Applied Mechanics and Materials Vols. 241-244

Paper Title Page

Abstract: Some chaos-based image encryption schemes using plain-images independent secret code streams have weak encryption security and are vulnerable to chosen plaintext and chosen cipher-text attacks. This paper proposed a two-level secret key image encryption method, where the first-level secret key is the private symmetric secret key, and the second-level secret key is derived from both the first-level secret key and the plain image by iterating piecewise linear map and Logistic map. Even though the first-level key is identical, the different plain images will produce different second-level secret keys and different secret code streams. The results show that the proposed has high encryption speed, and also can effectively resist chosen/known plaintext attacks.
2728
Abstract: A new algorithm and a mapping scheme between XML document and relational database were presented. The scheme extracted name, type, value and other information from XML document, and then mapped them to relational database. Data from relational database can be restored to XML document. This method avoids information loss in the data transfer process and remains the structural relation between elements. And this mapping scheme does not depend on XML DTD or Schema.
2732
Abstract: Informatization of food safety supervision overviews in China and some other countries were studied. With the combination of food safety supervision characteristics in Guizhou and quality system requirements for national food inspection laboratory, information management system for food safety in Guizhou was proposed. A knowledge database for categorizing determination factors of food hazard was established. This system was implemented in the food safety supervision of circulation links in Guizhou for 3 years (2009-2011). It solved problems such as quality control for massive sampling inspections and data analysis. Besides improving work efficiency, it provided scientific basis for decision making of food safety supervision to government as well as data support for food safety forecasting and warning system.
2737
Abstract: Reliability is an important software trustworthy attribute. But most existent reliability model don’t consider the severity degree of software fault, so traditional software reliability model can’t reflect the trustworthiness of software. Based on the analysis of typical J-M reliability growth model, this paper modifies some of the model assumptions and classifies the software faults. Besides, this paper presents a new method based on weight to calculate the degree of software reliability. Finally, according to the different of frequency of software faults, a practical reliability prediction method is proposed and the experiment results shows that the improved model has a better forecast accuracy.
2741
Abstract: Finite element equation of the nonlinear dimensionless Reynolds equation, based on the Galerkin finite element method, was derived. Three key points of solving the equation was studied in detail, i.e. Boolean matrix was calculated under the nonlinear conditions, and a method of integrating discrete element equations was provided; Nonlinear algebraic equations set, resulted from integrated finite element equations, was obtained and a method how to substitute boundary conditions into the algebraic equations was presented; A method of calculating the Jacobi matrix of the equations set were described in this paper. All of them are crucial to solve the nonlinear Reynolds equation and helpful for promoting the further research on compliant foil gas bearing.
2751
Abstract: After introducing the research background of the universal test platform for airborne guidance weapon, the paper puts forward its hardware architecture which is built based on multi-bus fusion. The main functions of its software are described and its software architecture is proposed. To realize the transportability and inter-operation ability of TPS, its software is developed with the method of signal-oriented using the test language-ATLAS and is compiled and run on PAWS. The software of VC++、Lab Windows/CVI and so on are adopted to develop interface and instrument drive of the system. The software development process with PAWS is also introduced. Its software is expansible and when the test platform adds a new airborne guidance weapon which needs to be tested, only adaptor database Ita.ITA and TPS database need to be developed.
2758
Abstract: Before final assembly and while debugging a missile, in order to ensure the flight control system can work stably and reliably, it is necessary to develop an auto test system. Test software is an important part of the test system. After describing the composition and working principle of the flight control system, summarizing the test requirements, the test software is designed. The design ideas, test algorithm, realization and key technologies, software anti-jamming techniques are introduced in detail. The test software guarantees the test system test the flight control system generally and reliably.
2764
Abstract: The image description space grayscale, color or texture changes, but the image storage and analysis are very complex. If it is a dynamic image, the amount of data is greater. Image compression for image storage and transmission are very necessary. In order to more save memory space and more be used as a compressed representation of a image, a image is mapped into a graph, we can use the labeling of graph to compress.
2769
Abstract: In ensuring the content of digital vector maps lossless, a high capacity digital watermarking algorithm is proposed based on encoding scheme. According to the structure of TAB file for digital vector maps, the watermark is hidden into the attribute blocks. As each vector object definition reserves redundant space, these information bits cannot be edited and displayed by any map editing tool, the watermark has good concealment. Experimental results show that the algorithm maintaining high capacity and good invisibility, it also can strongly resist various geometric transformations such as cropping, rotation, projection, etc..
2773
Abstract: On the problems existing in the realization of current accessibility website, we design a web designing architecture, using the web log mining technique to extract user interests and access priority sequence and adopting the dynamic web page information to fill the web page commonly used structure, realize the intelligent , personalized accessibility.
2779

Showing 521 to 530 of 621 Paper Titles