsu and Yuan-Liang Tang
Abstract: User mobility in WLANs becomes more and more popular because of
wide deployment of WLANs and numerous applications on it. Some of these
applications, for example multimedia applications, require fast handoffs
among access points to maintain the quality of service. In order to support
multimedia applications for roaming users, IEEE 802.11i defines
pre-authentication to reduce the re-authentication delay. The primary
drawback of IEEE 802.11i pre-authentication is that the full 802.1x/EAP
authentication consumes too much overhead. In this paper, we propose a new
fast pre-authentication scheme that greatly improves the efficiency and
achieves high security level. Keywords:
Pre-authentication, fast handoff, wireless security, IEEE 802.11i.
Comments,
Questions, Discussion ...
Title of the Paper:
Fractional Fourier Transform Based Key Exchange
for Optical Asymmetric Key Cryptography
DOWNLOAD FULL PDF
Authors: Aloka Sinha
Abstract: Recently several optical encryption techniques have been proposed
for two-dimensional data. These techniques use random phase masks, jigsaw
transforms, digital signatures, and linear transforms like the Fourier
transforms, the fractional Fourier transform and the Fresnel transform. The
strength of these encryption techniques is dependent on the size of the key
but is strongly limited by the security linked with the exchange of the
secret key. We propose a new technique, based on the Diffie-Hellman
protocol, in which the key can be exchanged with high security. The
Diffie-Hellman protocol allows two users to exchange a secret key over an
insecure channel without any prior secrets. Fractional Fourier transforms
have been used for the secure key transfer. Results of computer simulation
are presented to verify the proposed idea and analyse the robustness of the
proposed technique.
Keywords: Fractional Fourier Transform, Optical encryption, Public key
encryption, Diffie-Hellman protocol, Fourier Transform, cryptography
Comments,
Questions, Discussion ...
Title of the Paper:
Increase The Efficiency of English-Chinese
Sentence Alignment: Target Range Restriction and Empirical Selection of Stop
Words
DOWNLOAD FULL PDF
Authors: Wing-Kwong Wong, Hsi-Hsun
Yang, Wei-Lung Shen, Sheng-Kai Yin, and Sheng-Cheng Hsu
Abstract: In this paper, we use a lexical method to do sentence alignment
for an English-Chinese corpus. Past research shows that alignment using a
dictionary involves a lot of word matching and dictionary look ups. To
address these two issues, we first restrict the range of candidate target
sentences, based on the location of the source sentence relative to the
beginning of the text. Moreover, careful empirical selection of stop words,
based on word frequencies in the source text, helps to reduce the number of
dictionary look ups. Experimental results show that the amount of word
matching can be cut down by 75% and that of dictionary look ups by as much
as 43% without sacrificing precision and recall. Another experiment was also
done with twenty New York Times articles with 598 sentences and 18395 words.
The resulted precision is 95.6% and the recall is 93.8%. Among all predicted
alignment, 86% of the alignment is 1:1 (one source sentence to one target
sentence), 8% is 1:2, and 6% is 2:1. Further analysis shows that most errors
occur in alignments of types 1:2 and 2:1. Future work should focus on
problems with these two alignment types.
Keywords: Sentence alignment, lexical method, statistical method,
English-Chinese corpus, stop words, target range.
Comments,
Questions, Discussion ...
Title of the Paper: TEMPLUM: A Process Adapted
Numerical Simulation Code for The 3D Predictive Assessment of Laser Surface
Heat Treatments in Planar Geometry
DOWNLOAD FULL PDF
Authors: A. García-Beltrán, J. L.
Ocaña and C. L. Molpeceres
Abstract: A process adapted numerical simulation code for the 3D predictive
assessment of laser heat treatment of materials has been developed.
Primarily intended for the analysis of the laser transformation hardening of
steels, the code has been successfully applied for the predictive
characterization of other metallic and non metallic materials posing
specific difficulties from the numerical point of view according to their
extreme thermal and absorption properties. Initially based on a conventional
FEM calculational structure, the developed code (TEMPLUM) reveals itself as
an extremely useful prediction tool with specific process adapted features
(not usually available in FEM heat transfer codes) in the field of laser
heat treatment applications. Keywords:
Numerical analysis; Finite element; Modeling; Simulation; Heat conduction; Laser
surface treatments; Transformation hardening; Optical glass polishing.
Comments,
Questions, Discussion ...
|