An Adaptive Digital Image Watermarking Algorithm Based on Binary Discrete Operation 基于二值离散运算的自适应数字图像水印算法
Groups just have one binary operation. 论坛只是一个二进制作业。
An adaptive digital image watermarking algorithm based on binary discrete operation was proposed in the wavelet transform domain. 论文提出了一种在小波变换域内基于二值离散运算的自适应数字图像水印算法。
Similarly, with the exception of the possible in-place behavior, the binary operation performed by augmented assignment is the same as the normal binary operations. 类似地,除了可能的就地方式,由增量赋值执行的二元运算和普通的二元运算也是一样的。
Binary Tree, the operation and use. 二叉树的操作和使用。
Then, the watermarks are embedded into the wavelet coefficients by using the improved binary operation methods. 然后引用修正的二值运算方法将变换后的水印信息嵌入到图像的小波变换域中;
On the basis of putting forward the genetic algorithm adopting binary character string coding, taking genetic operation as optimal preservation strategic selection and possessing multipoint cross and non-homogeneous variation, a combination of linear inversion and genetic optimization algorithm was used for seismic wave impedance inversion. 文章提出采用二进制字符串编码、遗传操作为最优保存策略选择、多点交叉和非均匀变异的遗传算法,将线性反演与遗传优化算法组合用于地震资抖波阻抗反演。
The Chinese computable structure model based on binary operation relations 基于二元运算关系的汉语计算语法模型
In this paper, G is a fuzzy group on fuzzy binary operation, the definitions of sub fuzzy group and normal sub fuzzy group of G are introduced and some properties of them are discussed. 设G为在模糊二元运算下的模糊群.给出了G的子模糊群和正规子模糊群的定义。
Algorithmic Design of Testing with Computer whether the Multiplication Table of Binary Operation Forms Group Table 测试二元运算乘法表是否构成群表的算法设计
This paper presents a new CDMA long code fast computing method based in binary matrix recursive operation. 本文介绍了一种基于二进制矩阵迭代运算的确定当前时刻CDMA长码状态的快速算法,对其性能进行了仿真和分析。
Theoretical and experimental proof that chaotic binary sequences are groups about XOR operation Based on the nature of Exclusive or operation, deduce the forming procedure for Grey one and analyze the application of exclusive or operation on the check code. 混沌二值序列对异或运算构成群的理论和实验证明利用异或运算的性质,给出格雷码公式的推导过程,探讨异或运算在校验码中的应用。
Further processing of resulting boundary with binary morphological operation produces a closed osteomas contour. So osteomas is isolated from background. 最后利用二值形态运算进一步处理,便可得到封闭的骨肿瘤边界,从而将骨肿瘤与背景分离。
A criterion for which the binary operation table is a group 二元运算表为群的一个判定
As a result, the proposed method avoids the binary operation used in some traditional Chinese character feature extractions that will seriously destroy the Chinese character structure. 该方法避免了一些传统汉字特征提取方法需要对图象进行二值化操作而造成的汉字字符结构信息丢失。
Boundary Extraction in Binary Image Based on Dynamic Mathematical Morphological Operation 基于动态数学形态运算的二值图像边界提取
This paper introduces a computation method of trigonometric functions and inverse trigonometric functions in microprocessor by usr of combination binary fixed point operation with look-up table. 本文介绍了一种在微处理器中用二进制定点运算和查表相结合的方法简单实现三角函数和反三角函数运算的方法。
On Binary Tree Representation of Consensus Operation for Fundamental Boolean Conjunctions 布尔函数基本乘积项一致运算的二叉树表示
A scheme to realize this secure paradigm in binary images using scanning operation is proposed and a more efficient practical method is also presented based on morphological theory. 针对文字扫描操作,给出了这种安全范式在二值图像上的具体实现方法:利用扫描过程中测量噪声的不确定性来携带信息。
The technology of ActiveX, Database and Network that used in the development of the platform are discussed in the thesis in order. The modules of database operation used in Visual LISP, binary files operation and network information browser are developed. 文章依次对平台开发中所涉及到的ActiveX技术、网络数据库技术和网络技术进行了讨论,并开发出用于VISUALLISP中的数据库操作模块,二进制文件操作模块和网络信息浏览模块。
A kind of fuzzy binary operation and fuzzy homomorphism fundamental theorem are used. Then we discuss the isomorphism of fuzzy groups and established three fuzzy theorems of isomorphism. The new kind of group with new operation is deeply described. 利用一种新的模糊算子与模糊同态基本定理,进一步讨论了模糊群的模糊同构,建立了三个模糊同构定理,进一步刻化了带有这种新的算子的模糊群的结构,得到了若干命题。
A new algorithm for digital image watermarking based on binary operation in the wavelet transform domain is proposed, and the original image is not required for detecting the watermark. 研究了在数字图像中实现水印的方法,提出了一种在小波变换域内基于二值运算的数字图像水印嵌入与检测算法,且水印的检测不需要原始图像。
The improved binary operation methods was utilized, and watermarks are embedded to the low frequency coefficients of deep wavelet domain. 并利用改正的二值运算方法将水印嵌入到图像深层小波域的低频子图中。
In this paper, the authors give a representation of the relation matrix of the cardinal product of two partial ordered sets by the tensor product of their relation matrices, which helps to obtain a kind of method to check the associative law of binary operation. 利用矩阵的张量积给出了偏序集基数积的一种矩阵表示,得到了检验有限集合上的代数运算满足结合律的一种方法。
Subsequently explains the concept of binary morphology, analyzing various operation thoughts and applications of binary morphology, and associates it to make a research into the image edge detection. 接着讨论二值形态学的概念,分析二值形态学的各种操作思路及用途。然后结合二值形态学对图像边缘检测的思路、方法作探讨分析。
And watermark image is embedded by the rule of the improved binary operation, changing wavelet coefficients part of the decimal to improve the quality of the image after the watermark embedded. 水印嵌入采用改进的二值运算方法,通过修改小波系数的小数部分来实现水印的嵌入,提高了水印嵌入后图像的视觉质量。
Finally, decompose the defects fabric images by the wavelet. After extracting the characteristic value, binary and defect location operation, the fabric defects can be detected out, so as to realize the automatic test fabric defects. 最后,用得到的小波基,分解含有疵点的织物图像,通过提取特征值、二值化和疵点定位等操作将织物疵点检测出来,从而实现织物疵点的自动检测。
Finally, in order to make the target image more specific, binary closing operation method of the morphology was filled the hole in the split graph of wheat spike. 3. 最后利用形态学中的二值闭运算,对分割后的麦穗图形中的空洞进行填充,使目标图像更具体。
The express of the Ladder Diagram which uses the model based on the Binary diagram can complete the operation about insert, delete and amend of the editor of Soft PLC, and also provide handy algorithms. 其中梯形图的表示使用基于二叉图的模型,能够有效地完成PLC编辑所涉及的插入、删除和修改等操作,同时提供了简便的编译算法。
Firstly, the threshold segmentation algorithm is used in the infrared images by the high temperature to get the binary images. Then, closed operation is adopted to connect the suspicious target area. After that, the suspected high temperature flame zone is got. 首先利用基于红外图像的温度阈值分割算法对采集得到的红外图像进行二值化,采用闭操作连通可疑目标区域,得到高温疑似火焰区域。