Abstract:
A method for preparing a rubber protective cover of an expressway guardrail includes steps of: (S1), preparing material, wherein the material includes high-temperature vulcanized rubber, nanometer zinc oxide, nanometer silicon dioxide and a modifier; (S2), placing the vulcanized rubber into a mixing furnace which is able to increase a temperature, and then heating to 200° C.; (S3), adding the nanometer zinc oxide, and then stirring for 10 minutes; (S4), adding the nanometer silicon dioxide, and then stirring for 5 minutes; (S5), adding the modifier, and then stirring for 30 minutes; and (S6), adding the rubber after stirring into a four-roll calender, shaping, and preparing the rubber cover having a thickness of 10-20 mm and a length of 300-600 mm. The present invention has a low cost, a corrosion resistance, an easy preparation process, a low equipment requirement and a strong operability.
Abstract:
A confidentiality preserving system and method for performing a rank-ordered search and retrieval of contents of a data collection. The system includes at least one computer system including a search and retrieval algorithm using term frequency and/or similar features for rank-ordering selective contents of the data collection, and enabling secure retrieval of the selective contents based on the rank-order. The search and retrieval algorithm includes a baseline algorithm, a partially server oriented algorithm, and/or a fully server oriented algorithm. The partially and/or fully server oriented algorithms use homomorphic and/or order preserving encryption for enabling search capability from a user other than an owner of the contents of the data collection. The confidentiality preserving method includes using term frequency for rank-ordering selective contents of the data collection, and retrieving the selective contents based on the rank-order.
Abstract:
Disclosed is a two-way radio frequency (RF) communications system including a first device that receives, from a first subscriber unit, a virtual radio conferencing call (VRC) request identifying a plurality of other subscriber units to be partied to the VRC call and a conference time period during which to conduct the VRC call. The device reserves RF resources at one or more corresponding radio sites associated with the subscriber units partied to the VRC call for the conference time period. At a beginning of the conference time period, the device causes a virtual radio conference call start message to be transmitted to the subscriber units partied to the call instructing the subscriber units to join the VRC call via the reserved RF resources at their respective radio sites.
Abstract:
Visual discomfort from depth jumps in 3D video content is reduced or avoided by detecting the occurrence of a depth jump and by Input video changing the disparity of a group of received image frames including the frames at the depth jump in order to adjust the perceived depth in a smooth transition across the group of image frames from a first disparity value to a second disparity value. Depth jumps may be detected, for instance, when content is switched from one 3D shot to another 3D shot.
Abstract:
To identify participants in collusion directed to altering a digital fingerprint embedded in multimedia content, an ECC based fingerprinting technique establishes a code symbol for each of a plurality of segments of digital data forming the multimedia content. The code symbols are concatenated to form a fingerprint signal, which is subdivided into a plurality of subsegments for each segment in the digital data. The subsegments are permuted and embedded into the digital data. When a suspicious copy of the multimedia content is discovered, the permuted fingerprint signal is extracted from the content and inversely permuted to form a test fingerprint. The identity of one of the colluders is determined by correlation with characteristics of the codeword originally assigned to the user. The determination of identity may be enhanced by the addition of group data embedded as an additional fingerprint in the digital data. Joint consideration of coding and embedding provide benefits over previous fingerprinting techniques.
Abstract:
The present invention discloses a U-type superconductive microstrip resonator and a filter corresponding to the same. The U-type superconductive microstrip resonator is an asymmetric U-type configuration formed by folding the superconductive microstrip, its total length is a half of the wavelength corresponding to the center frequency of the filter constituted by them. A filter can be constituted by a number of said U-type superconductive microstrip resonators as required. In this filter, these U-type microstrip resonators are arranged in parallel in a manner that the longer sides direct a same direction, or in a manner that every two adjacent U-type superconductive microstrip resonators are symmetric about an axis. The filter constituted by said U-type superconductive microstrip resonators can not only achieve the same specification as an open-loop superconductive microstrip filter with a same number off sections, but also achieve a smaller size than the open-loop superconductive microstrip filter.
Abstract:
A method and system of detecting colluders conducting a collusion attack including a minority-type collusion attack on a digital product includes the generation of codewords used as watermarks in the digital product. The inner code of the codewords is generated using permutations of rows in a Hadamard matrix and concatenating them together. A typical outer code of the codeword is the Reed Solomon code. An adaptive detector is able to accurately detect one of three or more colluders of a minority-type attack. Prior art schemes using an error correcting code-based watermarking mechanism with an inner code fail to detect colluders with a minority-type collusion attack which includes three colluders.
Abstract:
A method comprises accessing changes which can be watermarks in a list for coded data, the changes having an syntax element, an original value and an candidate alternative value; determining for a subset a group of compliant changes from the changes, the complaint changes being compliant with a coding protocol such as a CABAC encoding protocol; and selecting for the subset only compliant changes that result in the subset having only one candidate alternative value for each syntax elements and result in only compliant changes also meeting at least one performance criterion. The method can include determining fidelity, recoverability, or robustness of the watermarks and removing or preventing watermarks from being in the subset based on the fidelity, recoverability, or robustness, wherein fidelity, recoverability, and robustness are performance criteria. The method can include determining at least two performance values for the watermarks, determining some collective metric of the at least two performance values, and removing or preventing watermarks from being in the subset based on the same collective metric.
Abstract:
A method and apparatus are described including generating a unique code for each of a plurality of users using a plurality of symbols, generating a plurality of codes representing the plurality of symbols, substituting the plurality of codes into the unique code for each of the plurality of users, permuting the code resulting from the substitution to produce a codeword for each of the plurality of users and embedding the codeword into digital content. The second generating act further includes generating a string of first symbols followed by second symbols, wherein the first symbols are all ones and the second symbols are all negative ones, wherein a number of first symbols is equal to a number of the second symbols, and wherein if a length of the first symbols followed by the second symbols is less than a length of the code, then the first symbols followed by the second symbols are repeated until the code length is filled.
Abstract:
A method of providing CABAC compliant changes such as watermarks comprises accessing encoded data such as video which comprise at least two blocks; creating or accessing a list of changes to the encoded data that include a direct change to a block; determining motion character or motion vector differential of non-immediate block, non-immediate blocks being adjacent to an immediate block that are immediately adjacent to the block; determining change to the immediate block based on original motion character of the block and the non-immediate block and the motion character of the block that would result from the application of the change; storing the change to the list if the change does not cause a difference to the immediate block; and evaluating other potential changes if other potential changes are available, wherein the other potential changes are subjected to the same process steps as the direct change.