Advanced Materials Research
Vol. 1052
Vol. 1052
Advanced Materials Research
Vol. 1051
Vol. 1051
Advanced Materials Research
Vols. 1049-1050
Vols. 1049-1050
Advanced Materials Research
Vol. 1048
Vol. 1048
Advanced Materials Research
Vol. 1047
Vol. 1047
Advanced Materials Research
Vol. 1046
Vol. 1046
Advanced Materials Research
Vols. 1044-1045
Vols. 1044-1045
Advanced Materials Research
Vol. 1043
Vol. 1043
Advanced Materials Research
Vol. 1042
Vol. 1042
Advanced Materials Research
Vol. 1041
Vol. 1041
Advanced Materials Research
Vol. 1040
Vol. 1040
Advanced Materials Research
Vol. 1039
Vol. 1039
Advanced Materials Research
Vol. 1038
Vol. 1038
Advanced Materials Research Vols. 1044-1045
Paper Title Page
Abstract: Current research of virtual machine migration strategy mainly focuses on how to reduce the delay of virtual machine migration process but does not pay much attention to the network flow problem caused by the virtual machine migration. Because of the difference caused by Infrastructure Operator's network location makes a different virtual machine migration strategy, which will result in large differences in network traffic. Infrastructure operator's network resources are scarce resources. Therefore, how to reduce the network flow of virtual machine migration is a problem to be studied. In order to reduce network traffic virtual machine migration, this paper proposes a virtual machine migration algorithm (NFBA) based on network flow balance to obtain the minimum scheduling cost. Experimental results show the migration strategy can effectively reduce the communication traffic between the virtual machine clusters within the system and reduce the burden of network and consider workload balance at the same time.
1028
Abstract: This paper was presented a new method to compute structured singular value μ, which had been used widely to analyze and synthesize robust controller with structured uncertainty. The formulated method was adaptive Newton pathfollowing to find an optimal singular path at some frequency for low-order function of μ-Δ(M). The objective of the new algorithm was to calculate structured singular value conveniently and stably and finally design a better robust controller.
1035
Abstract: An improved algorithm for ship detection from the high-resolution synthetic aperture radar (SAR) images is proposed in this paper. In this algorithm, we firstly utilize the image pre-processing step to suppress the speckle noise. Then, the ship ROIs (Region of Interest) are obtained based on MSER (Maximally Stable Extremal Region) method, which enables preliminary extraction of ship candidates. Finally, an improved CFAR (Constant False Alarm Rate) detector is designed for accurate detection with the purpose of accelerating the whole process and decreasing false alarms. The experimental results show that this method can achieve effective ship detection in high-resolution SAR images. The process of ship detection is also accelerated which is in favour of the project realization.
1040
Abstract: In this paper, we proposed two improved methods for impulse noise of image. Firstly we propose an improved multiple extreme value examine for pixels for pixels. Secondly we propose a variable threshold ,a point-set composed with prior pixels was proposed to determine the threshold value. The approach makes noise well-detected and can reduce lost and false noise relatively. Experiments confirm the validity and effectiveness of the method , and has the less computation.
1045
Abstract: Common methods for reducing image size include scaling and cropping. However, these two approaches have some quality problems for reduced images. In this paper, we propose an image reducing algorithm by separating the main objects and the background. First, we extract two feature maps, namely, an enhanced visual saliency map and an improved gradient map from an input image. After that, we integrate these two feature maps to an importance map. Finally, we generate the target image using the importance map. The proposed approach can obtain desired results for a wide range of images.
1049
Abstract: In an era of rapid-transpiring information, the art of dance enriches its artistic vocabulary via various disseminate techniques of visual media and multi-sensory stimulation while creating the innovation road of modern dance art. According to the current status of dance teaching in colleges and universities, we attempt to change the traditional teaching model of "words and deeds" for multi-media dance approach to carve out new fields of multimedia-assisted teaching.
1053
Abstract: In this paper,it is established the geometric and radar echo model of the rotating target with the Forward-looking synthetic aperture radar firstly,then the Doppler frequency History Formula is Deduced and Pointed out that the Formula has a sinusoidal characteristics. It is simulated the imaging of the stationary target and the rotating target with different rotation speed, the imaging result can be expressed as the forms of curve and the curve circle nomadic type, when these features appear in the imaging results, it can initially determine that the rotating target is presence.
1057
Abstract: Meteorological elements are the important factors influencing the background noise model of the infrasound station. In order to determine the specific impact of meteorological elements on the model and find out the background ambient noise root of infrasound station, the infrasound and meteorological data from international infrasound station I34 is processed and analyzed through root mean square research and power spectral density analysis. The results show that the wind speed, wind direction, temperature and pressure is the main factors influencing the infrasound station environment background noise, and the wind speed exercises the greatest influence on background noise. Analysis results can provide theory basis for the modeling of background noise for the infrasound station.
1061
Abstract: The advent of the age of big data brings not only the rapid development of the Internet, scientific research, social networking and other fields, but also help and challenges to the application of library. For example, the library service applications in data storage, data mining, data analysis, etc. can identify hidden values behind the data only through systematic organization and analysis of massive structured, unstructured, and semi-structured data, in order to predict the future development of library and promote its better development.
1066
Abstract: Using IPSec protocol and VPN technology can be in the open, insecure public network, build a safe and stable communication channel, ensure the safety of data transmission. The communicating peers should implement mutual ID authentication prior to the building up of IPSec channel. Traditional way of IPSec ID authentication is based on “Pre-shared keys”, it has lower security. It makes a detaied analysis on the key technologies in VPN based on IPSec. A design of the IPSec ID authentication building VPN based on certificate is proposed. Finally, in the VMWare simulation experiment has been carried out on the design, experimental results show the design is safe, steady operation and easy to implement.
1071