Applied Mechanics and Materials
Vols. 212-213
Vols. 212-213
Applied Mechanics and Materials
Vols. 209-211
Vols. 209-211
Applied Mechanics and Materials
Vols. 204-208
Vols. 204-208
Applied Mechanics and Materials
Vol. 203
Vol. 203
Applied Mechanics and Materials
Vols. 201-202
Vols. 201-202
Applied Mechanics and Materials
Vol. 200
Vol. 200
Applied Mechanics and Materials
Vols. 198-199
Vols. 198-199
Applied Mechanics and Materials
Vol. 197
Vol. 197
Applied Mechanics and Materials
Vols. 195-196
Vols. 195-196
Applied Mechanics and Materials
Vols. 193-194
Vols. 193-194
Applied Mechanics and Materials
Vol. 192
Vol. 192
Applied Mechanics and Materials
Vols. 190-191
Vols. 190-191
Applied Mechanics and Materials
Vol. 189
Vol. 189
Applied Mechanics and Materials Vols. 198-199
Paper Title Page
Abstract: Alone with the Component-Based Software Engineering (CBSE) has been becoming the mainstream in applications development, there are a lot of people has been used software components to build their applications and business systems. But in practice, how to create a reusable and easy customized component and can be easily integrated into users’ application is still a headache problem to many designers and developers. Here by study and analyzing the interface-oriented software component model and research on the XML and task-oriented technologies, it illustrates a task-oriented software component design and try to improve the CBSE in practice
338
Abstract: Nowadays most of malware samples are packed with runtime packers to complicate the task of reverse engineering and security analysis in order to evade detection of signature-based anti-virus engines. In the overall process of malware analysis, unpacking a packed malicious binary effectively is a necessary preliminary to extract the structure features from the binary for generation of its signature, and therefore several unpacking techniques have been proposed so far that attempt to deal with the packer problem. This brief survey article provides an overview of the currently published prevalent unpacking techniques and tools. It covers the operation process of packing and unpacking, packer detection methods, heuristic policies for spotting original entry point (OEP), environments for runtime unpacking, anti-unpacking techniques, and introduces several typical tools for unpacking.
343
Abstract: According to the traditional morphological classification, the Rhizoma Chuanxiong quality of traditional chinese medicine is divided into recommended products and non-recommended products; the chromatogram data of Rhizoma Chuanxiong are obtained in the standard condition, we inspect and abstract main data, get the main peaks of linear independent vectors. Get every clustering the most likely data of Rhizoma Chuanxiong with Particle Swarm Optimization of synchronous learning factor and Rosenbrock method of Optimization. Make Rhizoma Chuanxiong criterion data as grey-whitened Gumbel distribution and calculate similarity with the sample data of Gumbel distribution and ensure the finial similarity by weighted average. The program will use Simpson double integra and B-spline interpolation. It need to calculate the similarity between unknown sample and the common pattern of corresponding standard sample when analyze unknown sample. This research combines the plant morphology, chemistry, statistics and calculating technology establishing the pattern identification methods of quality, have good attempt to traditional chinese medicine quality assessment methods and make a basic to the deeper research about Rhizoma Chuanxiong in theory and practice.
351
Abstract: Image rotation is a necessity for 2-D barcode identification. The computation complexity of image rotation is considered as a key problem of the implementation of real time 2-D barcode identification. This paper presents a novel VLSI structure for image rotation which can calculate the tilt angle of 2-D barcode image and rotate image to the horizontal way. The circuit to calculate the tilt angel of 2-D barcode is simple and effective and can be implemented with low hardware complexity. Image rotation algorithm takes use of improved CORDIC algorithm and Bi-linear interpolation and is implemented by high-speed pipelined architecture. The proposed architecture is implemented on the Altera Stratix IV FPGA. Experimental results show that the proposed architecture can rotate 2-D barcode images with arbitrary tilt angles to the horizontal way at 132MHz. Moreover, it can keep image details clear thus improving 2-D barcode identification rate.
357
Abstract: Beamforming performance of autonomous, distributed sonar array degrades due to random position deviation. A new algorithm for beamforming based on Least Squares (LS) approximation of the desired beampattern is proposed in this paper. Elements of autonomous, distributed array are battery-powered and capable of computing with microprocessor. Centralized approach has shortcoming of failures due to excessive power consumption and lower fault-tolerant capability. Distributed computing approach of LS solution has profound significance with respect to longer life period and better robustness for autonomous sonar array systems.
361
Abstract: An emotional interaction system is designed by using the theories about affective computing in this paper, which includes the emotional information capturing, machine emotional model and emotional expression. This paper focuses on the problem of building machine emotional model, not only gives the basic definitions of personality space, mood space, and emotion space, but also establishes the quantitative relationship of personality mood and emotion. At last, this paper builds a machine affective model which can reflect the transformation law of the mood, emotion and personality. Related simulation results show that the model can effectively simulates the change law of human emotion. Finally, this paper designs the software interface of the emotional interaction system.
367
Abstract: The paper presents a reverse analysis and crack-found methodology with the functional model as the centre for OS trusted mechanism, pays attention to the functional model establishing of binary code and the description methodology. And it designs general XML-based storage structure to serve the storage and transformation of information cross levels in the level functional model of trusted mechanism, develops the plugin of IDA, which takes and stores routine Control Flow Graph and level functional model automatically from the binary code.
374
Abstract: With the widespread use of information systems, traditional manual audit approach cannot adapt to the quick development of information technologies. It has drawbacks of high cost, inefficiency, big risk, poor quality, etc. Computer-assisted audit and its applications are studied in this paper. Firstly, comparative analysis between traditional manual audit and computer-assisted audit is conducted. Then the flow of data-oriented computer-assisted audit is presented and the implementation steps are detailed. Finally, the applications of computer-assisted audit are discussed in four practical audit cases of information systems, i.e. hospital information system, electrical police management system, local taxation management information system and medical insurance fund management information system. And the corresponding audit results are given. The practical audit cases show that computer-assisted audit can expand the audit scope and perform deeper data analysis, thus cutting down the cost and risk of audit while improving efficiency and quality of audit. Therefore, it can effectively help auditors to perform information systems audit.
380
Abstract: The specific applications of the CASE tool in the software development is discussed, including establishing the data model, the model transformation, the script files generation, the reversal engineering, and the database optimized technologies, etc. CASE has been proven to be with lots of advantages, such as speeding up the development, reducing software development cycle, improving the system operational efficiency and the system maintainability, etc.
386
Abstract: In order to meet the security requirement of the dispatching data network and the features of its main applications, the principle of IP over SDH and the overall plan of Henan Power dispatching data network (HNDnet) based on IP over SDH is presented, together with the network architecture of the dual-plane backbone network and access network. Kernel design, network protection on communication side and routers access mode of Henan data dispatching network based on the dual-plane power communication network are illustrated in detail and some examples are given. Then a safer dispatching data network is provided.
391