Applied Mechanics and Materials Vols. 513-517

Paper Title Page

Abstract: Iris Feature Extraction Algorithm Evaluation is an important link of evaluation on iris identification system. For the need of optimal feature extraction algorithm according to the identification, this thesis provides a evaluation scheme based on the fuzzy clustering model, and builds a relevant evaluation model, which proves to make a scientific evaluation on the algorithm in the phase of feature extraction.
555
Abstract: Starting from the goal to overcome the limitation of the single type algorithm of iris recognition. In this paper, a two-step iris recognition algorithm is proposed based on feature extraction on corner and Gabor transform .First of all, it uses the corner feature of iris texture to recognize for achieving the purpose of removal of alien and confirm the vast majority of similar samples rapidly; if it unabes to determine the category in the first step, the result of the first step is used as the initial angle in normalized phase, and then it carries out iris feature extraction and recognition based on Gabor transform. The experimental results show that this results the speed and performance in the recognition improved significantly than the traditional algorithm of single feature recognition.
559
Abstract: In order to provide better service for readers of university library, a new calculation model -- Cloud Computing will be needed. It puts all the information on the server, then computed on the server rather than the client. And after the calculation, the results will be delivered to the client. An architecture digital library which based on Cloud Computing, called "Cloud Library". University Library which In the environment of Cloud Computing, is an Information service that based on the network.It should be drawn in the application system. Libraries provide information services for users by using the network. That is the Cloud Library should be the existence of a network,it becomes a large-scale database existed on the network,and other applications can seamless integration of library information [1].
563
Abstract: It has been known that an interconnection network can be modeled by a connected graph whose vertices represent sites of the network and whose edges represent physical communication links. Being the underlying theory of network, graph theory can be used to investigate network issues. In this paper we consider two parameters of graph: the domination number and bondage number b (G). These parameters measure to some extent the robustness of an interconnection network with respect to link failures. By constructing a family of minimum dominating sets we calculate the domination number and bondage number of graph G2.
566
Abstract: The main method of Infrared and TV image fusion is based on image transform and fusion rule selection. The study implies that the information quantity of Infrared and TV image has significant effect on the result of fusion. This paper proposes one fusion algorithm of infrared and TV image based on image quality evaluation method. The basic idea of the algorithm is that the whole image or the image areas which contains better quantity of information play a leading role in the fusion process. Firstly, algorithm performs the global quality evaluation of infrared image and TV image, and then selects the corresponding fusion strategy according to the quantity of information. The source image has been divided into the high frequency coefficients and low-frequency coefficients using wavelet transform. Second, algorithm selects the rule of coefficients fusion based on the relative image quality of local regions of the image. The algorithm of this paper avoids the interference of low quality image, makes full use of the area of higher information content and achieves the favorable consistency of the fused image. Experiments demonstrate the effectiveness of the algorithm.
570
Abstract: Due to the great progress of computer technology and mature development of network, more and more data are generated and distributed through the network, which is called data streams. During the last couple of years, a number of researchers have paid their attention to data stream management, which is different from the conventional database management. At present, the new type of data management system, called data stream management system (DSMS), has become one of the most popular research areas in data engineering field. Lots of research projects have made great progress in this area. Since the current DSMS does not support queries on sequence data, this paper, we will focus on multi-attribute streams, such as video films. We will discuss the related issues such as how to build an efficient index for all queries of different streams and the corresponding query processing mechanisms.
575
Abstract: A novel DDoS detection approach based on Cellular Neural Network (CNN) model in cloud computing is proposed in this paper. Cloud computing is a new generation of computation and information platform, which faces many security issues owing to the characteristics such as widely distributed and heterogeneous environment, voluminous, noisy and volatile data, difficulty in communication, changing attack patterns. CNN is an artificial neural network which features a multi-dimensional array of neurons and local interconnections among cells and CNN can be used to solve the cloud security difficulties according to the nature of non-linear and dynamic. RPLA and Tabu optimized algorithm is employed to learn the CNN classifier templates and bias for DDoS intrusion detection in cloud computing. Experiments on DDoS attacks detection show that whether RPLA-CNN or Tabu-CNN models are effective for DDoS Attacks detection. Results show that CNN model for DDoS attacks detection in cloud computing exhibits an excellent performance with the higher attack detection rate with lower false positive rate.
579
Abstract: Kalman filtering is used to restrain the influence of environmental disturbance to the initial alignment precision. Meanwhile, rotating modulation is utilized to reduce the influence of peg-top excursion and accelerometer zero deflection. The theoretical analysis and test data demonstrate that the proposed algorithm can improve the alignment precision by the combination of the two methods.
585
Abstract: With the rapid development of information, many universities have made great achievements in the construction of hardware and software, but there are still some problems,such as act of somebody own free will, repeated constructions, low utilization rate of equipment, poor sharing of resources and so on, resulting in a serious waste of resource.In this paper,we use the VMware vCloud and vSphere cloud infrastructure platform of VMware.CO to arrange VMware view,accomplish integration of server resources,dynamic allocation,the balance of loading,and improve the utilization rate of equipment,which is useful for IT management of universities and desktop management centralized and automation.
589
Abstract: It is indispensable and effective to utilize automatic software test method to verify the steady operations and stable performance of scanning procedures for CTs system. Directing at the problems which are encountered during the progress of the automatic test program development, In this paper, we discuss how to deal with such problems as windows blocking, identify control, one click start up to make sure the manual automatic test code explored via the Coded UI is useful and robust. It is the final targets too realize the stable operations of multiple CT scanning procedures.
593

Showing 131 to 140 of 1031 Paper Titles