Applied Mechanics and Materials Vols. 220-223

Paper Title Page

Abstract: It is an important ways that the Trojan Horse invades the Linux system through the kernel hacking. Its principle is using the mechanism provided by Linux kernel to realize Trojan Horse functions,which is mainly realized through the kernel programming. This paper has studied the two methods of kernel hacking with emphasis:Directly revises the kernel source codes and uses the Linux module mechanism. Finally, on this basis, a kind of kernel hacking Trojan Horse has been designed and realized.
2891
Abstract: In the past, when need to draw one model of brake parts, users have to use the CAD software and make it one step by step, which wastes a lot of time and energy because of the repetitive artificially drawing. In order to improve the efficiency of drawing the models of brake parts, the paper builds one brake parts library by using the Visual C++6.0 and doing secondary development on the CATIA. Through one example, the paper proves the feasibility of building brake parts library.
2895
Abstract: In this paper, a fast algorithm for fractional Fourier transform was proposed based on the theory of fractional Fourier transform, the fast numerical calculation of the fractional Fourier transform and fractional correlation was realized using MATLAB language. The characteristics of rotation distortion invariant image recognition based on fractional correlation were analyzed and compared with the traditional correlation. The results show that the quality of the fractional correlation peak is obviously improved. When fractional order P = 0.7, the fractional correlator can realize rotation distortion invariant image recognition within the scope of 15°.
2899
Abstract: This paper introduces the design of PDF417 two-dimensional barcode digital watermarking system with SOPC chip EP2C70F896C6 made by Alters fully. Analyzed structure and working principle of the hardware and software. System used video conversion chip VGA of DE2-70 development board made by Terasic Technologies and PCI bus interface chip SD card, realized the barcode watermark control with Verilog HDL and C language common programming. The system has many merits such as high velocity, good commonality and low costs etc.
2903
Abstract: A typical slope has been comparatively analyzed with 2D and 3D FEM, it is showed that the length of surface load at top surface of slope shorted, the stability factor of slope of 3D model increased, which is far more than that of 2D model. In a certain degree, the safety factor got by 3D model is bigger than that of 2D model, so the safety factor of slope is underestimated by 2D model analysis sometimes.
2908
Abstract: Enterprise network refers to the summary of relationships based on common social and cultural background and the basis of mutual trust, connected with information technology, and forged by a group of interconnected enterprise behavior actors and institutions in the process of sharing resources, exchanging resources, and delivering resources in order to respond to market changes quickly. Enterprise network is dynamic and complex, as an independent legal person, pursuing his own benefit is his instinct, the enterprises in enterprise network will inevitably exist opportunism tendency, which will lead to conflict, and will also affect the performance of enterprise network. One of the important means to solve the problems is the establishment of effective resource coordination mechanism. As a basic premise of coordination, communication is cooperative foundation among enterprises in the enterprise network, which is also the basis of promoting the cooperation, and the necessary means to improve the performance of cooperation. Communication promotes information sharing, increases transparency, promotes the establishment of trust and coordination.
2912
Abstract: In the context of data integration on the web, traditional data integration system lacks scalability, flexibility, is no longer adequate. A novel data integration architecture, UQSIQ, is proposed, which achieves web-scale data integration. Key components in the system are introduced. UQSIQ maps user query schema to a suitable domain, selects web databases, querys and then ranks results. Key techniques, domain mapping and user query schema matching, to handle the scale and heterogeneity of structured web data are described.
2916
Abstract: The Web database's classification is the key step which integrates with the Web database classification and retrieves. The traditional search engine is unable to correct search for the magnanimous information in Deep Web hides. This article has proposed one kind of classification based on machine learning's web database. The experiment has indicated that after this taxonomic approach undergoes few sample training, it can achieve the very good classified effect, and along with training sample's increase, this classifier's performance maintains stable and the rate of accuracy and the recalling rate fluctuate in the very small scope.
2920
Abstract: Aiming at the security threats of Integrated Storage Network (ISN) in network transmission and static storage of classified information, a Secure Integrated Storage Network (SISN) model is proposed. By designing a Security Initiator (SI) and a Security Control Model (SCM) with integration of techniques for identification, data encryption, access control and security auditing to guarantee the confidentiality, integrity and effectiveness of the storage. The simulation attack test was done to classified organizations which applying the SISN.The result prove SISN can guarantee the storage security of classified information effectively.
2924
Abstract: Islamic arts consist of several parts and could be noticed in works such as tiling, plaster works, stalactite work and etc. As well as in windows templates, wooden doors. The geometrical patterns as a part of Islamic arts have a ground for parametric program. This paper studies about the patterns that have emerged from Iranian traditional geometry and possess the ability to be changed into an intelligent pattern; followed by assessing characteristics that would make them parametric. The results were compared with Isfahan Mosalla, as the largest complex of metal shell with the dome-shape special structure that includes single welded mesh layer with nodes works and net pattern of classic wooden window, as a case sample. In conclusion, the reason of using the pattern worked in ceiling structure of the building has been discussed. This building is one of the valuable works that fairly reveal joining local architecture patterns with space-work structures system. Keywords: Intelligent pattern, Modelling, Parametric program, Islamic pattern.
2930

Showing 581 to 590 of 617 Paper Titles