KEYWORDS: Data modeling, Geographic information systems, Analytical research, Databases, Mining, Computer security, Data mining, Stars, Data analysis, Data hiding
The data of GIS have spatial distribution. Geographic data has both spatial characteristics and attribute characteristics, and also changes with time. Therefore, the amount of data is very large. Nowadays, many industries and departments in the society are using GIS. However, without proper data analysis and mining scheme, GIS will not exert its maximum effectiveness and will waste a lot of data.
In this paper, we use the geographic information demand of a national security department as the experimental object, combining the characteristics of GIS data, taking into account the characteristics of time, space, attributes and so on, and using cluster analysis algorithm. We further study the mining scheme for depth data, and get the algorithm model. This algorithm can automatically classify sample data, and then carry out exploratory analysis. The research shows that the algorithm model and the information mining scheme can quickly find hidden depth information from the surface data of GIS, thus improving the efficiency of the security department. This algorithm can also be extended to other fields.
KEYWORDS: Digital watermarking, Wavelet transforms, Data communications, Digital imaging, Image segmentation, Signal detection, Linear filtering, Data hiding, Wavelets, Image compression
Digital audio watermarking embeds inaudible information into digital audio data for the purposes of copyright protection, ownership verification, covert communication, and/or auxiliary data carrying. In this paper, we present a novel watermarking scheme to embed a meaningful gray image into digital audio by quantizing the wavelet coefficients (using integer lifting wavelet transform) of audio samples. Our audio-dependent watermarking procedure directly exploits temporal and frequency perceptual masking of the human auditory system (HAS) to guarantee that the embedded watermark image is inaudible and robust. The watermark is constructed by utilizing still image compression technique, breaking each audio clip into smaller segments, selecting the perceptually significant audio segments to wavelet transform, and quantizing the perceptually significant wavelet coefficients. The proposed watermarking algorithm can extract the watermark image without the help from the original digital audio signals. We also demonstrate the robustness of that watermarking procedure to audio degradations and distortions, e.g., those that result from noise adding, MPEG compression, low pass filtering, resampling, and requantization.
KEYWORDS: 3D modeling, 3D image processing, Data modeling, Virtual reality, Geographic information systems, Video, Panoramic photography, Photography, Visualization, 3D image restoration
This paper mainly focuses on the digital demonstration of three gorges archeological relics to exhibit the achievements of the protective measures. A novel and effective method based on 3D-visualization technology, which includes large-scaled landscape reconstruction, virtual studio, and virtual panoramic roaming, etc, is proposed to create a digitized interactive demonstration system. The method contains three stages: pre-processing, 3D modeling and integration. Firstly, abundant archaeological information is classified according to its history and geographical information. Secondly, build up a 3D-model library with the technology of digital images processing and 3D modeling. Thirdly, use virtual reality technology to display the archaeological scenes and cultural relics vividly and realistically. The present work promotes the application of virtual reality to digital projects and enriches the content of digital archaeology.
High-quality photorealistic rendering of 3D modeling needs powerful computing systems. On this demand highly
efficient management of cluster resources develops fast to exert advantages. This paper is absorbed in the aim of how to
improve the efficiency of 3D rendering tasks in cluster. It focuses research on a dynamic feedback load balance (DFLB)
algorithm, the work principle of load sharing facility (LSF) and optimization of external scheduler plug-in. The
algorithm can be applied into match and allocation phase of a scheduling cycle. Candidate hosts is prepared in sequence
in match phase. And the scheduler makes allocation decisions for each job in allocation phase. With the dynamic
mechanism, new weight is assigned to each candidate host for rearrangement. The most suitable one will be dispatched
for rendering. A new plugin module of this algorithm has been designed and integrated into the internal scheduler.
Simulation experiments demonstrate the ability of improved plugin module is superior to the default one for rendering
tasks. It can help avoid load imbalance among servers, increase system throughput and improve system utilization.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.