Learn More
Focusing on multi-machine distributed computing security problems in cloud computing, the paper has proposed a grid distributed parallel authentication model based on trusted computing, which can realize simultaneous verification of grid authentication and grid behavior on upper layer of SSL and TLS protocols. Adaptive grid authentication method is(More)
Advancements in the application of underground pipeline information have led to the increased complexity in the design and implementation of the information management system. With the underground pipelines data being managed by many different government agencies, it becomes increasing more difficult to ensure their integrity, accuracy and timeliness. In(More)
This paper proposes the design and implementation of image compression comparator (ICC) in a digital image processing simulation system (DIPSS) based on components in detail. The ICC is designed as a component in the form of Java Beans, which improves the developing efficiency, reuses software, and make the system maintainable and expanding. In this paper,(More)
In this paper, an integer pixel search algorithm based on prediction (PIS) is proposed. The primary characteristic of this algorithm is using quadrangle and flat hexagon as search pattern. To strengthen the flexibility and precision of this algorithm, early termination strategy is adopted. And to prove the validity of the PIS algorithm, besides some(More)