Applied Mechanics and Materials
Vol. 682
Vol. 682
Applied Mechanics and Materials
Vol. 681
Vol. 681
Applied Mechanics and Materials
Vol. 680
Vol. 680
Applied Mechanics and Materials
Vol. 679
Vol. 679
Applied Mechanics and Materials
Vol. 678
Vol. 678
Applied Mechanics and Materials
Vols. 675-677
Vols. 675-677
Applied Mechanics and Materials
Vols. 672-674
Vols. 672-674
Applied Mechanics and Materials
Vols. 670-671
Vols. 670-671
Applied Mechanics and Materials
Vols. 668-669
Vols. 668-669
Applied Mechanics and Materials
Vol. 667
Vol. 667
Applied Mechanics and Materials
Vol. 666
Vol. 666
Applied Mechanics and Materials
Vol. 665
Vol. 665
Applied Mechanics and Materials
Vol. 664
Vol. 664
Applied Mechanics and Materials Vols. 672-674
Paper Title Page
Abstract: Vibroseis obtained the seismic record by cross-correlation detection calculation. compared with dynamite source, cross-correlation detection can suppress random noise, but produce more correlation noise. This paper studies Radon transform to remove correlation noise produced by electromagnetic drive vibroseis and impact rammer. From the results of processing field seismic records, we can see that Radon transform can remove correlation noise by vibroseis, the SNR of vibroseis seismic data is effectively improved.
1964
Abstract: This paper defines the projection of algebic systems, and studies the projecting algorithm for linear systems. As its application, a new method is given to solve linear programming problems, which is called reduction-by-projection method. For many problems, especially when the problems have many constraint conditions in comparison with the number of their variables, the method needs less computation than simplex method and others. The great advantage of the method is shown when solving the integer linear programming problems.
1968
Abstract: For the problems of few current defogging effect evaluation methods and limited evaluation methods, it proposes an image clarity effect evaluation method: the method combined with relative contrast and edge similarity. This is because: the contrast degree of fog image and non-fog image is obviously different. While improving image contrast degree, it should also try to make the edge structure of recovery image and reduced image consistent to prevent the recovery image from distorting. The experiment proves that this method can effectively evaluate the clarity effect of each algorithm, and the evaluation result and the subjective feelings of the human eyes are consistent. Compared with the existing evaluation methods, it obtains overall evaluation conclusion and also has a good practicability and reliability.
1972
Abstract: A Mobile Ad hoc network (MANET) is a network consisting of a set of wireless mobile nodes, in which nodes can communicate with each other without centralized control or established infrastructure. To obtain a better understanding of AODV (Ad hoc On-Demand Distance Vector Routing Protocol) and OLSR (Optimized Link State Routing Protocol) routing protocols, different performances are simulated and analyzed using OPNET modeler 14.5 with the various performance metrics, such as PDR (Packet Delivery Ratio), end-to-end delay and routing overhead. Only effect of mobility is analyzed in the paper. As a conclusion, in mobility case, routing overhead is not greatly affected by mobility speed in AODV and OLSR, and the PDR of OLSR is decreased as the node speed increased, while AODV is not changed. As to delay, AODV is always higher than OLSR in both static and mobility cases.
1977
Abstract: Nowadays, with the rapid development of mobile computing technology, mobile learning, a brand new distance learning model, arises at the historic moment. As a new research field, learners could acquire knowledge that they wanted anytime anywhere and really control their learning progress based on its advantage. Android is a Linux kernel–based operating system which can be applied in multiple mobile terminal devices such as smart phones, tablet computers,etc.Based on the combination of mobile communication technology and mobile learning theory, firstly, this paper constructed the mobile learning platform architecture, then, it analyzed the function modules of the system client and the system server, finally, it realized the design of mobile learning platform which is based on Android system. This work would provide a guidance of the theory, method and practice in the development and design of mobile learning systems.
1981
Abstract: For an ordinary individual biometric systems and technology, such as fingerprint recognition, palm recognition, face recognition or iris recognition, or late detection from a single object has crippled so that they have the characteristics of unity and limitations, this paper combining fingerprint and hand palm pattern recognition technology, taking into account the complexity of the image pattern and diversity, we propose a dual recognition algorithm, which greatly makes up for lack of a single fingerprint or palm print recognition method. The technology used in library management system than traditional card-borrowed books have higher efficiency and save manpower and material resources. After the experimental statistics, and achieved the desired results, not only improve the recognition efficiency, but also to ensure the accuracy of the recognition performance.
1985
Abstract: In this paper, execution sequence of clinical pathway (CP) is abstracted with genetic algorithm (GA). For the purpose, implemental sequence from historical clinical event logs for necessary clinical activities in published CP is used as the gene values of each chromosome. Through probability computation in fitness function, the optimal sequence of CP for a certain hospital is abstracted which reflecting the actual execution of CP. The application in Primary lung cancer surgery has demonstrated the feasibility of the method.
1991
Abstract: This paper introduces the field programmable gate array (fpga) application in high-speed visual inspection system.ALTERA EP1K30QC208-2 are used in the system for system calculation and control of the core, to perform high-speed real-time visual detection algorithm, this paper adopts a yawning based on eye closure and to detect driver fatigue, the method of in YCr, Cb in the color space using gaussian model skin detection of human face area, in the face of a gray binarization figure using a priori knowledge of facial features geometry in rough positioning the human eye, eye contour are obtained by region growing and morphological operation and calculation of the closure of the eye;Best threshold detection lips when using lip color roughly locate the lips, on the basis of accurate positioning lips by face grey value characteristics, and then through the mouth level to determine whether a driver yawn;Based on the two characteristics of driving fatigue, experiments show that this system detection speed, excellent versatility, and can improve the detection accuracy.
1995
Abstract: To introduce a kind of method of fuzzy modeling based on the accuracy of data sources and accessibility of the interface which can predict the future system reliability. Data sources are from Reliability management system, distribution network planning detail and projects of overhaul, capital construction, technical transformation, business expansion. There is little reports of the reliability evaluation algorithm by now. This paper is based on the correlation analysis method of load forecasting to forecast the reliability index.
1999
Abstract: Along with the development of the computer technology and the Internet, information hiding is given increasing attention. All kinds of the important information, such as government information, business information, personal privacy etc, should be transmitted safely. In the future, information hiding will play a very important role in the network to protect the information from damage. The content of this thesis is presented as follows: The analysis of the basic theory and concept of information hiding; The analysis and application of the space domain algorithms, transform (frequency) domain algorithm, etc focusing on the technology of digital watermarking, covert channel and anonymous communications. The theory of wavelet analysis and the experimental models are discussed deeply, basing on which the research and application of the wavelet is explored in the field of information hiding.
2009