Advanced Materials Research
Vol. 278
Vol. 278
Advanced Materials Research
Vol. 277
Vol. 277
Advanced Materials Research
Vol. 276
Vol. 276
Advanced Materials Research
Vol. 275
Vol. 275
Advanced Materials Research
Vol. 274
Vol. 274
Advanced Materials Research
Vols. 271-273
Vols. 271-273
Advanced Materials Research
Vols. 268-270
Vols. 268-270
Advanced Materials Research
Vol. 267
Vol. 267
Advanced Materials Research
Vol. 266
Vol. 266
Advanced Materials Research
Vols. 264-265
Vols. 264-265
Advanced Materials Research
Vols. 261-263
Vols. 261-263
Advanced Materials Research
Vols. 255-260
Vols. 255-260
Advanced Materials Research
Vol. 254
Vol. 254
Advanced Materials Research Vols. 268-270
Paper Title Page
Abstract: The article focuses on traditional enterprises, and briefly discusses the necessity of application using new computer technology. Specifically, it indicates the new computer technology, and analyzes its advantages and applicability. Moreover, base on the characteristics and status of the traditional enterprise, the author points out specific strategy and implementation plans. Finally, the author analyzes the misunderstanding of the gives practicable rationalization proposals.
1806
Abstract: The research on personalized information service system in college library based on intelligent agent are put forward for improving personalize service quality and level of college library information management system. The related techniques and methods that can be used for the application and research on personalized information service system are discussed deeply in this thesis. Based on analyzing the nowadays situation of study about personalized service for library information management system, and researching the related techniques of intelligent agent, search engine and web information gathering and mining, it is a feasible way to using intelligent agent technique on developing the personalized service system for library. By researching such techniques as personalized search, user's interest character and information filter, a model of intellectualized information gathering and service system based on agent in college digital library is proposed, and every part of this model and their functions are discussed in detail.
1812
Abstract: We design and realize a testing and analyzing tool for performance of image compression algorithms. This tool can test and analyze compression algorithms and generate kinds of analysis chart automatically, provides a lot of convenience for users and has very important practical value.
1817
Abstract: The exchange rate model for the study of the exchange rate theory has very important significance. After analyzing the successful nonlinear model of real exchange rate based on the purchasing power parity (PPP) theory, the nonlinear problem of nominal exchange rate is studied in this paper. Through a research on a period of nominal exchange rate with nonlinear characteristics, a nonlinear statistical model of nominal exchange rate based on the hidden Markov model (HMM) is proposed, and the parameters of the model are estimated. Hypothesis testing shows that the model can accurately describe the statistical characteristics of the nominal exchange rate time series. The parameters showed that the nominal exchange rate model proposed in this paper, to some extent, supports that deviations from purchasing power parity (PPP) are nonlinear mean reversions.
1823
Abstract: The article described software design need to be from user's point of view, the key in software developing and interface design is not using what kind of development tools, but by using which kind of thinking and program theory to guide the design. Design thought and methods finally determine success and quality of design. Emphasizes that aping functional art design methods to engineering development process, discussed the application ways of the engineering development methods in software interface of art design. Emphasizes the significance of artistic thought in the software interface design, and points out that logical design process is basic condition & effective ways to achieve the desired interface art design.
1828
Abstract: In the design of the proposed ETC scheme, all three major intelligent systems, such as AVC, AVI, and AVE have been included, where in each case some advanced technological features have been introduced. Moreover, inclusion of two stage security protocols with a robust encryption algorithm for data communication and the SMS based notification make the proposed system unique among all other existing methods. A prototype has been developed based on the proposed design and found to meet the desired performance specifications.
1832
Abstract: The software architecture based on web service has become the critical technique to construct system in the distributed environments. The web service composition is the most important method to find the correct service in the complicated application circumstance. The key question is to find service based on the QoS and how to guarantee the quality. This thesis focuses the web service composition in order to get dynamic business cooperation and integration. The key component of web service is discussed and the method of web service composition is analyzed including the formalization verification and service composition architecture and the QoS-aware composition methods. Aimed at the application of web service composition, a method based on approved genetic algorithm is put forward. The simple genetic algorithm based web service composition has many problems such as slow convergence rate and non-optimal service composition. In this paper a genetic algorithm based on niche is provided for the Qos-aware composition and it can get more accurate service composition result and can get the optimal path quickly especially in the large scale problems according to the experiment.
1838
Abstract: This paper uses the financial data of all Chinese listed companies to construct two indexes that reflect the degree of external financing constraints faced by firms, using logistic regression model and multiple discriminate analyses respectively. Second, the author examines the relationship between financing constraints and the investment-cash flow sensitivity using OLS regressions. This paper provides evidence that the relationship between financing constraints and investment-cash flow sensitivity is monotonic, which is consistent with the findings of FHP(1988).
1844
Abstract: This paper addresses the performance of pseudorandom Binary Amplitude Shift Keying (BASK) emission sequences for an ultrasonic multi-life location system in rescue robot. To improve the performance of multi-life location system, the BASK modulation were used to construct the spread spectrum emission sequences for ultrasonic sensors. Correlation technique in the receiving circuit was used to de-spread. Good correlation characteristics, i.e., sharp autocorrelation and flat cross-correlation, can help eliminate crosstalk between multichannel ultrasonic sensors. To improve the echo signal correlation effect, genetic algorithm was applied to optimize pseudorandom m sequences. In simulated post-earthquake environment, experimental verification of ultrasonic multi-life location system consisting of eight-channel SensComp 600 series electrostatic sensors with optimized BASK emission sequences was carried out. The experimental results demonstrate that the ultrasonic multi-life location system with the proposed method can realize multi-life location simultaneously.
1850
Abstract: The development of wireless broadband access in multimedia field has a higher requirement on wireless mesh networks’ performance. The design of routing metric is the key to improve the performance of wireless mesh networks. How to make full use of multi-interface technology in routing metric design to improve the network capacity has become a research focus. This article first analyzes the requirements of multi-interface wireless mesh networks on routing metric design, then analyzes strengths and weaknesses of nine routing metrics applied in wireless mesh networks currently, and finally compares the conditions of nine routing metrics capturing different performance indicators of wireless networks. As routing metrics like WCETT, MIC, WCETT-LB, IAWARE, ILA, MI and IDA all take channel interference problems into account, they are more suitable for multi-interface wireless mesh networks.
1856