Applied Mechanics and Materials
Vols. 190-191
Vols. 190-191
Applied Mechanics and Materials
Vol. 189
Vol. 189
Applied Mechanics and Materials
Vol. 188
Vol. 188
Applied Mechanics and Materials
Vol. 187
Vol. 187
Applied Mechanics and Materials
Vol. 186
Vol. 186
Applied Mechanics and Materials
Vols. 184-185
Vols. 184-185
Applied Mechanics and Materials
Vols. 182-183
Vols. 182-183
Applied Mechanics and Materials
Vols. 178-181
Vols. 178-181
Applied Mechanics and Materials
Vols. 174-177
Vols. 174-177
Applied Mechanics and Materials
Vols. 170-173
Vols. 170-173
Applied Mechanics and Materials
Vols. 166-169
Vols. 166-169
Applied Mechanics and Materials
Vol. 165
Vol. 165
Applied Mechanics and Materials
Vol. 164
Vol. 164
Applied Mechanics and Materials Vols. 182-183
Paper Title Page
Abstract: Along with the rapidly development of network technology, viruses, Trojans and other malicious code is updating unprecedented quickly, which constantly threatening the collective as well as the personal information safety.Analysis of malware based on the code behavioral characteristics aims at telling whether the code is malicious or not, which can effectively solve the problem caused by Zero-Day attacks that traditional anti-virus technology can hardly prevent. This paper studies how to monitor and record the API calling sequence when a program is running, and how to get the eigenvectors of behavior by means of analyzing the calling sequence of sensitive APIs, which makes the behavior of malicious code can be tracked, and providing supports and theoretical basis for addressing the potential threat of malicious code.
1938
Abstract: In this paper, we come up with the idea of using frequency shift method to strip carrier when acquiring the GPS signal. The RF uses the quadrature demodulator and dual channel to sample the signal, forming the IF digital signal in I channel and Q channel. The paper derivates the mathematical formula of the frequency shift method, and compares the trigonometric function method with it from the aspect of schematic diagram and calculating. Also, we make simulation of the two schemes using Matlab for both true signal and analog signal. And it comes out that the frequency shift method has got a much greater correlation peak than the trigonometric function method. So we come to the conclusion that it is better using the frequency shift method to acquire signal in low signal intensity.
1943
Abstract: Ontology has a strong ability in expressing of the semantics and conception speculating, so is used to deal with the problems in the databases integration. In this paper, we relative analysis the weak points of the local and global ontology, establishing a hybrid ontology framework in the databases integration, integrated the query module, shied of the discrepancy between the different data source, and introduced some of the critical techniques and with the supervisory module, log be produced too, convenient for system maintain and upgrade.
1948
Abstract: When the parameters were measured by using fiber Bragg grating (FBG) in practice, there were some parameters hard to measure, which would influenced the reflective spectral of FBG severely, and make the characteristic information harder to be extracted. Therefore, particle swarm optimization algorithm was proposed in analyzing the uniform force reflective spectral of FBG. Based on the uniform force sense theory of FBG and particle swarm optimization algorithm, the objective function were established, meanwhile the experiment and simulation were constructed. And the characteristic information in reflective spectrum of FBG was extracted. By using particle swarm optimization algorithm, experimental data showed that particle swarm optimization algorithm used in extracting the characteristic information not only was efficaciously and easily, but also had some advantages, such as high accuracy, stability and fast convergence rate. And it was useful in high precision measurement of FBG sensor.
1953
Abstract: Current years, the offing red tide of china is recurrent mutation, the direct and fast method which can analyze the amount and the kind of the phytoplankton is needed imperious. Three-dimensional fluorescence spectrum can show entire fingerprint information of fluorescent light that in the range of excitation and emission wavelength, but the dimension of three-dimensional fluorescence spectrum is higher, the characteristic spectrum of different kinds pelagic plant are multifarious, it is complex identification. In this paper, the principal component analysis (PCA) is used to reduce the dimensions of the spectroscopy. The independent component analysis (ICA) is used to do the matrix decomposition from the perspective of independence to extract the main feature of the spectroscopy data processed by the PCA. The support vector machine (SVM) is used to assort the main characteristic root books which are abstracted by the ICA. The correct laboratory sorting of seaweed is realized. Experimental result indicate, this method can identify the chief component of admixture seaweed, the high dimensional spectroscopy information of seaweed is proceed effective feature extraction, the sorting speed is increase greatly, the discrimination of sorting is reach 92% percent.
1958
Abstract: Contourlet transform and wavelet have been widely used in image processing systems including texture image retrieval applications, and many literatures have reported how to construct the retrieval systems. Among them, generalize Gaussian distribution (GGD) model is a promising one. We will compare the algorithm with another one, which uses energy and standard deviation features and Canberra distance. Experimental results on 40 texture images from MIT vision database show that the latter one has higher retrieval rates for wavelet and contourlet transform retrieval systems, which indicate that the GGD model is not accurate for charactering texture feature.
1962
Abstract: Because of the current network printing, exists the problem about the long print cycle, expensive and big chromatic aberration of the client display color reproduction. The article gives a method to gets the printing reproduction data and gets WYSIWYG about network printing client desktop displays color. On the basis of client's desktop display color, with the help of network printers printing technology, image processing software, visual observation of network clients and network form, the client desktop color display data is gotten. By the software reduction calculation, the method implements consistent the effect between the client-side displays color and printing color. The demonstration shows that it can solve the problem of network printing client display color printing reproduce, improves the quality of network printing, reduces network printing cycle.
1967
Abstract: With the increasing development and application of distributed database, distributed data mining has attracted many data mining researchers’ attention. In this paper, a framework for distributed data mining is introduced, and based on the framework, many patterns are generated from each database after data mining, so it is necessary to synthesize all the patterns to identify the meaningful global patterns. An approach to synthesizing local patterns to identifying global exceptional patterns is developed. In this approach, a pattern’s significance is measured by the deviation of the pattern’s support from the average support. Experimental results show that our approach is reasonable and appropriate to identify exceptional patterns.
1972
Abstract: The utilization efficiency of system resources is a key issue for cluster system while load balance is an important tool to realize the efficient use of resources. Based on server cluster system, this paper puts forwards an improved self-adaptive algorithm for network load balancing. Simulation results show that the algorithm can improve the utilization efficiency of system resource and reduce the server’s response time so as to achieve the request of real time when dealing with tasks and high availability of system.
1978
Abstract: Based on the second-order difference formulas of the first and second derivatives, an explicit difference scheme is proposed for a class of aging diffusion equations group. The method is of order and proved to be conditionally stable by Fourier analysis. The difference equation can be solved without iterative for it is an explicit scheme. Numerical results show the efficiency and dependability.
1982