Applied Mechanics and Materials
Vols. 347-350
Vols. 347-350
Applied Mechanics and Materials
Vol. 346
Vol. 346
Applied Mechanics and Materials
Vol. 345
Vol. 345
Applied Mechanics and Materials
Vol. 344
Vol. 344
Applied Mechanics and Materials
Vol. 343
Vol. 343
Applied Mechanics and Materials
Vols. 341-342
Vols. 341-342
Applied Mechanics and Materials
Vol. 340
Vol. 340
Applied Mechanics and Materials
Vol. 339
Vol. 339
Applied Mechanics and Materials
Vols. 336-338
Vols. 336-338
Applied Mechanics and Materials
Vols. 333-335
Vols. 333-335
Applied Mechanics and Materials
Vol. 332
Vol. 332
Applied Mechanics and Materials
Vol. 331
Vol. 331
Applied Mechanics and Materials
Vol. 330
Vol. 330
Applied Mechanics and Materials Vol. 340
Paper Title Page
Abstract: Safety problem has been one of the major issues in coal mining process. Therefore, a perfect mine safety monitoring system is necessary. It is one of the important aspects of a safety monitoring system how to acquire the exact position information real-timely of staff underground coal mines. To solve the problem of how to acquire of miners position, based on coal mine structure characteristics, with Zigbee technology, a kind of position system of underground coal mines is designed in the paper, and the efficiency of mine safety monitoring system can be improved greatly.
691
Abstract: On the analysis of the development situation of the ETC home and abroad, CC2431 wireless location function is used in the high speed highway ETC system to realize data transmission between network centre node and terminal node safely, Record passing information of the vehicle terminal by the wireless data transmission between the coordinator and vehicle terminal. A weighted centroid position algorithm is introduced to meet the position accuracy. The test results of the wireless communication between vehicle terminal and coordinator show that CC2431 wireless position system can realize vehicle omnibearing position and real time monitor in the super-speed highway.
696
Abstract: Abnormal event detection and automated alarm are the important tasks in visual surveillance applications. In this paper, a novel automated alarm method based on intelligent visual analysis is proposed for alarm of abandoned objects and virtual cordon protection. Firstly the monitoring regions and cordons position are set artificially in the surveillance background scenes. The forground motion regions are segmented based on background subtraction model, and then are clustered by connected component analysis. After motion region segmentation and cluster, object tracking based on discriminative appearance model for monocular multi-target tracking is utilized. According to the motion segmentation and tracking results, alarm is triggered in comparison with the monitoring regions and cordons position. Experimental results show that the proposed automated alarm algorithms are sufficient to detect the abnormal events for alarm of abandoned objects and virtual cordon protection.
701
Abstract: Internet of Things (IOT) is considered as an important part of the new generation of information technology and the problem of data security and privacy protection is a main content on the research of the information security of the IOT. It is also regarded as an important factor restricting the development of IOT. This paper presents the idea that to make an organic fusion of the technology and management to realize the data security and privacy protection of the IOT effectively by the way of combining with detailed study and understanding of advanced technical apparatus and management measures in the field of IOT research from both home and abroad, which tries to propose the perspectives and methods of building an effective integrated management model of data security and privacy protection of IOT from dual perspective of technical support and management specification.
706
Abstract: Through security protocols and virtual private network tunneling for data confidentiality, message integrity, and endpoint authentication. Users can access anywhere Internet VPN service within the group. VPN tunneling technology VPN gateway group is exposed to internal services in the Internet, malicious users are using client terminal allows officers to attack the internal services group. So we must study to the control is based on the model, combined with VPN network traffic characteristics, the topological feature model of security and safety technology and related technologies. Study on dynamic access control packet loss model in this article, you can study can greatly increase VPN security, confidentiality of data on. Due to the introduction of the concept of dynamic control, we can more accurately control the packet loss and improve system performance.
710
Abstract: With the need of fast 3D city modeling, a new UAVS (unmanned aerial vehicle system) for low altitude aerial photogrammetry is introduced, including the platform airship, sensor system four-combined wide-angle camera and 3D modelling method. Based on the test in Henan province of China with this system, it is demonstrated that this low-altitude aerial photogrammetric system can get high resolution images with multiple views. With the vector models of the buildings and texture mapping technology, it is easy to carry out 3D city modelling. This work provides a possible for fast 3D city modelling.
715
Abstract: The traffic prediction carried out in the communication enterprises is of great significance for the optimization of the network configuration and the improvement of the communication quality. To solve the inaccurate prediction problem under the actual situation, a traffic prediction method based on the bi-orthogonal multi-scale wavelet algorithm is developed. The process of the wavelet decomposition and reconstruction are studied, and the reconstruction results for the different scales wavelet are obtained. Take a set of the special actual samples as the object, the traffic prediction for the future dates is completed, and compared with the actual results. The results show that the relative error between the proposed traffic prediction model and the actual results is less than 10%. The bi-orthogonal multi-scale wavelet algorithm has some advantages as compared with other similar ones, which will provide the important technology means for the traffic prediction forecasting and assessing in the various types of communication enterprises.
722
Abstract: In order to overcome the drawbacks of Simple Genetic Algorithm such as cannot get the most optimal result, low convergence speed et al. Cellular Simple Genetic Algorithm-a new genetic algorithm based on Cellular Automata-is presented in this paper. Compared with the Simple Genetic Algorithm, the experiment results show the Cellular Simple Genetic Algorithm has remarkable advantages in following aspects: reducing the search-time and improving the precise of target function.
727
Abstract: A novel tag estimation algorithm named DFSA-MD1 is proposed, and applied to the field of tag identification that aims at decreasing tag collision number in RFID systems. The proposed algorithm regarded the tag identification process of a frame of the dynamic frame slotted ALOHA algorithm (DFSA) as an M/D/1 queuing system. The reader can estimate tag number of next frame from success slots number and collision slot number in current frame and current frame size according to M/D/1 queuing model.The experimental results show that DFSA-MD1 algorithm requires less time consumption and lower complexity for tag identificaiton and achieves the best performance of the DFSA tags identification protocols.
732
Abstract: As same as the traditional application and system software, firmware also faced the risk of malicious code like hobbyhorse, back door, logical bomb and so on. Firmware exhibited strong cohesion and hardware relativity, which make the malicious action in firmware to be different from that in the traditional software. This paper analyzed the specificities of firmware and the malicious behaviour about it, then expatiate the essence of the malicious behaviour of the firmware, and presented a firmware formal definition and detecting method which was based on the hardware resources access control policy. Experimental results proved that the method was effective to detect the malicious firmware.
737