Advanced Materials Research
Vol. 278
Vol. 278
Advanced Materials Research
Vol. 277
Vol. 277
Advanced Materials Research
Vol. 276
Vol. 276
Advanced Materials Research
Vol. 275
Vol. 275
Advanced Materials Research
Vol. 274
Vol. 274
Advanced Materials Research
Vols. 271-273
Vols. 271-273
Advanced Materials Research
Vols. 268-270
Vols. 268-270
Advanced Materials Research
Vol. 267
Vol. 267
Advanced Materials Research
Vol. 266
Vol. 266
Advanced Materials Research
Vols. 264-265
Vols. 264-265
Advanced Materials Research
Vols. 261-263
Vols. 261-263
Advanced Materials Research
Vols. 255-260
Vols. 255-260
Advanced Materials Research
Vol. 254
Vol. 254
Advanced Materials Research Vols. 268-270
Paper Title Page
Abstract: Wormhole attack is a kind of attack manner in WSN that does not need to crack network encryption key, which has great harm. Aiming at the characteristics of Wormhole attack, a wormhole attack defense strategy based on node location information was presented. The manner computed physical distance between two nodes through extraction of location information in the packets and compared it with stored threshold, so as to determine whether these packets come from normal communication range. WSN network modeling and simulation results based on OMNeT++ indicates that AODV protocol of defense strategy added sensor node location information can implement successfully defense.
1055
Abstract: PID control scheme has been widely used in most of control system. The method of design PID controller is mature gradually. Due to the controlled object is nonlinear and time-varying, so the integer PID controller can not achieve the desired effect. After study people found that the application of fractional order PID controllers can solve the problem of time-varying and nonlinear very well and the controller has high control precision. Currently, the method of design fractional order PID controllers is little. This article describes an artificial immune algorithm and using MATLAB for simulation, the simulation results demonstrate that the artificial immune algorithm has little error and high optimization speed than traditional optimization algorithm, and the fractional order PID controller has a better control effect than traditional integer PID controller.
1061
Abstract: It is difficult to have good performance to control large delay time system. A neural network identification method for nonlinear system’s delay time was discussed. Using the abrupt mutation resulted from the training error sum square of the real output and the expected output of the network, this method changed the input sample period of the neural network so that it could discriminate the delay time of the nonlinear model. Combining the discrimination of neural network system with long time delay and the control method based on model prediction, searching PID controller parameters based on ant colony optimization algorithm, it was applied to control boiler combustion system. The simulation results show that this scheme has much better advantage of celerity and robustness.
1067
Abstract: This paper proposes a special text summarization method based on hybrid parallel genetic algorithm. The idea of our approach is to obtain center of sentences based on k-means clustering and hybrid parallel genetic algorithm. We select those sentence according its importance and distance of center to form a summarization. Experimental results indicate a clear superiority of the proposed method over the traditional method under the proposed evaluation scheme.
1073
Abstract: As the internet technology develops, the application of mobile RFID becomes more and more common. Since mobile RFID label is easier to be read and attacked by hacker, personal information of the users is leaked. Present authentication mechanisms in application are either made into RFID hardware with complex design or with weaker security protection ability. The paper proposes a new security authentication mechanism and the test result shows that the authentication mechanism may effectively prevent various attack behaviors of hack with the base of low cost so as to reach the objective of protecting personal privacy of card holder.
1077
Abstract: With the rapid growth and wide application of electronic commerce, lots of information comes forth to people. However, our experiences and knowledge often do not enough to process the vast amount of information. The problem of obtaining useful information becomes more and more serious. To deal with the problem, the personalized service and recommender system play a more important role in many fields and collaborative filtering is one of the most successful technologies in recommender systems. However, with the tremendous growth in the amount of items and users, most collaborative filtering algorithms suffer from data sparsity which leads to inaccuracy of recommendation. Aiming at the problem of data sparsity, a hybrid personalized recommendation method based on dynamic Bayesian networks is presented. This method uses the dynamic Bayesian network technique to fill the vacant ratings at first, and then employs the user-based collaborative filtering to produce recommendations.
1082
Abstract: In the process of requirements modeling based on ontology, the obtained model description is based on application ontology; which is not easy for designer to understand and cannot be converted into requirements specification documents for design. UML is actual standard for object-oriented modeling. For this issue, this paper creates the UML meta-model, and establishes mapping rules description language for application ontology to UML meta-element, which implements the generation of UML class diagrams based on rule, use case diagrams, state transition diagram models and requirements specification documents based on UML.
1086
Abstract: With the development of remote sensing, the data quantity of remote sensing image is increasing tremendously. It brings a huge workload to the image geometric correction through manual ground control point (GCP) selection. GCPs automatically selected based on software is one of the effective methods to cut down manual operation. The GCPs obtained from that way is generally redundant. This paper deeply comprehends some existing methods about automatic optimization of GCP, and puts forward a new method of automatic optimization of GCP based on Thiessen Polygon to filter ground control points from the overfull ones without manual subjectivity for better accuracy. Experiments in this paper also demonstrated the relationship between the accuracy of geometric correction and the distribution of GCP. It advances the conception of single GCP’s importance value based on Thiessen Polygon. The paper gives the theory and the flow of automatic optimization of GCPs as well. It also presents an example of the application of this method. In the conclusion, this paper points out the advantages of this method .
1092
Abstract: The existed fuzzy integral fusion methods used the prior information of training samples to determine the value of fuzzy density, which is the same to any samples and can not reflect the different importance of support vector machine to different samples. A support vector machine ensemble based on adaptive fuzzy integral is presented, the classification confidence of individual support vector machine to test sample is determined according to the measurement level information and the adaptive fuzzy density is determined according to classification confidence.
1096
Abstract: This paper presents a candidate set in the case does not produce only scan through a database to extract the top-k strongly correlated item pairs method. Secondly, the structural information using a relational database, an appropriate estimate of the effective threshold, so that the results of K contains at least one project to effectively address the relational database on the Top-K strongly related to the problem of mining projects, and without Pay too much computational cost.
1103