Applied Mechanics and Materials Vols. 121-126

Paper Title Page

Abstract: Focused on the facial feature points localization, the enhance ASM algorithm based on modeling texture by the DCT-SVM is proposed. First, the statistical shape model is built. Then, some key feature points are selected and their texture models are built by the DCT-SVM. In the subsequent searching, the feature points are divided into two classes based on their reliability gained by DCT-SVM detector, by combining the reliable feature points to the shape constraint, the original shape can finally match to the target face. Experiments show the algorithm is robust to the expressions change and can better locate the features than the traditional ASM.
820
Abstract: In order to cultivate engineering students to become not only professional but also mastering management theory and practice, ERP sand table training is an essential practice teaching content. This paper presents the necessary of engineering students learning ERP sand table simulation course, and proposes a specific solution of ERP sand table training setting according to characteristics of engineering students. Finally, investigation data shows the efficiency of ERP sand table training.
825
Abstract: Laser assisted milling (LAML) is a potential method for machining difficult-to-machine materials such as superalloys and ceramics, which uses a high power laser to focally heat a workpiece prior to material removal with a traditional cutting tool. A laser assisted milling experimental system was set up to investigate the cutting process of LAML of sintered silicon nitride. Effects of operating parameters on cutting forces, chip morphology, surface roughness and subsurface damage were investigated. The results showed the feasibility and advantages of LAML of ceramics including good surface, decreasing cutting force and tool wear, and no micro-crack zones.
830
Abstract: The current developed computer aided innovation software is mainly based on universal principle, and it is difficult in providing field knowledge support for the industry and product design. This paper is based on FBS model, systematically discusses the constructing principle of domain knowledge base from the aspect of knowledge acquisition, representation and retrieval. Finally, through an example of the improvement of the cylinder control, which prove the practicability of the Domain Knowledge Base.
835
Abstract: On the basis of analyzing the typical operating conditions of a vehicle model, 3D model of the rear axle housing was formed by using the Solidworks software, and the stress, strain and the fatigue life of the housing were obtained by using of Cosmos software with the method of finite element analysis. In the effect of alternating stress, the rear axle housing was found existing crack defects. The results showed that the rear axle housing life cycle was improved to over 5.0×105 and satisfied the design requirement. Results provided from tests were compared with the analyses also. It indicated that the proposed method of finite element analysis was a good and efficient method to predict the fatigue life of rear axle housing, which can provide reference for the design of that rear axle housing.
843
Abstract: The current city sewage system which lacks of global scheduling discharge function easily causes high energy cost and sewage overflow problems. This paper introduces a new method based on the analysis of previous sub-time flow data, using the improved LS-SVM method to predict the volume of real-time inflow. The algorithm will adjust control objectives when inflow changes drastically so as to prevent sewage overflow and achieve energy efficiency. The simulation results show that under the control strategy we introduced, the system has good behaviors of determining and fast-tracking inflow changes. In addition, by implementing the flow scheduling discharge function, the pumping stations are dealing well with flow mutation and are able to maintain stable liquid levels so as to prevent overflow.
848
Abstract: One of the import functions of pen drawings for designs is to take our design ideas onto a piece of paper so that we can look at it in a different way, and re-consider it after self-examination. Just like playing a piece of music with different musical instruments gives people different impressions, different drawings for a design make people have different understanding toward an design idea. This paper introduces to the readers how to deliver an image via pen in architectural design, including through intuitive picture representation, thoughts-oriented picture representation, communicative picture representation, and how to apply the method throughout the whole designing process.
853
Abstract: This paper explains and demonstrates a novel method of photorealistic simulation of two natural atmospheric phenomena, namely Emei Glory and Fog. Emei Glory is a natural phenomenon and can be observed in the area of famous Emei Mountain in China. The back-scattering effect of water droplet in fog causes this phenomenon. We use Mie scattering theory to simulate the glory and fog. Then calculate the spectral scatter intensity. For rendering, we adopt the method of single scattering integral to generate the whole scene by exploiting the parallel computation power of GPU. We demonstrate our synthetic results compared with the photographs at last.
857
Abstract: The scattering of SH-waves by two scalene triangle hills and a semi-cylindrical canyon was surveyed here using the methods of wave function expansion, complex function and multi-polar coordinates. Based on “division”, we divided the analytical model into 3 parts, and constructed displacement solutions of wave fields that meet the boundary conditions in the three regions, respectively. The three domains were then conjoined to satisfy the “conjunction” condition to deduce a series of infinite algebraic equations about the problem combined with the boundary condition of semi-cylindrical canyon. Lastly, numerical examples were presented to investigate the influence of different parameters on the ground motion of the hills and the canyon.
862
Abstract: In order to evaluate the security of Application Specific Integrated Circuit (ASIC) implemented cryptographic algorithms at an early design stage, a Hamming distance model based power analysis is proposed. The Data Encryption Standard (DES) algorithm is taken as an example to illustrate the threats of differential power analysis (DPA) attack against the security of ASIC chip. A DPA attack against the ASIC implementation of a DES algorithm is realized based on hamming distance power model (HD model), and it realized the attack by successfully guessing the right 48-bit subkey. This result indicates that the power analysis attack based on the HD model is simple, rapid and effective for the design and evaluation of security chips.
867

Showing 161 to 170 of 950 Paper Titles