Advanced Materials Research
Vol. 1052
Vol. 1052
Advanced Materials Research
Vol. 1051
Vol. 1051
Advanced Materials Research
Vols. 1049-1050
Vols. 1049-1050
Advanced Materials Research
Vol. 1048
Vol. 1048
Advanced Materials Research
Vol. 1047
Vol. 1047
Advanced Materials Research
Vol. 1046
Vol. 1046
Advanced Materials Research
Vols. 1044-1045
Vols. 1044-1045
Advanced Materials Research
Vol. 1043
Vol. 1043
Advanced Materials Research
Vol. 1042
Vol. 1042
Advanced Materials Research
Vol. 1041
Vol. 1041
Advanced Materials Research
Vol. 1040
Vol. 1040
Advanced Materials Research
Vol. 1039
Vol. 1039
Advanced Materials Research
Vol. 1038
Vol. 1038
Advanced Materials Research Vols. 1044-1045
Paper Title Page
Abstract: The linear feedback synchronization of the unified chaos system was researched, which was applied in the secure communication based on the chaotic parameter modulation. Information signals were used to modulate some parameter of the unified chaotic system in the sending terminal, and in the receiving terminal the chaotic content was then obtained based on the chaotic synchronization signal, then the information signals recover effectively. The simulation results show that the synchronization time is very short and the recovered signals are close to the information signals and it can realize secret communication successfully, having strong security and practicability.
1075
Abstract: As information technology and communication technology continue to evolve and progress, wireless sensors in communication operations have been widely used in many areas , which has greatly improved the effectiveness and quality of communication and created favorable conditions for the development of all work. In this paper, the author analyzes the corresponding concept of underground mine communication practices and wireless sensors, focuses to discuss the application of wireless sensors in underground mine communication operations and analyzes the design of underground mine wireless sensing system, whose purpose is to provide reference for the application of wireless sensors in underground mine communication operations.
1081
Abstract: Discrete data attributes reduction, there are many mature methods, but for continuous data attributes reduction, general algorithm is not very good, in real life, the continuous data feature extraction and discrete data is also important, based on the number of new brain waves as analysis object, and through the continuous eeg feature extraction comparison, verify the feasibility of the proposed method.
1084
Abstract: Automatic extraction of domain-specific terms improves the efficiency of management staff. This paper proposes a variance-based method to extract candidate domain-specific terms in terms of between domains, within a certain domain and unbalance of corpus. Then, we fill the meaningless word of candidate terms by using the combinational degree between two words based on original text. Finally, we can obtain meaningful terms. Experiments on the corpus of complaint about urban management show that our approach is effective to extract domain-specific terms. We evaluate the performance of our approach manually and compare the results against TFIDF, the Accuracylenient and Accuracystrict are 13 percent and 7 percent higher than TFIDF.
1088
Abstract: Binary image storage is simple, compact structure makes the entropy of the unique advantages of the binary image data fax, text, bar code identification and digital signature has been widely used, it is precisely because of this feature makes color, grayscale image information hiding technique can not directly applied to the binary image information hiding. Summary outlines some recent findings binary image, and hidden capacity and robustness of these findings and other issues made a brief comparison and discussion.
1094
Abstract: Means of digital image tampering diverse, new technical approach increasingly renovation, therefore, the detection of forged digital tampering issues are complex, and must not universal, once and for all solutions. In this paper, digital image tampering common practices through research, proposed a re-deposit operations for double JPEG image processing software compression testing technology method using image compression and decompression process lossy compression of images tamper with forensic, this method can play an effective role in the detection.
1098
Abstract: This article first overview of RPG games, this paper introduces design method and the main goal of the game, then cover the whole process of RPG game, with specific examples in this paper.
1102
Abstract: The system uses B/S architecture, developed using ASP.NET electronic mall three-tier system. Project is divided into foreground and background, foreground realized commodity purchase and purchase orders, mainly for administrators to manage the background of product information, product reviews, order information management. After testing, the system completes the established function works well.
1106
Abstract: Using the-expansion method proposed recently the exact solutions of the (3+1)-dimensional KP equation are found out. The exact solutions are expressed by two types of functions which are the trigonometric functions and the rational functions. When the parameters are taken as special values the trigonometric function solutions can be expressed as periodic wave solutions.
1110
Abstract: A model of wireless network data interchange was built to solve cross-platform exchange data in intelligent robot. In the framework of embedded Soft-PLC - Codesys real-time operating system, we apply Socket network programming technology based on TCP/IP communication protocol to set up a physical channel between VC++ platform and the Codesys platform. It realizes the real-time data exchange between host-computer and slave-computer uploaded embedded operation system of robot. A special multi-threaded processing class was developed to enhance the multi-tasking allocation ability of the system. Exchanged data was packaged and analyzed to ensure the accuracy of transmitted data. The experiment shows built communication system platform is justifiable, and data transmission speed is less than 10ms. It is able to meet the needs of real-time control in intelligent robot.
1113