Applied Mechanics and Materials
Vol. 510
Vol. 510
Applied Mechanics and Materials
Vol. 509
Vol. 509
Applied Mechanics and Materials
Vol. 508
Vol. 508
Applied Mechanics and Materials
Vol. 507
Vol. 507
Applied Mechanics and Materials
Vols. 505-506
Vols. 505-506
Applied Mechanics and Materials
Vols. 501-504
Vols. 501-504
Applied Mechanics and Materials
Vols. 496-500
Vols. 496-500
Applied Mechanics and Materials
Vols. 494-495
Vols. 494-495
Applied Mechanics and Materials
Vol. 493
Vol. 493
Applied Mechanics and Materials
Vol. 492
Vol. 492
Applied Mechanics and Materials
Vols. 490-491
Vols. 490-491
Applied Mechanics and Materials
Vols. 488-489
Vols. 488-489
Applied Mechanics and Materials
Vol. 487
Vol. 487
Applied Mechanics and Materials Vols. 496-500
Paper Title Page
Abstract: In this paper, we study the Schur factoization for unitary extended matrices: The formula for the Schur-type factorization is obtained, and the relationship of the unitary extended matrix with mother matrix is also obtained.
2233
Abstract: Most of the methods need to build a sophisticated classifier to detect the image tamper which leads the lower detection efficiency. For this problem, we propose a method based on artifacts detection techniques in the process produces of CFA, which includes one based on CFA pattern number estimation and the other noise analysis based on CFA. The techniques are based on computing a single feature and a simple threshold based on classifier, determine whether the mosaic artifacts of the CFA was changed. The experimental results show that, the proposed approach has higher performance.
2237
Abstract: The automatic seamless image stitching technology is a new problem in the field of computer vision and pattern recognition. This paper brings forward a new seamless image stitching algorithm based on the mutual correlation which combines the least absolute value method with the gray value information. The gray characteristic value on the image edge is obtained and the minimum of correlation function is regarded as the matching points to realize image stitching, the effect of which in computer simulation is good.
2241
Abstract: The database application system (DBAS) is widely used in diverse domains, and plays an extremely important role. However, the growth of organizations invariably leads to creation of multiple heterogeneous DBAS. How to effectively integrate these heterogeneous systems has become a hot spot of integration field. The existing integrated methods are mainly aimed at the layer of database system. For the shortages of those methods, this paper mainly focus on the integration method at the layer of application. This paper analyses DBAS from a new perspective, in which an access control layer is separated from the application layer. A new method called as "invasion" access control is put forward, and a simplified integration method (SIM) of heterogeneous DBAS is put forward based on the access control method. The SIM method provides a fast integration solution of high utilization and simple for heterogeneous DBAS. Finally, an example shows how to apply the SIM method to achieve the integration of heterogeneous DBAS.
2246
Abstract: EEG is a complex signal source, feature extraction and classification algorithm was studied for the brain electrical signal is also a key point in the research of brain waves, information granule clustering algorithm is one of the main idea, at the same time, the partial least square method is an effective method of dimension reduction, this paper, the use of information granule and partial least squares analysis of visual evoked potential EEG signals, the results show that this method can effectively extract the characteristics.
2256
Abstract: With the rapid updating of information technology, modern distance education network teaching is an important tool for development. In this paper, individualized instruction, constructivist teaching theory, based on the data mining technology and network technology into teaching system design and implementation of personalized navigation, it can according to each student's level of education, learning requirements and learning ability its own characteristics, to fully tap the potential information on the different types of learners access path Apriori algorithm to generate the largest set of items, according to the maximum recommended set of items to the learners for learning knowledge points. So that learners receive personalized education.
2260
Abstract: In this paper, the actual situation of university management and the specific needs of colleges and universities to study and design a set of management information systems. Management information so that the original approach gradually to computers and computer networks as the carrier of the campus electronic information processing and transmission replaced, through the network, the use of multimedia and communication technologies for remote teaching, faculty achieve complementarity. Achieve scientific management, modernization; use of modern means to improve the quality of teaching and management level
2265
Abstract: Bose-Chaudhuri-Hocquenghen (BCH) error-correcting codes are now widely used in communication system and digital technology. The original iterative method is complex and time-consuming operations. An inversion less decoding method for binary BCH codes was proposed to simplify the Berlekamp-Massey algorithm, which can eliminate the bottleneck in long BCH decoder. For our considered parallel decoder architecture, the simplicity of this new method makes a simplified VLSI implementation possible.
2269
Abstract: Because the Excel file is often edited, the data blocks stored in the hard disk which make up the Excel file is often not continuous. Discontinuous storage fragmented files, deleted or formatted, with the current data recovery software to restore the effect is very poor, often file recovery, but can not open or is garbled. Therefore it makes sense to study an effective recovery method to recover Excel fragmented files. Based on "Laura" file format, first introduced the Windows platform fragmented files, and then given an Excel file fragmentation recognition method, final based on debris identify given Excel file fragmentation restructuring.
2274
Abstract: In this paper, communication control principle and protocol for bill acceptor are discussed. Constitutes and functions of Javax.comm API are introduced. With Java serial communication technology , communication control for bill acceptor is realized on different OS platformWindows and Linux.
2279