Learn More
Affective content analysis is an unsolved technical problem in sophisticated video retrieval and high-level applications. In order to recognize emotion types of video scenes, a new algorithm, which composes of two sub-models, is proposed. Firstly, the sub-models of two low-level features extraction are built up based on the film grammars. Secondly, a(More)
In this paper, research for the cell search of the LTE TDD system and the initialization of carrier frequency offset estimation algorithm, theoretical derivation is given from timing synchronization and sector ID detection algorithm. In this work, simulated and researched the performance of cell search algorithm in the spread of multi-path environment.(More)
In this paper, we propose a practical, efficient and real-time technique to estimate the end-to-end available bandwidth in the condition of probe packets losing. One of main ideas of the proposed technology is compensation mechanism, which uses a least square method to approximately compensate the losing packets based on polynomial-mimesis technology in the(More)
In this paper, a new method for detecting shot boundaries in video sequences using Box-Counting to extract texture feature and judging the shot boundaries by an improve method to get a dynamic threshold is proposed. Many techniques have been developed to detect the video shot boundaries. But automatic shot boundary detection is difficult. In particular,(More)
Image spam is a recent variant of spam, which can easily circumvent widely text spam filters. In this paper, we propose a new method of filtering image spam, which is called FH (file properties and histogram) algorithm. FH algorithm utilizes file properties and histogram (gray histogram or color histogram), and is a fast method because of not extracting(More)
A fair non-repudiation security protocol can provide non-repudiation proof for two parts of the exchange at the same time, or both get nothing. But many protocols performed weak in logical analysis. In this paper, a group of new protocols(with 3 sub-protocols) with off-line The Third Party(TTP) are presented. We analysis them with a new Kailar logic(More)
A fair e-commence protocol can help the Value-Added Service Provider(VASP) and users deal with the exchange safely and efficiently. In this paper, we firstly analyze a PPV(Pay-Per-View) protocol, and find some potential shortcomings and limitations. By multiplying the HASH chains technology, we employ a couple of HASH chains as billing cell, and improve the(More)
The tumor suppressor role of AT-rich interactive domain containing protein 1B (ARID1B) has drawn much attention in area of cancer etiology. However, it had remained unknown whether or not genetic variants of ARID1B involved in development of hepatocellular carcinoma (HCC). In this study, three putatively functional variants in ARID1B (rs73013281C>T,(More)