Sciweavers

1228 search results - page 107 / 246
» Copyright
Sort
View
ISI
2006
Springer
14 years 10 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
JMM2
2008
130views more  JMM2 2008»
14 years 10 months ago
A Robust Image Watermarking Scheme using Singular Value Decomposition
This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as `l...
B. Chandra Mohan, S. Srinivas Kumar
87
Voted
JEI
2006
113views more  JEI 2006»
14 years 10 months ago
Transparent robust information hiding for ownership verification
For copyright protection, the robustness of a watermarking scheme against various attacks is an essential requirement. Many proposed robust watermarking schemes may achieve good r...
Dan Yu, Farook Sattar, Sirajudeen Gulam Razul
96
Voted
EAAI
2007
125views more  EAAI 2007»
14 years 10 months ago
Nearly optimal neural network stabilization of bipedal standing using genetic algorithm
In this work, stability control of bipedal standing is investigated. The biped is simplified as an inverted pendulum with a foot-link. The controller consists of a general regres...
Reza Ghorbani, Qiong Wu, G. Gary Wang
JTAER
2006
143views more  JTAER 2006»
14 years 10 months ago
P2P's Significance for eBusiness: Towards a Research Agenda
Applications running over peer-to-peer (P2P) networks have exploded since the late 1990s. Research is needed into many aspects of P2P. These include architecture, application func...
Roger Clarke