Applied Mechanics and Materials Vols. 484-485

Paper Title Page

Abstract: The design and implement of remote data acquisition system based on ARM-Linux ARM and embedded Linux was introduced in this paper. Except the introduction of its structure, the implementation process of A/D driver and the web server BOA in the software design process was also emphasized in this paper to achieve remote access A/D data change.
963
Abstract: This paper analyzes the C/S structure and B/S structure of their own characteristics, building energy decision support system based on network technology, elaborated Web GIS and database connections and other technical principles and applications. Mixed B/S structure mode development to achieve information management, energy consumption is forecast to show the query using the amount of energy, energy supply and demand dynamic equilibrium analysis and other functions, with simple, efficient, easy to operate and so on, and has good scalability and maintainability.
967
Abstract: This paper presents a video motion object segmentation method based on area selection. This method uses a simple and practical space first region segmentation method, it through the motion information and space-time energy model to multiple choice of area, at last, the accurate segmentation object can be obtained throuth some post-processing technology. Experiments prove that this algorithm has good robustness.
972
Abstract: Aiming at solving the blind estimation problem of dispreading spectrum sequence under low SNR, a spread-spectrum estimation algorithm based subspace tracking is studied in this paper. This method avoids the direct eigen decomposition, using the sliding window technique to obtain the code synchronization, then use segmentation subspace tracking method estimate spreading sequence and splice in a certain order to achieve pseudo-code blind estimation. The results show that the algorithm can complete the accurate estimation of PN code sequence in low SNR conditions, reduce the amount of data storage and be easy hardware implementation
976
Abstract: The optimal path algorithm analysis of GPS navigation in taxi management system based on A* algorithm was introduced in this paper. Through improving the traditional Dijkstra algorithm and avoiding problems such as time-consuming and low efficiency in Dijkstra algorithm with traversal search for each node, A* algorithm could help the taxi find the optimal path and bring convenience for traffic management.
982
Abstract: The cloud computing offers dynamically scalable online resources provisioned as a service over the Internet cheaply. However, the security challenges it poses are equally striking. The reliable user authentication techniques are required to combat the rising security threat in cloud communications. Due to the non-denial requirements of remote user authentication scheme, it is most commonly achieved using some form of biometrics-based method. Fingerprint authentication is one of the popular and effective approaches to allow the only authorized users to access the cryptographic keys. While the critical issue in remote biometric cryptosystem is to protect the template of a user stored in a database. The biometric template is not secure and the stolen templates cannot be revoked, which is easy to leak user identity information. To overcome these shortcomings, in this paper, an indirect fingerprint authentication scheme is proposed. Further, we apply this secure scheme to the cloud system combing with PKI mechanism. At last, a comprehensive and detailed security analysis of the proposed scheme in cloud computing is provided.
986
Abstract: A core characteristics based human face recognition method under the condition of illumination is proposed according to the problem of the sharply declining human face recognition rate under the condition of light. With this method, if human face image is affected by light and the illumination is forward or side can be judged; the images affect by illumination are processed using the strategy of frequency domain replacement, and then the key areas of human face image are divided and then are recognized using support vector machine (SVM) based on the unit of area, and finally the recognition results are integrated. The experimental result shows that this method can produce a better recognition effect than other methods in view of the problem of illumination.
991
Abstract: Due to the uncertainty of the factors that influence the network service time and other characters of college student, Bayesian Network is used to model this kind of system. Different algorithms are used for learning Bayesian Networks in order to compare several models. It is suggested that researchers can use Bayesian Networks to explore the potential relationship between variables of complex social problems. The result indicates that learning target and family closeness degree are the key variables which influenced college students network service time. Origin of student and family economy didnt influence college students network service time directly. Schools and community should strengthen the education of college students life planning and communication with parents.
996
Abstract: We propose a binarization method based pigment in the ZIP code of 24 bmp image simulation and digital identification by CCD sensors, were extracted the grid binary image of zip code box and message of the two characters binary image; analyze the image processing, which includes code frame edge detection and separation of the image binarization, denoising smoothing, tilt correction, the extraction code number, position, normalization processing, digital image thinning , character recognition feature extraction. Through testing, the recognition rate of this method can be over 90%. The recognition time of characters for character is less than 1.3 second, which means the method is of more effective recognition ability and can better satisfy the real system requirements.
1001
Abstract: This paper defines the components of component assembly from the selection and instantiation of component, defines the component connection from the component interface, and defines the component assembly from the component event mechanism and the deployment based on the container, flexibly using component assembly operational characters in component assembly, so as to put forward the component assembly frame based on XCM. The assembly frame provides the unified description mechanism for component assembly, thus effectively solving the interaction problem in the component assembly process.
1006

Showing 201 to 210 of 235 Paper Titles