Applied Mechanics and Materials Vols. 220-223

Paper Title Page

Abstract: This document explains how to aim at low-precision in navigation and position of Inertial Navigation System and dependence of Global Positioning System. A combination of these two systems provides good compensations for each other. GPS/INS integrated navigation system in high dynamic environment is studied, an integrated algorithm based on the pseudo-range and pseudo-range rate is introduced. By analyzing the error model of INS and GPS navigation systems, the state equation and the observation equation are founded. Finally, data fusion algorithm is simulated using kalman filtering algorithm, simulation results show that the data fusion algorithm can improve reliability and maturity of integrated navigation system.
2280
Abstract: An improved active shape model (ASM) and active appearance model (AAM) based new method is proposed, this method will use two-dimensional local gray information to update the feature point position when using ASM to locate the face contour feature points. As to the internal features point location, it establishes facial organs independent AAM model. At the same time, it uses different measure functions to judge the convergence of search algorithm. The experimental results show that the new algorithm greatly improved the localization accuracy of facial feature points.
2284
Abstract: The level set method (LSM) is one of the methods used frequently to get the precise contours of the targets when the background is dynamic. In order to use the motion information and improve the processing efficiency, an adaptive level set method (ALSM) is proposed. In this approach, the particle filter algorithm is used to track the targets, so we get the rough external contours and their centroids. Then the level set curve evolution is performed to get the precise external contours of the targets. Lastly, the detection results are fed back to the tracking frame to revise the updating regions. The experiment results show that the proposed algorithm can adapt to the motion variations of the targets, and distinguish the targets.
2288
Abstract: With the electronic toward miniaturization and multifunctional development, such as System-in-Package (SIP), Package-on-Package (POP), these packages have been widely used. Signal speeds increase and then require that signal has a good transmission quality. Therefore the design of signal integrity should take into account these issues from the beginning design. In this paper, a model about the wire bonding transmission problem between the upper and lower levels of chip is proposed. The simulation results are shown at the different height and radius of the equivalent model. Meanwhile, researching in different cases, noise interference source makes the influence on signal quality. Finally, by adding the signal return path, signal integrity is achieved well by the eye diagram analysis.
2297
Abstract: The purpose of communication signals automatic modulation recognition is to judge signal modulation styles and estimate signal modulation parameters on the precondition of unknown modulation information. According to the seven kinds communication modulation signals studied in this paper, select a group of feature parameters based on the time-frequency characteristics of communication signals. The fast algorithm for attribute reduction based on neighborhood rough set using feature selection is introduced in detail. Then, using back propagation network as classification instruments to identify signals. The simulation shows that the method can not only reduce the number of feature parameters, but also improve the recognition rate.
2301
Abstract: A new multi-criteria decision-making method for interval-valued intuitionistic fuzzy number is proposed by the advantage of intuitionistic fuzzy set and ELECTRE method. Firstly, the possibility-degree and deviation-degree of interval number are used to establish the preference relation of interval-valued intuitionistic fuzzy number. Then, we exposit the decision theory and the steps of this method. Finally, a numerical example is given to illustrate the application of the method. The numerical results show that it is feasible and effective.
2308
Abstract: There are a lot of developments focused on 3D surface reconstruction based on 2D contours in recent decades, mostly based on closed contours. Due to the limitation of imperfect technology on material classification and edge extraction, it’s difficult to extract closed contours automatically, and this situation limits the application of 3D surface reconstruction based on contour. This paper designs a reconstruction algorithm based on non-closed contour, which not only provides a new viewpoint for research on 3D reconstruction, but also make 3D reconstruction based on contour more applicable.
2313
Abstract: With the rapid development of computer technology, various distributed-component technologies are emerging. CCM specification, which has the features of independent of platforms and development languages, complete model, standard protocol and interface, has been widely recognized in computer industry. In this specification, the reuse of software is achieved through assembling. Its openness and extensibility makes it especially suitable for the integration of large-scale information system. Based on the introduction of CCM specification and information system integration, proposes the application of CCM specification to information system integration, and describes the integrating method from four aspects of integration framework, hierarchy structure, development process, and operation characteristic.
2319
Abstract: The user identity information management and authentication, safety of the stored data in the cloud storage environment are the challenges of cloud security, all these have drawn attention of researchers in recent years. We made a security model of cloud storage: the model adopts many encryption methods to protect the user data and user identity information stored in the cloud storage management server, only authorized users can use cloud service. At last, we gave security analysis of the model, the result shows: the architecture is able to hide the characteristics of the data stored in the cloud server, certify and protect user identity information effectively.
2325
Abstract: Methods for updating the computational mesh have been studied for many years and there are mainly two kinds of mesh moving algorithms known as node connectivity based and no node connectivity based respectively. As the node connectivity based mesh moving methods are universal for both structured and unstructured mesh but of high computational cost at the same time, detailed attentions are paid to in this paper to balance its advantages and disadvantages. The format and the features of the derived linear equations in node connectivity algorithms are analyzed firstly and the choice of solver for these equations are considered subsequently. Finally, parallel models for node connectivity algorithms on different parallel architectures are proposed to accelerate these algorithms. Experiments have also been accomplished to match up the analysis procedures.
2330

Showing 461 to 470 of 617 Paper Titles