Applied Mechanics and Materials Vols. 496-500

Paper Title Page

Abstract: Nowadays EEG-based identification biometric research becomes a new topic. Due to the current biometric technology are still exist some problems, therefore, an urgent needed is to find a new biometric technology. In this paper, we use EEG signals as biometrics, which is home to a new biometric research trends, cutting-edge and exploratory nature, there is a good prospect. We establish a set of EEG-based identification systems and medium-sized EEG signatures, explore effective methods of analysis biometric technology to make up for past deficiencies, to further improve and develop the theory of biometric technologies and applications for EEG-based identification technology promotion foundation.
1975
Abstract: Tolerance granule principleis a variant of information granule, has been successfully used in many fields,this paper use of tolerance analysis of EEG signals, tolerance with thecharacteristics of information solve the classification problem of EEG signals,the analysis of EEG signals shows that the use of this principle can be a verygood solve the problem of classification
1979
Abstract: EEG is a complex signal source, feature extraction and classification algorithm was studied for the brain electrical signal is also a key point in the research of brain waves, information granule clustering algorithm is one of the main idea, at the same time, the partial least square method is an effective method of dimension reduction, this paper, the use of information granule and partial least squares analysis of visual evoked potential EEG signals, the results show that this method can effectively extract the characteristics.
1982
Abstract: In order to solve the security problem of the multimedia in the communication process, steganography plays a vital role. In this paper, the DCT domain of digital image steganography is to study the impact of image quality with different embedding positions, the secret information in the DCT domain of an image, different carrier images and the amount of information. Studies show that: embedding the information in the low frequency part of the image, selecting the image with the rich distribution pixel value, is conducive to improve the steganography effects of the information in the image, enhance the concealment of the secret information.
1986
Abstract: In the various colleges and universities of China, university computer foundation course will be offered to the freshman of all majors. In order to combine the needs of the development of computer application domain, the author carried out reform and practice on university computer foundation course. The reform and practice Include faculty construction, the construction of teaching materials, the innovating in teaching mode and methods, the reform of teaching methods and means, the reform of assessment methods, network teaching resources development and other aspects. Through a variety of ways of learning, students can more easily grasp the necessary basic computer knowledge, be equipped with strong computer practice ability to meet requirements for computer operation in learning, work and daily life in the future.
1991
Abstract: To overcome disadvantages of traditional detection methods of wood flour mesh number, a mesh number recognition algorithm based on external rectangle fitting and morphological characteristics has been studied. It makes use of minimum external rectangle with the boundary points obtained by the preprocessing of microscopic images. The external rectangles length is calculated when the area is the smallest. The experimental results demonstrate that the proposed algorithm has a good fitting accuracy and meets producing demands.
1995
Abstract: With the analysis of working frequency, wireless transmission technology, antenna design and anti-jamming technology, this paper give a set of complete and feasible secure communication solution of Space Wireless Sensor Network (SWSN). The solution makes space high-speed nodes interactive information safely and efficiently, and all kinds of information in accordance with the provisions of the message format will be exchange automatically, confidentially. The experiments validate the effectiveness of the solution.
1999
Abstract: The concept of Cloud Computing dates from the 1960s, when computer scientist John McCarthy proposed the idea of computation being delivered as a public utility. Infrastructure as a Service is one of the most important modules of Cloud Computing. In this paper, we propose a hierarchical and architecture of Cloud Computing Infrastructure as a Service frameworks. Our hierarchical and architecture consists of five main layers: resource layer, service layer, middleware layer, management layer, control layer. We study various Cloud Computing systems. Then we provide a Cloud Computing Infrastructure as a Service architectural framework that bases on the hierarchical architecture. Finally, we introduce a detailed description of each layer and define dependencies between the layers and components.
2003
Abstract: The paper proposes a new network selection procedure using access networks consent. The proposed mechanism supports WLAN, WIMAX and 3G networks. Using mobility prediction model coupled with GIS information system the access networks at future location of mobile terminal. Using pre handover mechanisms with EAP HO NS and AAA extensions proposed in this paper the home access networks negotiate with visiting access networks and networks entities to allocate and reserve resources for accommodating mobile terminals enabling the solution proposed is efficient. Using these mechanisms the mobile terminal mobility can be handled efficiently in any access networks. The proposed solution addresses all the issues that are raised by network selection procedures. As a part of our future work we are coupling this mechanism with security, mobility and handover management procedures to control and provide seamless handover during roaming.
2007
Abstract: In this paper, we study the Schur factorization of a special class of centrosymmetric matrices: the central extended matrix which is not only a centrosymmetric matrix but also a row extended matrix. The formula for the Schur-type factorization is obtained, and the relationship of the central extended matrix with mother matrix is also obtained.
2011

Showing 431 to 440 of 661 Paper Titles