Applied Mechanics and Materials Vols. 58-60

Paper Title Page

Abstract: By a transfer matrix-Newmark formulation iteration method, shock response analysis in time domain was performed for a propulsion shaft subjected to base-transferred shock excitations. In order to eliminate the numerical instability of TMT, the transfer vector is used, instead of the traditional one. Influences of gyroscopic effect and initial stress on response were investigated. Main conclusions are that gyroscopic effect has no obvious effect on shock response. Initial stress increases the total shock response, but the total response isn’t equal to the absolute sum of initial stress and shock excitations acting alone. Both ends of the shaft, that are propeller and thrust bearing locations, are weaker to bear shock excitations. Maximum amplitude of response occurs at the propeller location.
2534
Abstract: The paper aims to develop a risk assessment model with the fuzzy temporal information. The traditional model assess risk with the risk matrix method. And the method rank the risks without regard to the with the temporal information to assess the risk. The model integrates the method of 2-tuple linguistic and temporal linguistic variable. The improved concept defines the transition symbols operator as the projection of temporal term on the fuzzy linguistic variable. The new model may deal with the temporal information in the fuzzy linguistic judgements. The emprical research give a example by applying the new method. The result of example show that the new model can provide the worthwhile temporal information in the assessment result. temporal element temporal element temporal element temporal element
2540
Abstract: Most of the traditional block-matching algorithms for motion estimation (ME) can only yield local optimal motion vectors (MVs). In this paper, the autoregressive moving average process (ARMA) model is selected to formulate the correlation of neighboring blocks in a frame, and the adaptive Kalman filtering algorithm is applied to refine the MVs. The horizontal and vertical ARMA models are constructed to utilize the filtering algorithm twice to get a better performance. Our method can also be extended to realize disparity estimation (DE) in order to apply it in a multi-view video coding (MVC) system. The experiment results show the effectiveness of our method to improve the accuracy of conventional fast block matching algorithms.
2546
Abstract: Rather than based on the stereo vision principle and the relationship between the camera position and the video scene objects used in most of current 2D-to-3D video conversion algorithms, a new prediction method of video depth information based on video frame differences is proposed and implemented on an embedded platform in this paper. 3D stereoscopic video sequences are generated by using the original 2D video sequences and the depth information. The theoretical analysis and experimental results have showed that the proposed method is more feasible and efficiency compared with the current algorithms.
2552
Abstract: Automatic seal imprint identification system is highly demanded in oriental countries. Even though several seal identification techniques have been proposed, it is seldom to find the papers on the recovery of lost seal imprint strokes caused by superimposition. In this paper, a new seal verification for Chinese color seal is proposed. This approach segments the seal imprint from the input image in terms of the adaptive thresholds. The lost seal imprint strokes are recovered based on the text stroke width that can be detected automatically. In addition, the moment-based seal verification is to compare the reference seal imprint and the recovered one. Experimental results show that the proposed method is able to correctly and efficiently verify the genuine and forgery seal imprint.
2558
Abstract: Coal mine safety production is of great significance in China. Modern information management and network technology are used to establish a coal-based early warning emergency command information system. The system provides a fast and effective digital platform for the mine safety management and emergency response decision-making. The system's functional framework, operation process and some key algorithm of the system were introduced in the paper. The technology of System construction has also been mentioned.
2564
Abstract: With the development of information processing technology, 2-D DCT has been used more and more widely. But the 2-D DCT is accomplished by computing twice 1-D DCT successively, and cannot embody the total space characteristic of 2-D transform well. To overcome such drawbacks, the paper has broken the traditional thinking of DCT operation, and proposed 2-D SDCT operation method. First, some new 2-D matrix operation principles are defined. Then, the transform basic matrix used for 2-D SDCT operation was build and the operation principle of 2-D SDCT is described in detail. Finally, the performance of 2-D SDCT was described systematically. The theoretical analysis shows that the proposed method makes 2-D DCT succinct to express, easy to comprehend and convenient to operate.
2570
Abstract: For the lack of unified professional networks topology presentation system, the whole network topology of network units can not be presented in a system based on business type, and resource levels by now. In this article we design a topology graphical presentation system for the whole network businesses. The architecture and the detail functions of the system are elaborated also. For the complete information the system needs may not be access in short time, we also design the process of the system construction.
2576
Abstract: Circuit optimization method should include the topology of automatic design circuit and automatically determine components parameters of the circuit. At present, CAD or EDA optimization tools is produced by combined optimization algorithm and the basic analysis above together with the tolerance analysis. In this paper, optimization design which can modular basic analog circuit by using Optimizer, which makes the circuit topology structure and component parameters tend to be more reasonable, provides the basis for teaching practice and scientific research. It has practical significance.
2581
Abstract: The amount of intrusion detection calculation based on software is heavy, which can not satisfy the needs of modern network bandwidth; the intrusion detection technology based on hardware is an ideal method for accelerating network processing. The thesis proposes a design scheme for FPGA-based real time intrusion detection NIC, and introduces the hardware and software structure of the system n details. The system communicates with the operation system directly via PCI bus, achieves the organic combination of software detection and hardware detection, and overcomes the slow response speed of the system when only software is used for intrusion detection. In system hardware detection, with FPGA as core, arranging various intrusion detection algorithms in FPGA for parallel running can improve the real time and reliability of the system.
2585

Showing 441 to 450 of 468 Paper Titles