Applied Mechanics and Materials
Vol. 734
Vol. 734
Applied Mechanics and Materials
Vol. 733
Vol. 733
Applied Mechanics and Materials
Vol. 732
Vol. 732
Applied Mechanics and Materials
Vol. 731
Vol. 731
Applied Mechanics and Materials
Vol. 730
Vol. 730
Applied Mechanics and Materials
Vol. 729
Vol. 729
Applied Mechanics and Materials
Vols. 727-728
Vols. 727-728
Applied Mechanics and Materials
Vols. 725-726
Vols. 725-726
Applied Mechanics and Materials
Vol. 724
Vol. 724
Applied Mechanics and Materials
Vol. 723
Vol. 723
Applied Mechanics and Materials
Vol. 722
Vol. 722
Applied Mechanics and Materials
Vol. 721
Vol. 721
Applied Mechanics and Materials
Vols. 719-720
Vols. 719-720
Applied Mechanics and Materials Vols. 727-728
Paper Title Page
Abstract: The typical structure of energy management system for new electric vehicle was analyzed to summarize the function. The research trend was pointed out based on the analysis of performance characteristics of energy management system for electric vehicle.
896
Abstract: In this paper, plant electrical signal of Aloe vera L. was collected by experimental system which was built in the laboratory of writer .And used MATLAB to de-noise processing and analyzing. We adopted both traditional and lifting wavelet transformation respectively, compared to two results, we can know that analyses which based on lifting wavelet transformation are more accurate and quick ,It is more suitable for weak signals in future research and analysis.
900
Abstract: The characteristic value of gray level co-occurrence matrix to extract can well express the information of texture. Co-occurrence matrix provides the information of image grayscale, interval and change. According to the co-occurrence matrix, it can calculate the corresponding characteristic values of eigenvalue, which can express the texture information of the image. This is thesis designed extraction software a for textile fabric texture feature, and the internal principle is the using of gray level co-occurrence matrix and Matlab programming.
904
Abstract: electronic communicationtechnology today belong to a sophisticatedand highly applied technology, thekey technology development level and theprogress of a country's level ofelectronic communication technology.Electronic communication industry is a partof information industryindispensable, progress and the development ofelectronic communication technology to directly drive the advanced productiveforces and the strength of science and technology. The field and scope ofelectronic communication technology widely, especially prominent in two aspectsof mobile phone and satellite communications, this article will also throughthese two aspects to analyze the key technology of electronic communicationsystem problem.
911
Abstract: An improved extraction algorithm of Web Chinese keywords is proposed in this paper based on the traditional feature words weighted algorithm—TFIDF. A series of controlled experiments have proved that the improved algorithm is superior to the traditional one for higher accuracy and recall rate, and it can precisely and automatically extract the key words from the target documents.
915
Abstract: Wireless resource management is one of the key techniques in cognitive radio networks, which attracts great research attention, international cooperation project and other fundings. The dissertation contains valuable work on both theories and applications.A novel method using bipartite graph matching is proposed to realize the dynamic spectrum access. An idealized method and an operative method are presented respectively based on the famous Kuhn-Munkre algorithm. Experimental results show that proposed algorithms dramatically maximize the spectrum utilization and reduce allocation conflictions among users.
920
Abstract: Cloud security botnetprotection system has implemented recognition and response of dynamic andencrypted Botnet efficient. The external resources employed in the system arefrom cloud reputation system, private cloud Honeynet system and the threatdistribution data. Through the integration and analysis of data, the cloud securitybotnet protection system independently accomplishes the integration andanalysis of Botnet data, forming a zombie network database, and to realize thefunction of responding and the tuning of botnet.
923
Abstract: A Profibus-DP transform interface was designed. TakingAT89S52 and SPC3 as core, hardware of interface, software flow and GSD file were designed. The interface implemented access of Profibus-DP for traditional instrument and field equipment which weren’t provided with Profibus communication ability. Test results show that the interface can run data communication with main station at high speed, with high reliability and versatility.
926
Abstract: Design of an online examination system.Among the system overview, system requirements are analyzed, the development environment is Visual Studio 2008, the database is SQL Server 2005. The overall design of the system contains the design of the system architecture and overall system functional module. The function module includes the lander module and administrator module. The design of the database is completed through the design of database logical structure and database conceptual structure.
930
Abstract: Inprotection architecture of data center, Cloud security threat distributiontechnology through the analysis of various threats of Internet and risks,obtains the threatened distribution data that is associated with the zombienetwork with the technology of distributed computing.
934