Time filter

Source Type

Zhang Y.,Tianjin University | Wang G.,Shijiazhuang Posts and Telecommunications Technical College
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2011

In 2000, H.L. Abbott and M.Katchalski [1] discussed a problem on covering squares with squares. They defined the function f(x) to be the side length of the largest open axis-parallel square that can be covered by the set of closed axis-parallel squares with side length x n . In this paper, we study this kind of covering problem for equilateral triangles. And we also discuss its dual problem. (2000)Mathematics Subject Classification. 52C15 © 2011 Springer-Verlag. Source

Li S.-H.,Xian University of Posts and Telecommunications | Li X.-J.,Northwest University, China | Guo H.-S.,Shijiazhuang Posts and Telecommunications Technical College
Guangzi Xuebao/Acta Photonica Sinica | Year: 2013

Based on the Faraday magneto-optical effect, 2D optical imaging of magnetic field of the permanent magnets is carried out using an applicable optical system with the ZF6 glass as the magneto-optic medium. Original pictures are acquired using a self-programmed software, and processed using a self-programmed image processing software, thus polarization analysis is completed. The permanent magnet field distribution images are obtained under the transmission imaging and the reflection imaging respectively. These images reflect the actual magnetic field distribution. This experiment provides an effective means for observation and measurement of macroscopic magnetic field. Source

Xu S.-S.,Shijiazhuang Posts and Telecommunications Technical College
Proceedings - International Conference on Machine Learning and Cybernetics | Year: 2015

The common digital fingerprinting encryption algorithm has problems such as the code character is too long and the calculation is complicated, etc. Besides, the fingerprints generated are mostly meaningless binary sequence with bad intuition and no practical value. In this paper, a new type of digital fingerprinting encryption algorithm based on QR code is put forward, and experiments prove that this algorithm has sound resistivity to conspiracy attack and could trace the conspiracy user effectively. © 2014 IEEE. Source

Jia H.,Shijiazhuang Posts and Telecommunications Technical College | Zuo D.,Shijiazhuang University
ICIC Express Letters | Year: 2014

In this paper, the multilinear Marcinkiewicz integral is defined, which is a type of the generalized Marcinkiewicz integral. The weak- and strong-type inequalities for the multilinear Marcinkiewicz integral are obtained. © 2014 ISSN 1881-803X. Source

Ge R.,College of Logistics | Shan Z.,Shijiazhuang Posts and Telecommunications Technical College | Kou H.,Shijiazhuang Posts and Telecommunications Technical College
Proceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011 | Year: 2011

This paper introduces a smart alarm surveillance system. This system makes use of improved multiple frame motion detection and layered quantization compression technology to realize real-time surveillance, high-compression video data transmission. This system also develops a mobile H.264 codec to enable the remote viewing of video surveillance. Test results show that the system has the characteristics of the alarm timely, high compression and good usability. © 2011 IEEE. Source

Discover hidden collaborations