Applied Mechanics and Materials Vols. 672-674

Paper Title Page

Abstract: Wavelet analysis method is a promising tool for analysis of gamma-ray spectra due to its time-frequency localization ability and multi-scale resolution feature. This paper describes a method to locate peaks in gamma-ray spectra based on continuous wavelet transform (CWT) of the spectrum using Marr wavelet. The theoretical basis of using Marr wavelet to detect Gaussian peaks was explained. A scale range, 1 to FWHMmax+2, was then suggested to perform CWT. Several novel criteria were used to discriminate real peaks from noise. The detection ability of this method was verified with some measured spectra. The results indicated that Marr wavelet did well in locating gamma-ray peaks.
1911
Abstract: Aiming at the phenomenon of coverage holes because of energy depletion and random nodes deployment in wireless sensor networks (WSN), a principle for hole coverage was proposed. Based on the triangular geometry knowledge, firstly, determined the optimal patching station in basis of the benchmark-intersection, and then active inactive nodes to patch the hole. The simulation experiments demonstrate that this algorithm makes full of energy resources in the premise of complete coverage to patch coverage hole, and has a better performance in the number of the mobile nodes、resource utilization rate and algorithm running time efficiency compared with the existing DACHP and PATT algorithm.
1920
Abstract: Anomalous access control policy on firewall reduces the efficiency of the equipment, thus affecting the overall security of the network. This paper introduces an improved method of firewall policy anomaly detection based on decision tree, by transforming all the firewall access control rules into a decision tree to store the information in a tree data structure, each rule corresponds to the only one path of the tree. The experiment results show that this method solves some shortcomings in the existing decision tree based firewall policy anomaly detection methods, avoids spending time on comparison of rules whose attribute domains are uncorrelated and traversal comparison of all rules, reduces its running time and improves the efficiency of anomaly detection.
1925
Abstract: Occlusion is a difficult problem to be solved in the process of target tracking. In order to solve the problem of occlusion, a new tracking method combined with trajectory prediction and multi-block matching is presented and studied,and a mathematical model of trajectory prediction of moving target is established in polar coordinates and verified through some experiments. The experimental results show that the new tracking method can be better to trace and forecast the moving target under occlusion.
1931
Abstract: About the Katona-Kierstead definition of a Hamiltonian cycles in a uniform hypergraph, a decomposition of complete k-uniform hypergraph Kn(k) into Hamiltonian cycles studied by Bailey-Stevens and Meszka-Rosa. For n≡2,4,5 (mod 6), we design algorithm for decomposing the complete 3-uniform hypergraphs into Hamiltonian cycles by using the method of edge-partition. A decomposition of Kn(3) into 5-cycles has been presented for all admissible n≤17, and for all n=4m +1, m is a positive integer. In general, the existence of a decomposition into 5-cycles remains open. In this paper, we use the method of edge-partition and cycle sequence proposed by Jirimutu and Wang. We find a decomposition of K20(3) into 5-cycles.
1935
Abstract: In order to achieve lower limb gait rehabilitation of patients, the normal walking gait trajectory was analyzed fully. According to the analysis results, a health hip and knee gait trajectory planning method was presented. The computer data analysis results show that the gait trajectory analytical expressions proposed can represent a normal gait accurately.
1940
Abstract: The complementary characteristics of Worldwide Interoperability for Microwave Access (WiMAX) and IEEE 802.11 Wireless Local Area Network (WLAN) networks make them attractive for integration to offer the best of both technologies. However, in order to make the integration effective, the in-depth mobility study by simulation is necessary. This paper addresses the simulation models for mobility management procedures in an interworking of WiMAX and WLAN network for the various integration scenarios. The mobile multihomed node models of WiMAX and WLAN interfaces are developed and simulated in various traffic environments and network integration topologies including group mobility and MANET. The simulation results show that the developed models are useful for mobility studies in various integration wireless networks.
1944
Abstract: In wireless sensor networks, raw data is just collected and stored as binary value in the relation databases. In the Internet of Things (IoT), it requires machine to understand these multi-sources heterogeneous data’s meanings in specific environment and the interoperable service to share these with other different machines. In order to address these issues, construction of content-aware model based on multi-sources heterogeneous data is necessary to be proposed in the paper, we discussed the IoT theory, new features and problems of the IoT data and based on semantic technology, we put forward the method of content-aware construction based on multi-sources heterogeneous data sensed in the IoT and explained in detail all parts of it. Finally, an experimental simulation platform was given to demonstrate the feasibility and validity of this method.
1949
Abstract: Image fusion algorithm is very important in image fusion process. Image fusion algorithm based on pyramid decomposition was reviewed in this paper. Pyramid decomposition algorithm mainly includes Contrast pyramid, Gradient Pyramid, Laplacian Pyramid and Ratio Pyramid. The fusion algorithms based on pyramid decomposition were respectively applied in multi-focus images, advantage and disadvantage were summarized and application was given. Fusion results were given by MATLAB simulation. Objective evaluation index including of mean, standard deviation, entropy and average gradient was calculated in this paper. Image fusion algorithm should be selected according to the information extracted and the aim of fusion.
1954
Abstract: The fluctuation of pork price has been the center of attention among residents in both suburban and urban Beijing. This study is based upon building a monitoring and early-warning system of pork market in Beijing, and is conducted through the following three aspects: (1) Study of the risk factors of the price fluctuations in Beijing pork market. The study will determine what the “risk factors” for the fluctuations are, through looking into the price fluctuations pattern within the past twenty years in Beijing’s pork market, as well as the influential factors for the pattern in both short term and long term. (2) Gathering multi-source data of pork supply and demand, and study of the integration technology. By gathering monitored data through multi-source collecting market, production and quarantine, the study gathers and organizes the collected data, and integrates the data into a collective multi-source data. (3) Building an early-warning model in the pork market in Beijing and visualized research. By using the early-warning theory method, the study builds an indicator system consisting of leading indicator, concurrent indicator and lagging indicator, and thus builds an early-warning system, calculates early-warning index, compares early-warning lines, determining an early-warning alarm, and realizing visualization through B/S structure as well as embedded development. The study intends to achieve three innovative goals: Revealing the price fluctuations pattern of the pork market in Beijing, and the risk factors in the market; building a real-time information monitoring place, and thus achieving the integration of multi-source data of the pork markets; building an early-warning indication system of Beijing’s pork market, and achieving the simulation as well as displaying of the early-warning index. This study has important meanings on guiding the pork production and consumption in Beijing.
1958

Showing 361 to 370 of 427 Paper Titles