Advanced Materials Research
Vol. 1086
Vol. 1086
Advanced Materials Research
Vol. 1085
Vol. 1085
Advanced Materials Research
Vol. 1084
Vol. 1084
Advanced Materials Research
Vol. 1083
Vol. 1083
Advanced Materials Research
Vol. 1082
Vol. 1082
Advanced Materials Research
Vol. 1081
Vol. 1081
Advanced Materials Research
Vols. 1079-1080
Vols. 1079-1080
Advanced Materials Research
Vol. 1078
Vol. 1078
Advanced Materials Research
Vol. 1077
Vol. 1077
Advanced Materials Research
Vols. 1073-1076
Vols. 1073-1076
Advanced Materials Research
Vols. 1070-1072
Vols. 1070-1072
Advanced Materials Research
Vols. 1065-1069
Vols. 1065-1069
Advanced Materials Research
Vol. 1064
Vol. 1064
Advanced Materials Research Vols. 1079-1080
Paper Title Page
Abstract: Development of computer network technology has greatly improved the sharing rate and utilization of information resources, many areas are widely used local area network, widely used degree gradually expose their security and confidentiality issues. In particular, people lack knowledge on security policy and network security control mechanisms, leading network security becomes more complex. In this paper, the main problem with the current computer Local Area Network security and the starting point, the focus of the analysis and management of their security and confidentiality measures, hope to further enhance the computer LAN security.
595
Abstract: With the rapid development of computer networks and the Internet, while promoting the development of all aspects, the Internet also brings some trouble. The text starts from the Local Area Network information security status, analyzes problems in LAN information security management, puts forward maintenance and virus prevention strategies for LAN security.
598
Abstract: Popularity of the network is based on the transmission of information, with the development of electronic information technology, the degree of data in the information society continues to deepen, if we want to get wanted or useful information from the mass of information, it must be on the Web information mining. Before, information data used HTML language, its structure is poor, Web data mining is difficult to meet the needs of the job search. In this context, XML language emerges, and it has a good level and structure, and can organize web pages information better, plays a good role in data mining, largely changing the various deficiencies in HTML language. This paper first introduces XML and Web data mining, and analyzes XML-based Web data mining applications on this basis.
601
Abstract: in the dozen years after entering the new century, the country's industrial development has made great progress, in such a rapid progress, the development and utilization of energy has played a pivotal role, in which the momentum of development of coal industry goes far beyond the previously expected. The development and utilization of coal resources in China not only has wide use range, some advanced developed countries in the world is also an important research topic. In this, has a mission is the focus of these studies, which is based on WEB network management information integration and development of coal resources, to ensure safety system. In this paper, we will now discuss the fierce based on WEB network management information system of coal resources for research.
604
Abstract: With development of information technology and network technique, as information media micro-blog becomes more and more important. Micro-blog is noted for preeminent simple, convenient and interactivity. However with the help of micro-blog, fake information is rampant increasingly. The public opinion analysis of micro-blog data allows of no delay. This paper explicates the features of micro-blog text, and then describes text information extraction technology such as top detection, tracking in detail. The outcomes of information extraction can inform government department spot of internet public opinion in real time.
609
Abstract: Thefrequency offset and phase noise will make the orthogonal property between eachsub carrier deterioration. Only1% frequency offset will cause 30dB signal-to-noise ratio decrease. In order to researchanti-jamming ability on COFDM modulation, we use the PXW-100S type codedmodulation module and the PXW-500S type DVB-T receiving board for unmannedaerial vehicle(UAV) platform, through the elimination of inter symbol interference(ISI) and inter carrier interference(ICI).
614
Abstract: The paper detailed expounds the intelligent attendance system, the design method,the purpose of the software process and can achieve results. The intelligentattendance system adopts the light emitting diode and photodiode photoelectricsensor circuit, complete student number recognition, by AT89S52 single chipmicrocomputer as the core, memory chip and display circuit constitute the mainpart of the system. The paper presents a smart attendance system hardwarecircuit design and software design flow chart.
618
Abstract: A Fuzzy algorithm based onthe current statistical model adaptive filtering is brought. This algorithm avoidsthe need to set acceleration limit in advance in the original method(CSAF), and the accelerationestimation value is determined by the weights of the acceleration in thetriangular membership function. This new algorithmimproves the performance of target tracking with the cost of a little calculation time, but the cost of calculation timeis so slightly that we can ignorethe effect of the real-time.
622
Abstract: The permutation flow-shop scheduling problem (PFSP) is an non-deterministic polynomialtime (NP) hard combinatorial optimization problems and has been widely researched within thescheduling community. In this paper, a memetic gravitation search algorithm (MGSA) is proposedto solve the PFSP for minimizing the makespan measure. The smallest position value (SPV) rule isutilized for converting the continuous number to job permutations for determining the most suitablethe proposed MGSA for the PFSP. The proposed MGSA uses a Nawaz-Enscore-Ham (NEH) heuristicalgorithm for initialization of population, and a simulated annealing (SA) is coupled with the variableneighborhood search (VNS) as the local search method to balance exploitation and exploration. Toverify the robustness of the MGSA, it is compared with three particle swarm optimization (PSO) algorithmson the basis of 12 PFSP instances with different job sizes ranging from 20 to 500. The resultsdemonstrate that the proposed MGSA can outperform other compared algorithms.
626
Abstract: People often interact with deformable objects when they are kneading clay or making traditional desserts, either directly with their hands and fingers or through tools. Haptic interactions with virtual clay-like objects would significantly make the simulations more interesting and more real. However, to achieve a stable and real-time simulation of a clay-like particle system with high viscosity is challenging. In this research, we propose a novel method that allows real-time haptic interaction with clay-like objects. The particle system is based on a SPH(Smoothed-Particle Hydrodynamics) model, and the procedure of the conventional SPH method for fluid simulation is improved for simulating a particle system especially of high viscosity. The haptic rendering is done by a string-based haptic interface SPIDAR-G. We evaluate the performance and the stability of the proposed method in the end.
631