This paper presented X-ray of correction of testing image model based on digital image processing technique. Deformation algorithm and bilinear polynomial interpolation were applied to the distortion correction of testing image then make the corrected image smooth with combining median filter method. The experimental results have shown that this algorithm is simple, effective and able to show testing image clearly and accurately, laid a foundation for defect detection and identification following up.
KEYWORDS: Sensors, Information security, Computer security, Network security, Environmental sensing, Control systems, Data processing, Calculus, Software development, Transform theory
Unceasingly developed and deeply exploited along with the software system, the variety of middlewares becomes
more and more, they mutually affect each other in the complex way. These middlewares, because of the complex
of the origin, are not extremely credible. So, before using these middlewares, we must understand the security
features of them, for instance, the secret data cannot be leaked in the network. But, it is very difficult to confirm
whether these middlewares have good security feature. The paper designs the encapsulations, which let these
middlewares run under secure environment, and it provides the control of good granularity among the
middlewares, the middleware and other system resources. The main part of this paper is to research the expression
methods of the encapsulations, and we state and verify the security through these methods. This paper uses
box-πcalculus to describe several kinds of encapsulations, and discuss the security that each encapsulation could
guarantee.
KEYWORDS: Information security, Control systems, Systems modeling, Network security, Telecommunications, Security technologies, Information operations, Silicon, Software engineering
Access control based on RBAC makes the system suitable to the security strategy for special application, relieves
burden of system administrators and can adapt itself to the adjustment of the system structure flexibly. But all the
existing security mechanisms of the middleware technology can't support the RBAC model very well. The method
using J2EE security mechanisms to support RBAC is showed in this paper. First, the configuration of J2EE security
systems is given in the paper and the algorithm of J2EE authorization decision is designed. Then, the language of J2EE
security description is used to define RBAC, and realization of the requirement of J2EE security service is given. It has
achieved the anticipative effect in virtue of deployment and application on the platform of the national science
technology infrastructure.
With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.