Applied Mechanics and Materials
Vol. 331
Vol. 331
Applied Mechanics and Materials
Vol. 330
Vol. 330
Applied Mechanics and Materials
Vol. 329
Vol. 329
Applied Mechanics and Materials
Vol. 328
Vol. 328
Applied Mechanics and Materials
Vol. 327
Vol. 327
Applied Mechanics and Materials
Vols. 325-326
Vols. 325-326
Applied Mechanics and Materials
Vols. 321-324
Vols. 321-324
Applied Mechanics and Materials
Vol. 320
Vol. 320
Applied Mechanics and Materials
Vol. 319
Vol. 319
Applied Mechanics and Materials
Vol. 318
Vol. 318
Applied Mechanics and Materials
Vols. 316-317
Vols. 316-317
Applied Mechanics and Materials
Vol. 315
Vol. 315
Applied Mechanics and Materials
Vols. 313-314
Vols. 313-314
Applied Mechanics and Materials Vols. 321-324
Paper Title Page
Abstract: Regenerating codes are based on the concept of the network coding. Compared with the traditional codes used for fault-tolerant, it has advantages for its low redundancy and high efficiency. We present DSRC, a distributed networked storage system realizing a traditional regenerating code and a secure regenerating code in real network settings. We deploy and evaluate our DSRC prototype in a real network setting. We also use DSRC to experiment the empirical performance of storage schemes with the secure regenerating code. The evaluate shows that the secure regenerating code can achieve the security of the fault-tolerant process with a little higher throughput.
2574
Abstract: This paper examined the application of Apriori algorithm in extracting association rules in data mining by sample data on student enrollments. It studied the data mining techniques for extraction of association rules, analyzed the correlation between specialties and characteristics of admitted students, and evaluated the algorithm for mining association rules, in which the minimum support was 30% and the minimum confidence was 40%.
2578
Abstract: Volunteer management is large sports games get a key element of success. This article through the literature data method, interview method and logical analysis, the characteristics of volunteers and the particularity of the large sports games was analyzed, With the success of Beijing Olympic Games volunteer management experience, put forward the large sports games volunteer management should stick to effective recruitment, multiple training, it is with the person this, dynamic adjustment, Multidimensional incentive, meet the demand, mutual equality, unity cooperation principle, with its large sporting events for the future volunteer management to provide the beneficial reference.
2583
Research on Database and Mining-Map Automatic Generation System of Metal Mine Production Information
Abstract: According to the intensive analysis of metal mine production information database and data characteristics, object-oriented database is primarily discussed to establish for metal mine production information with UML technique. Then the subsequent design idea and approach is presented on mine three-view drawing of metal mine production information system, taking the requests and rules of mapping in metal mine into account and applying the techniques of ObjectARX, to realize three dimension information visualization and automatic mapping of metal mine production information and mining design. In the whole process we cohered with experiences from engineering to do interactive improvement and develop simple and convenient system operation interfaces according with working habits of direct labor on production lines,which owns strong application significance and wonderful popularization value among metal mines at present.
2587
Abstract: On-line Queries were conducted on three injury surveillance systems implemented in Japan, the United States and the European Union. Attributes such as simplicity, representativeness, and data quality of each surveillance system were evaluated. The evaluation result shows that the system in the U.S. has a better performance.
2596
Abstract: The accumulation of basic research management information is an important foundation for the continuous development of scientific research, is the important strategic resources of science and technology innovation, economic development and national security, and is the important basis for government departments to formulate policies and make scientific decision. According to the situation of basic research management information, this paper proposed the overall architecture and implementation plan of national basic research management information data center, combined with the key technologies in the construction of data center. By this architecture and plan, a national basic research management information data center with centralized management, ordering specification, reliable sources and fully sharing can be constructed.
2602
Abstract: Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia data in a networked environment. It makes possible to tightly associated to a digital document a code allowing the identification of the data creator, owner, authorized consumer, and so on. In this paper a new DCT-domain system for digital watermarking algorithm for digital images is presented: the method, which operates in the frequency domain, embeds a pseudo-random sequence of scrambled image in a selected set of DCT coefficients. After embedding, the watermark is adapted to the image by exploiting the masking characteristics of the human visual system, thus ensuring the watermark invisibility. By exploiting the statistical properties of the embedded sequence, the mark can be reliably extracted without resorting to the original uncorrupted image. Experimental results demonstrate that the watermark is robust to several signal processing techniques, including JPEG compression, cut, fuzzy, addition of noise, and sharpen.
2609
Abstract: This paper, proposes a method that by generating a pseudo random pattern, which will work as the watermark and the watermark is embedded during the quantization procedure. Then WSR (watermarking survival rate) is used to search for the optimized truncation points by running the EBCOT process, the truncation point is adjusted to stay at the bit plane boundary and it is used as the dividing point to split magnitude bits of wavelet coefficients, which is then sent to EBCOT for encoding. The final output is the J2K coded watermarked image. The results show that watermarked EBCOT image is nearly rate-distortion optimized, the decoder can recover the original image, the watermark can be detected effectively, and it is robust against geometric attacking such as rotating attack, cropping and scaling attack.
2613
Abstract: A kind of multifunctional audio digital watermark algorithm was put forward according to the copyright protection of audio problems. The audio signal is layered three by wavelet packet decomposition and robust watermark is embedded in the low frequency part, fragile watermark is embedded in the intermediate frequency part. The experimental results show that, the algorithm has no sound very good, excellent robustness and fragility. In the actual use of the process, which not only guarantees the safety of audio information effectively , but also guarantees good audio information fidelity.
2617
Abstract: As a variation of spam, image spam can evade the text based filter simply and effectively. Based on the characteristic that this kind of mail is usually generated in manner of template and the image content under the same template are highly similar, this paper proposes a rapid method for identifying image spam by fusing content features. The layout features are first adopted to localize the spam speedily, and then the wavelet transform based content feature fusion decision algorithm is used to determine the spam accurately. The experimental results demonstrate that the proposed method is fast, accurate and practical.
2623