Advanced Materials Research
Vols. 239-242
Vols. 239-242
Advanced Materials Research
Vols. 236-238
Vols. 236-238
Advanced Materials Research
Vols. 233-235
Vols. 233-235
Advanced Materials Research
Vols. 230-232
Vols. 230-232
Advanced Materials Research
Vols. 228-229
Vols. 228-229
Advanced Materials Research
Vol. 227
Vol. 227
Advanced Materials Research
Vols. 225-226
Vols. 225-226
Advanced Materials Research
Vol. 224
Vol. 224
Advanced Materials Research
Vol. 223
Vol. 223
Advanced Materials Research
Vol. 222
Vol. 222
Advanced Materials Research
Vol. 221
Vol. 221
Advanced Materials Research
Vols. 219-220
Vols. 219-220
Advanced Materials Research
Vols. 217-218
Vols. 217-218
Advanced Materials Research Vols. 225-226
Paper Title Page
Abstract: The stainless steel slag contains chromium and iron as well as significant levels of heavy metals, such as Cr(VI). Therefore, to efficiently recovery the valuable components in the stainless steel slag has potential environment and economic profit. In this paper, the physical and chemical properties as well as the leaching properties of the stainless steel slag were summarized. In addition, the treatment processes which can recovery or utilize the valuables in the slag and other potential measures to reduce the environmental pollution of the stainless steel slag were also discussed.
812
Abstract: In existing image hiding Spread Spectrum (SS) algorithm a reduction of scaling parameter is employed to improve imperceptibility but may lead to an increase in secret information extraction errors. A robust SS steganography, based on the Nonuniform Discrete Cosine Transform (NDCT) characteristic, is proposed. If the secret information, embedded in the NDCT coefficient matrixes of every N×N host image, is a real symmetric matrix, the difference matrix between stego-image and host image is also a real symmetric matrix. Due to the NDCT characteristic above, based on some corresponding change of stego-image, the proposed robust SS algorithm can improve imperceptibility of stego-image and the scaling parameter was not reduced. Simulation results verify the feasibility and validity of the algorithm.
816
Abstract: As a part of virtual simulation of construction processes, this paper deals with the quantitative risk analysis for the construction phases of the CFST arch bridge. The main objectives of the study are to evaluate the risks by considering an ultimate limit state for the fracture of cable wires and to evaluate the risks for a limit state for the erection control during construction stages. Many researches have been evaluated the safety of constructed bridges, the uncertainties of construction phases have been ignored. This paper adopts the 3D finite element program ANSYS to establish the space model of CFST Arch Bridge, and to calculate the linear, the geometrical nonlinear and the double nonlinear buckling safety factors under the six different lode cases. Then the bridge’s risks are evaluated according to the results calculated which provide a reference for design of similar project.
823
Abstract: Video text provides important semantic information in video content analysis. However, video text with complex background has a poor recognition performance for OCR. Most of the previous approaches to extracting overlay text from videos are based on traditional binarization and give little attention on multi-information integration, especially fusing the background information. This paper presents an effective method to precisely extract characters from videos to enable it for OCR with a good recognition performance. The proposed method combines multi-information together including background information, edge information, and character’s spatial information. Experimental results show that it is robust to complex background and various text appearances.
827
Abstract: Chaotic sequence is of vast application value and is suitable for the sequence encryption. In this thesis, the essence of the chaotic time sequence was analyzed; the limit of the chaotic sequence in the application was pointed out and the new scheme to construct the chaotic polynomial family was suggests. Also, the principle of constructing chaotic polynomial and the constructing process of the chaotic polynomial families were discussed. Several important simulation results were listed.
831
Abstract: The sealed electric submersible pumps (ESP) are the main device to extract oil in the world. Many faults of ESPs can lead to fierce vibration. The impeller tip screenout fault may shorten the service life of ESP, even lead to halt. The vibration signals were acquired from normal ESPs and impeller tip screenout fault ESPs, with vibration acquisition instrument based on three-dimensional piezoelectric sensor. The typical frequency characteristics were extracted from the well-head vibration data of normal and fault ESPs with wavelet analysis. According to the fault feature, the key characteristics of impeller tip screenout fault were extracted, with which the malfunction ESPs on spot can be distinguished from normal ones. The test result indicates that the method can be used in oil field to diagnose impeller tip screenout fault efficiently.
835
Abstract: Accurate assessment to disaster risk is one of the keys to reducing disaster losses. However, due to the fact that the disaster situation data series in county unit are always relatively short, available data are often not sufficient for disaster risk analysis. In this paper, a risk analysis method based on information diffusion theory was applied to create a new disaster risk analysis model (CURAM), and the risk of disaster can be evaluated on higher spatial resolution of county unit. Visual Basic and Map Objects were used to establish CURAM applying object oriented technique and component technique. CURAM provided risk evaluate function to natural disaster in county unit, and thematic map making and output, etc. The risk assessment results calculated by CURAM indicated that information diffusion technology was highly capable of extracting useful information and therefore improved system recognition accuracy.
839
Abstract: With appearance of variety kinds of three-dimension buoy application system, the design and production of three-dimension virtual model of buoy is increasingly becoming an important and tedious work. Artificial modeling way adopted in the past is inefficient, and the light quality is difficult to achieve. The paper puts forward automatically generating method for three-dimension virtual model of buoy based on S-57 chart data (AGM for short), and describes extraction and analysis of buoy data from S-57 chart data, automatically generation of three-dimension buoy model and the flashing animation of buoy light quality in detail, and finally gives the experimental data and results.
843
Abstract: Distributed applications often require integrating security policies of collaborating parties. The integration must be able to support complex authorization specifications and the fine-grained resources access requirements that the various parties may have. But now security modeling is not considered as a vital part in software development. In this paper, it is proposed to integrate the design of access control policy into software development. In this paper, UML is used to model access control policy, and then a framework is designed to generate the security model result expressed in XACML and to verify the policy correct and complete.
848
Abstract: Based on Flexsim simulation, we can easily come up with the best program for the production logistics system to improve production efficiency. First of all, by simulating the running of the original program, we can find out the bottlenecks in the production logistics system. Then, accordingly change the various parameters of the production logistics system and rearrange the layout of the workshop, thereby getting the improved program for the production logistics system. Next, simulate the running of the improved program, the results of which show that the improved program can remove the existing bottlenecks in the production logistics system. As a result, not only is the utilization of resources and equipment improved, but also production plans can be smoothly carried out. There is some practical and guiding value in this research approach and its results.
852