Applied Mechanics and Materials
Vol. 442
Vol. 442
Applied Mechanics and Materials
Vol. 441
Vol. 441
Applied Mechanics and Materials
Vol. 440
Vol. 440
Applied Mechanics and Materials
Vols. 438-439
Vols. 438-439
Applied Mechanics and Materials
Vol. 437
Vol. 437
Applied Mechanics and Materials
Vol. 436
Vol. 436
Applied Mechanics and Materials
Vols. 433-435
Vols. 433-435
Applied Mechanics and Materials
Vol. 432
Vol. 432
Applied Mechanics and Materials
Vol. 431
Vol. 431
Applied Mechanics and Materials
Vol. 430
Vol. 430
Applied Mechanics and Materials
Vols. 427-429
Vols. 427-429
Applied Mechanics and Materials
Vols. 423-426
Vols. 423-426
Applied Mechanics and Materials
Vol. 422
Vol. 422
Applied Mechanics and Materials Vols. 433-435
Paper Title Page
Abstract: In-network caching is one of the key aspects of content-centric networks (CCN), while the cache replacement algorithm of LRU does not consider the relation between the cache contents and its neighbor nodes in the cache replacement process, which reduced the efficiency of the cache. In this paper, a Neighbor-Referencing Cooperative Cache Policy (NRCCP) in CCN has been proposed to check whether the neighbors have cached the content. Node will cache the content while none of its neighbors has cached it, therefore reduce redundancy of cached content and increase the variety of contents. Simulation results show that NRCCP has better performance, as the network path had more caching ability and more content popularity densely distributed.
1702
Abstract: In resent years,the data mining and analysis of the microblogging has been a hot spot with its vigorous development.In its propagation process, the users’ ranking is generally arranged in out-degree, which cannot reflect the potential forwarding possibility of micro-blogs.To solve this problem, PageRank algorithm was used to present the algorithm of microblogging propagation node influence evaluation based on user authentication,which enables us effectively predict the future ranking of users’ nodes and shows some practical value.
1709
Abstract: Filling holes in binary images is often required during medical image processing and analysis. However, traditional hole filling algorithms for medical images expose some disadvantages such as possible edge degradations and relatively low efficiency. To overcome such limits, a hole filling algorithm for binary cell images based on largest connected region extraction is proposed in this paper. Since there are less pixels for foreground areas in usual binary cell images, the holes in the binary images can be simply filled by extracting & filling the largest connected region in correspondent negative images together with a following OR operation between the obtained result image and the original binary image. Such an algorithm based on largest connected region extraction nearly has no effect on edge information of the ROI(region of interested) with high accuracy and efficiency. The final experiments show its validity and advantage over the traditional morphology methods for hole filling in binary cell images. Thus the presented method is of a considerable reference value for binary image processing.
1715
Abstract: With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.
1720
Abstract: Data cube is to improve the efficiency of an important means in data query, while the enclosed data cube used by eliminating non-enclosed data cube tuples to reduce the disk space and improve the query response time. Based on the MapReduce parallel processing technology research, the MapReduce-based closed data cube generation algorithm is proposed,which can effectively improve the closed data cube massive data generation rate. The simulation results show that the proposed MCDC algorithm in practical applications can offer conditional definition by users to build closed data cube that is needed. Parallel processing capability of distribution system has been fully developed.
1724
Abstract: AVS introduces intra-prediction coding technique to improve the intra-coding efficiency. There are 5 candidate modes for luminance intra-prediction and 4 candidate modes for chrominance. The method of intra prediction for the current video coding standard mainly uses the pixels of the left, the top, the upper right neighboring blocks, and doesnt use the pixels of the right and bottom blocks. It is not because there is low correlation between the current block and the right and bottom blocks, but the right and bottom blocks need to refer to the data of current block to decode the display. If the mode of the right block is the vertical mode, it can use the data of right block to predict the current block and a new prediction mode of mean-left-right is presented, and if the mode of the bottom block is the horizontal mode, it can use the data of bottom block to predict the current block and a new prediction mode of mean-top-bottom is presented. The corresponding adjustment is implemented for AVS encoder and decoder. Experimental results show that the PSNR increases about 0.03db and the coding bit rate decreases by about0.73% with small complexity increasing.
1730
Abstract: In the physical isolation network, users usually adopt the one-way transmission system to transmit data from low confidence network to high confidence network. But due to the one-way strictly, one-way transmission system can’t transmit the feedback message from high to low confidence network. What’s more, there are some imperfections in the SMS feedback mechanism and artificial feedback mechanism. Aiming at this issue, we put forward and introduce an improvement feedback mechanism based on the artificial feedback mechanism and the two dimensional bar code, at the same time , we illustrate the advantage of the design and implementation about our mechanism.
1736
Abstract: Using the Minifilter framework and AES group encryption algorithm, the paper develops a filter driver for encrypting the file of particular types under the security directory. The principle of the file system filter driver is discussed here, and makes a special research about the file operation process especially for word format. This paper also makes a deep analysis of transformation mechanism between the plaintext and ciphertext, and the implementation algorithms of encryption and decryption. Finally, the paper describes the method of path filtering in detail.
1742
Abstract: Activity record is an important part of the compile process. C-based storage management strategy, the system uses the Eclipse integrated environment in Windows 7 system , using the Java language to implement process activity record analysis and processing of the C language. Program can handle variables stored procedure calls and nested execution jumps, and through vector symbol table to achieve compact build management. By applying stack storage management strategies,the storage activity can be clearly demonstrated.
1747
Abstract: The Internet of Things is currently the most popular field of communication and information research directions. Their application in the amount of information involved, are extremely large amount of data. How to ensure the transmission efficiency of business information under the premise of improving networking applications data security to protect the user's privacy data will be particularly important. Paper uses a custom data packet encapsulation mechanism, reducing the overhead of data resources; another based on their cross-platform communication features, combined with secure encryption and decryption, signature and authentication algorithm, the establishment of a secure communication system of things model for the differentiation of things communications environment, providing a standard packet structure, namely smart business security IOT application Protocol intelligent Service Security Application Protocol (ISSAP).
1752