The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] evaluation model(4hit)

1-4hit
  • A Countermeasure against Double Compression Based Image Forensic

    Shen WANG  Xiamu NIU  

     
    LETTER-Image Processing and Video Processing

      Vol:
    E95-D No:10
      Page(s):
    2577-2580

    Compressing a JPEG image twice will greatly decrease the values of some of its DCT coefficients. This effect can be easily detected by statistics methods. To defend this forensic method, we establish a model to evaluate the security and image quality influenced by the re-compression. Base on the model, an optimized adjustment of the DCT coefficients is achieved by Genetic Algorithm. Results show that the traces of double compression are removed while preserving image quality.

  • An Evaluation System for End-User Computing Capability in a Computing Business Environment

    Chui Young YOON  

     
    PAPER-Knowledge Representation

      Vol:
    E91-D No:11
      Page(s):
    2607-2615

    We describe an evaluation system consisting of an evaluation and interpretation model to totally assess and interpret an end-user's computing capability. It includes four evaluation factors and eighteen items, the complex indicators, an evaluation process, and method. We verified the model construct was verified by factor analysis and reliability analysis through a pilot test. We confirmed the application of the developed system by applying the model to evaluating end-users in a computing business environment and presenting the results. This system contributes to developing a practical system for evaluating an end-user's computing capability and hence for improving computing capability of end-users.

  • Analytical Model on Hybrid State Saving with a Limited Number of Checkpoints and Bound Rollbacks

    Mamoru OHARA  Ryo SUZUKI  Masayuki ARAI  Satoshi FUKUMOTO  Kazuhiko IWASAKI  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E89-A No:9
      Page(s):
    2386-2395

    This paper discusses distributed checkpointing with logging for practical applications running with limited resources. We present a discrete time model evaluating the total expected overhead per event where the number of available checkpoints that each process can hold is finite. The rollback distance is also bound to some finite interval in many actual applications. Therefore, the recovery overhead for the checkpointing scheme is described by using a truncated geometric distribution as the rollback distance distribution. Although it is difficult to analytically derive the optimal checkpoint interval, which minimizes the total expected overhead, substituting other simple probabilistic distributions instead of the truncated geometric distribution enables us to do this explicitly. Numerical examples obtained through simulations are presented to show that we can achieve almost minimized total overhead by using the new models and analyses.

  • Reliability Analysis of a Convolutional-Code-Based Packet Level FEC under Limited Buffer Size

    Masayuki ARAI  Satoshi FUKUMOTO  Kazuhiko IWASAKI  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E88-A No:4
      Page(s):
    1047-1054

    In this paper, we present a model for evaluating the effectiveness of (2, 1, m) convolutional-code-based packet-level FEC, under the condition of a limited buffer size in which the number of available packets is restricted for recovery. We analytically derive the post-reconstruction receiving rate, i.e., the probability that a lost packet is received or recovered before the buffer limit is reached. We show numerical examples of the analytical results and demonstrate that the buffer size at the same level as m gives sufficient recovery performance.