Search

  • Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • In Jour Smart Sensing And Intelligent Systems
  • International Journal Advanced Network Monitoring Controls

 

Research paper

PERCEPTUAL HASHING ALGORITHM FOR SPEECH CONTENT IDENTIFICATION BASED ON SPECTRUM ENTROPY IN COMPRESSED DOMAIN

This paper proposes a new perceptual hashing algorithm for speech content identification with compressed domain based on MDCT (Modified Discrete Cosine Transform) Spectrum Entropy. It aims primarily to solve problems of large computational complexity and poor real-time performance that appear when applying traditional identification methods to the compressed speeches. The process begins by extracting the MDCT coefficients, which are the intermediately decoded results of compressed speeches in

Zhang Qiu-yu, Liu Yang-wei, Huang Yi-bo, Xing Peng-fei, Yang Zhong-ping

International Journal on Smart Sensing and Intelligent Systems , ISSUE 1, 283–300

Article

A Mobile Terminal Security Strategy Based On the Cloud Storage

With the emergence of mass storage systems and the development of the Distributed File System, Cloud storage system has become the focus of the industry. The cloud storage services on mobile terminal have been putted on the agenda based on the rapid development of intelligent mobile terminal. Based on the analysis of the architecture of HDFS and Dynamo, a mobile Terminal Security strategy is presented in this paper. The database technology and the dynamic consistent hashing algorithm are

Wang Hui, Tang Junyong

International Journal of Advanced Network, Monitoring and Controls , ISSUE 2, 46–59

Article

DESIGN OF COMPLICATED DUPLICATE IMAGE REPRESENTATION APPROACH BASED ON DESCRIPTOR LEARNING

Yongjiao Wang, Xiaojie Du, Lei Liang

International Journal on Smart Sensing and Intelligent Systems , ISSUE 2, 992–1010

No Record Found..
Page Actions