Applied Mechanics and Materials Vols. 496-500

Paper Title Page

Abstract: In this paper, we study the Schur factoization for unitary extended matrices: The formula for the Schur-type factorization is obtained, and the relationship of the unitary extended matrix with mother matrix is also obtained.
2233
Abstract: Most of the methods need to build a sophisticated classifier to detect the image tamper which leads the lower detection efficiency. For this problem, we propose a method based on artifacts detection techniques in the process produces of CFA, which includes one based on CFA pattern number estimation and the other noise analysis based on CFA. The techniques are based on computing a single feature and a simple threshold based on classifier, determine whether the mosaic artifacts of the CFA was changed. The experimental results show that, the proposed approach has higher performance.
2237
Abstract: The automatic seamless image stitching technology is a new problem in the field of computer vision and pattern recognition. This paper brings forward a new seamless image stitching algorithm based on the mutual correlation which combines the least absolute value method with the gray value information. The gray characteristic value on the image edge is obtained and the minimum of correlation function is regarded as the matching points to realize image stitching, the effect of which in computer simulation is good.
2241
Abstract: The database application system (DBAS) is widely used in diverse domains, and plays an extremely important role. However, the growth of organizations invariably leads to creation of multiple heterogeneous DBAS. How to effectively integrate these heterogeneous systems has become a hot spot of integration field. The existing integrated methods are mainly aimed at the layer of database system. For the shortages of those methods, this paper mainly focus on the integration method at the layer of application. This paper analyses DBAS from a new perspective, in which an access control layer is separated from the application layer. A new method called as "invasion" access control is put forward, and a simplified integration method (SIM) of heterogeneous DBAS is put forward based on the access control method. The SIM method provides a fast integration solution of high utilization and simple for heterogeneous DBAS. Finally, an example shows how to apply the SIM method to achieve the integration of heterogeneous DBAS.
2246
Abstract: EEG is a complex signal source, feature extraction and classification algorithm was studied for the brain electrical signal is also a key point in the research of brain waves, information granule clustering algorithm is one of the main idea, at the same time, the partial least square method is an effective method of dimension reduction, this paper, the use of information granule and partial least squares analysis of visual evoked potential EEG signals, the results show that this method can effectively extract the characteristics.
2256
Abstract: With the rapid updating of information technology, modern distance education network teaching is an important tool for development. In this paper, individualized instruction, constructivist teaching theory, based on the data mining technology and network technology into teaching system design and implementation of personalized navigation, it can according to each student's level of education, learning requirements and learning ability its own characteristics, to fully tap the potential information on the different types of learners access path Apriori algorithm to generate the largest set of items, according to the maximum recommended set of items to the learners for learning knowledge points. So that learners receive personalized education.
2260
Abstract: In this paper, the actual situation of university management and the specific needs of colleges and universities to study and design a set of management information systems. Management information so that the original approach gradually to computers and computer networks as the carrier of the campus electronic information processing and transmission replaced, through the network, the use of multimedia and communication technologies for remote teaching, faculty achieve complementarity. Achieve scientific management, modernization; use of modern means to improve the quality of teaching and management level
2265
Abstract: Bose-Chaudhuri-Hocquenghen (BCH) error-correcting codes are now widely used in communication system and digital technology. The original iterative method is complex and time-consuming operations. An inversion less decoding method for binary BCH codes was proposed to simplify the Berlekamp-Massey algorithm, which can eliminate the bottleneck in long BCH decoder. For our considered parallel decoder architecture, the simplicity of this new method makes a simplified VLSI implementation possible.
2269
Abstract: Because the Excel file is often edited, the data blocks stored in the hard disk which make up the Excel file is often not continuous. Discontinuous storage fragmented files, deleted or formatted, with the current data recovery software to restore the effect is very poor, often file recovery, but can not open or is garbled. Therefore it makes sense to study an effective recovery method to recover Excel fragmented files. Based on "Laura" file format, first introduced the Windows platform fragmented files, and then given an Excel file fragmentation recognition method, final based on debris identify given Excel file fragmentation restructuring.
2274
Abstract: In this paper, communication control principle and protocol for bill acceptor are discussed. Constitutes and functions of Javax.comm API are introduced. With Java serial communication technology , communication control for bill acceptor is realized on different OS platformWindows and Linux.
2279

Showing 491 to 500 of 661 Paper Titles