Applied Mechanics and Materials Vols. 479-480

Paper Title Page

Abstract: Under the background of learning Bayesian network structure, we proposed a new method based on the KNN algorithm and dynamic Gibbs sampling to fill in the missing data, which is mainly used to solve the problem of how to learn the Bayesian network structure better with missing data sets. The experiments based on Asia Network show that, this method can restore the original data very well, which will make it available to use some Bayesian network structure learning algorithm only based on complete data. This method will expand the scope and improve the effect of Bayesian networks application.
906
Abstract: This thesis is to approach license-plate location using Sobel mask operator for license-plate location. This thesis consists of three main parts. The first part is to gray and HSI transform and cut image to reduce image scan time. The second part is to use Sobel edge function and use scan line scanning image to find license-plate. The third part is to locate and extract the license-plate. The last step is license plate and through 2D Haar Discrete Wavelet Transform two times, after transform only selected LL low-frequency parts and will the data arrange into a row when license plate the feature values. The experimental result can be high location rate. Hence, Sobel edge image is a good each of methods.
911
Abstract: Phishing is the malicious behavior of stealing personal information from computer users. It is a very popular account-theft-method among cyber criminals. Hence, developing a new approach to solve phishing attacks becomes an important issue. This paper proposes a router-based solution, called Shark, to phishing attacks. The router-based property allows Shark to protect a whole network without the need to install or maintain any software in any internal host. Based on the URLs collected from emails and the properties of the web pages pointed by these URLs, Shark quickly and automatically identifies phishing web pages. Experimental results demonstrate that Shark installed on a Linux edge router can accurately detect and attack phishing sites with low false positives and false negatives. And even though a false positive occurs, erroneous counterattacks do not influence the normal operations of legal web sites.
916
Abstract: We propose an automatic defense system, called Serum System, against scanning worms. The homeland security department of a country can use Serum System to protect its Internet infrastructure. When an infecting host is infecting a Serum System host, called Serum System Server (SSS), the SSS automatically replaces the shellcode inside the infecting string with its code (called serum code) and then uses the modified string (called serum string) to counterattack the infecting host and take control of it. The serum code transforms the infecting host into a Serum System Client (SSC) that has the same functions as the SSS and is immune to the same worm. Therefore, infecting hosts attacking SSSs or SSCs will transform themselves to SSCs. We implemented Serum System on Linux. Our analyses show Serum System can automatically defeat related infected hosts.
923
Abstract: In order to enhance students' learning motivation, scholars have been investigating the best teaching instruction methods for learning English. The efficacy of multimedia has drawn great attention to this issue and is presumed, under the assumption of adding an additional channel of media to transmit a message, to dramatically enhance communication and comprehension.1 Multimedia technology (such as TV, computers, networks, Youtube, E-mail, and interactive multimedia) aids the teaching technique of integrating real-life target language situations into the language classroom. In this particular setting, learners gradually develop their language skills by being exposed to genuine target language environments. Hartman indicated that the multiple-channel theory, involving at least two of the channels under consideration here, increases learners' language comprehension. 2
928
Abstract: This paper proposes a novel fuel cell system design by integrating both methods of Ziegler-Nichols-based PID control and the intelligent fuzzy control, thus the relative stability and disturbance rejection properties can be reserved. This new method is not proposed before for fuel cell control system design. By using PID method for the normal case of fuel cell current requirement, the overshoot of the temperature is 45%, the temperature rise and the settling times are 0.65 sec and 2 sec, respectively. However, by using intelligent fuzzy Ziegler-Nichols-based PID controller design, the overshoot of the temperature is 12%, the temperature rise and the settling times are 0.7 sec and 1 sec, respectively. Thus the proposed method is better. Moreover, this paper also takes the system disturbance variation effect into consideration, e.g. the current requirement is increased by 100% for climbing a slope or speed-up conditions; note a large 60% temperature overshoot is produced by using Ziegler-Nichols based PID controller. But the overshoot is only 20% by using the intelligent fuzzy Ziegler-Nichols-based PID controller. Thus the proposed system is more robust.
934
Abstract: Along with the continuous changes and improvement of information technology, remote controls are widely used in smart living, robot control, Sign language systems, and so on. However, the human-computer communication needs to be diversified in the future. In particular, users are not intuitive when applying a special application or remote control environment, thus, this study applying Nintendo Wii remote as a human-computer interface device, to capture motion data by built-in three-axis accelerometer sensor, and training and recognize with Hidden Markov Model. First, we apply a gesture recognize system, to enhance the interactive ability of three-axis accelerometer sensor, gesture commands are trainable by user on-demand, and users can interactive with different computer applications through the gesture command has been trained. Finally, this study had issued a Gesture Recognition approach for intelligent interactive system design and for future study.
938
Abstract: Optical music recognition (OMR) is attracted a lot attention on different music notation system which could be so focused on Back’s C-Clefs; in contrast, it could handle complete modern music symbols. One of notation system, numbered music notation, which is literally call “simplified notation”, is popular in many Asia countries. There is a traditional Chinese hymnbook, which usually used in small group of worship, in which one page has several hymns. We propose algorithms for the recognition of those notations in camera images of the hymn, which could effectively identify score zone and lyric zone, segment notation image, classify music notation, and reconstruct scores from classified notation by their coordinates and neighborhood relationship. Those algorithms comprise the preliminary demo system by which we provide a solution for music information retrieval and reconstruction.
943
Abstract: In this paper, we propose a novel three-dimensional (3D) color image encryption scheme based on computational integral imaging (CII) and Arnold transform technique. An elemental image array (EIA) is firstly captured by recording the light rays emanating from 3D image through a lenslet array. Then, the captured color EIA is decomposed into three independent channels: red, green and blue, and each channel is encrypted by Arnold transform. In the reconstruction process, the pseudo-inverse filter is used to improve quality of the reconstructed 3D color image in CII system. Numerical simulations have been done to prove the validity and the security of the proposed 3D color image encryption method.
948
Abstract: Since the Internet will migrating from IPv4 to IPv6 in the near future. There are many test methods to validate the IPv6 operation environment. Today, most of the IPv6 SNMPv3 test bed is both expensive and location restricted. This paper proposes an improved test method that can provide cloud-based service for the validation of IPv6 SNMPv3 agent. The proposed test architecture consists of two elements: Test broker and Test engine. Test broker as a negotiator between SNMPv3 agent, while Test engine is commissioned to create and manage test operations. Also, Test engine is delegated to perform test methodology on the SNMPv3 agent with IPv6 capabilities. This test service can be used anytime and anywhere to verify the selected IPv6 SNMPv3 agent no matter where it is located in the IPv6 world.
953

Showing 171 to 180 of 229 Paper Titles