Applied Mechanics and Materials
Vol. 526
Vol. 526
Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials
Vol. 521
Vol. 521
Applied Mechanics and Materials
Vols. 519-520
Vols. 519-520
Applied Mechanics and Materials
Vol. 518
Vol. 518
Applied Mechanics and Materials
Vols. 513-517
Vols. 513-517
Applied Mechanics and Materials
Vols. 511-512
Vols. 511-512
Applied Mechanics and Materials
Vol. 510
Vol. 510
Applied Mechanics and Materials
Vol. 509
Vol. 509
Applied Mechanics and Materials
Vol. 508
Vol. 508
Applied Mechanics and Materials
Vol. 507
Vol. 507
Applied Mechanics and Materials
Vols. 505-506
Vols. 505-506
Applied Mechanics and Materials Vols. 513-517
Paper Title Page
Abstract: In order to quickly and effectively segment the video scene, a multi-modality video scene segmentation algorithm with shot force competition is proposed in this paper. This method is take full account of temporal associated co-occurrence of multimodal media data, to calculate the similarity between video shot by merging the video low-level features, then go to the video scene segmentation based on the judgment method of shot competition. The authors experiments show that the video scene can be efficiently separated by the method proposed in the paper.
514
Abstract: Beginning with the signal remote monitoring system's function structure, development process function design and so on , this paper described the remote management software design and implementation scheme of the road traffic equipment based on the Android mobile terminal. This software can realize the remote control of the traffic signal lights, condition monitoring and signal equipment management and fault alarm to remind function, reduce the maintenance management difficulty of traffic signal control equipment, and have a good application prospect.
518
Abstract: In recent years, the detection technology based on machine learning algorithms for distributed denialof-service (DDoS) attacks has made great progress. However, previous methods fail to make full use of contextual information and rely heavily on the probability distribution of the input data. To avoid those pitfalls, the Conditional Random Fields (CRF) model is introduced in this paper for DDoS attacks detection. Firstly, the CRF is trained to build the classification model for DDoS attacks based on three groups of statistical features including conditional entropy, flag ratios and protocol ratios. Then, the trained CRF models are used to identify the attacks with model inference. Experimental results demonstrate that, the proposed approach can accurately distinguish between attacks and normal network traffic, and is more robust to resist disturbance of background traffic than its counterparts.
522
Abstract: With the development of urbanization process, the city scale has become more extended. The traditional city manage method can not meet the request of the modern city management. As the "digital China" stratagem advanced, "Digital City" appeared. The" Digital City " as a symbol of the city informatization construction is quickly developing. The network infrastructure and spatial information infrastructure both are the most important infrastructure in the digital city construction, and the geo-spatial framework is an important composition part of the spatial information infrastructure and the foundation supporting platform of the economic society informatization development. The paper explores the process of construction digital city geospatial framework.
527
Abstract: In this paper, from the view of the complexity of network organization system, the preliminary research has been carried on network communication complexity system. The concept of the complexity of the network transmission system is introduced in the paper, and networks as complex system is described by the Logistic model. It is a new attempt on the research of network communication with the complexity science research methods based on foundation information science. The research contributes to methodology on the research of the evaluation on network communication effect and network communication content in the future.
530
Abstract: With the informatization development of water conservancy, the data of water conservancy increased gradually. The data of river regime comes up with the features of real-time and historicity. Therefore, the data has the character of diversity, large and abundant contents. Because of the restrict of the classic Apriori algorithm, many researchers cant meet the requirements of those large data analysis. So, this thesis explained the improvements of the classic Apriori algorithm, designed and elaborated the effectiveness of association rules in river regime resource.
535
Abstract: Variety of routing approaches are employed by global routers in the VLSI circuit designs. Rip-up and reroute, as a conveniently implemented method, is widely used in most of modern global routers. Maze algorithm is always performed iteratively as the final technique to eliminate overflow. Maze algorithm and its ramifications can obtain an optimum solution. However, it will cost much CPU time if being used impertinently. In this work, we present a global router called Bottom-Up Router (BU-Router), with an optimized maze algorithm, which is based on multi-source multi-sink maze. BU-Router processes not the nets but the segments of nets in a sequence ordered by the length. In the progress, segments will be fixed on the global route graph edge, when the edge is saturated, which is as the basis, also known as bottom. Then the edge will be set as a blockage, which wont accept path goes through it any more. This means the edge will push the possible congestion in the future. Besides this, BU-Router optimized cost function in two ways: make the function adaptive and congestion center avoidable. Additionally, a specific optimized maze algorithm is proposed for routing a long distance segment so as to reduce the run-time.
539
Abstract: The main task of the protection equipment management information system is statistical analysis, which requires presenting the analytical results in the form of reports. Therefore, the statistical analysis module of the system contains the reports of Evaluation Code with complex business logic and stable structure, as well as common analysis reports with simple business logic and flexible structure. As the growth of the business complexity and the requirements for diversification, existing reporting mode cannot adapt to the system. The reports component using B/S architecture, which adopts the independent engine mechanism, has become the developing trend of statistical reports.
545
Abstract: . With the rapid development of internet computer viruses, Trojan horses and other safety hazards already have been a serious problem which is not ignored. By analyzing the status of network security, we use data encryption technology to ensure the security of information which is already an accepted, but there are many encryption methods. How to select the appropriate method In this paper, we purpose corresponding encryption system by the current status of the network, and it prepared for select the encryption algorithm next.
549
Abstract: . Public key encryption method contrasts with traditional encryption method has the advantage of very powerful, especially in applications and network security. With the development of these years public key encryption method is a mature, open, standard security mechanism for network encryption and digital signatures. The key exchange plays an important role in cryptography. It is an important research issue that how to ensure the security of key exchange. In this paper we present a key exchange method based on multivariate public key cryptography.
552