Advanced Materials Research
Vol. 279
Vol. 279
Advanced Materials Research
Vol. 278
Vol. 278
Advanced Materials Research
Vol. 277
Vol. 277
Advanced Materials Research
Vol. 276
Vol. 276
Advanced Materials Research
Vol. 275
Vol. 275
Advanced Materials Research
Vol. 274
Vol. 274
Advanced Materials Research
Vols. 271-273
Vols. 271-273
Advanced Materials Research
Vols. 268-270
Vols. 268-270
Advanced Materials Research
Vol. 267
Vol. 267
Advanced Materials Research
Vol. 266
Vol. 266
Advanced Materials Research
Vols. 264-265
Vols. 264-265
Advanced Materials Research
Vols. 261-263
Vols. 261-263
Advanced Materials Research
Vols. 255-260
Vols. 255-260
Advanced Materials Research Vols. 271-273
Paper Title Page
Abstract: A Design of the enterprise safety gateway based on Linux built-in standard framework of Netfilter/Iptables was put forward, The key technology was analysed, then a normative and precise solution based on shell script which closer to the enterprises practical application was proposed. The firewall on network layer can not only protect the trusted region of the enterprise, but also can custom and achieve the interflow inside and outside the enterprise through MASQUERADE and DNAT.
484
Abstract: It set up a quick and high accurate method of 3D measurements from the 2D digital photogrammetry to reconstruct the scene by teleprocessing. Three types of feature marks in the matrix arrayhave been projected. The calibrations of the camera with fixed focal length have been calculated and compared before and after revision. The cross-shaped feature was the most accurate mark. And the cone barrel with sharp apex was also more accurate than the traditional round dot. The real case practices have been engaged in to verify the practicability and efficiency of the projects. In less than 10m with 6 points, the maximal error has been reduced to 0.029%. In around 20m with 20 to 34 ponits, the maximal error has been reduced to 0.046%. And it was far more accurate than the counterpart research (0.44%).The measurements results of the more big areas have been found to be instability. So the lawful choice of the single photogrammetric image scope should be limited to 20m. In the proper image scope (<26m), the telecontrol 3D measurements are very accurate and highly active. It can be positively applied to the remote scene reconstruction as well as other engineering vistas.
489
Abstract: We present a new approach for constructing the initial 3D geological models in the process of man-machine interactive interpretation for gravity and magnetic anomalies. Firstly, we introduced the steps of method. It includes some auxiliary vertexes and sections techniques. Then, the forward algorithm of the model is given. And the data structure of the model is devised, later the modifying method and visualization method is discussed. This method is realized in our 3D gravity & magnetic anomaly interpretation system based on VC++6.0 and OpenGL. Using this method, the geophysical interpreter can construct or modify the geological models easily under the three dimension environment. The tool can give them visual 3D models, so it enhances the efficiency of the interpretation.
495
Abstract: To solve the problem of lacking of inferential evidence which exists in state transition of battlefield situation of Bayesian net, the methodology of state transition of battlefield situation based on rough sets and Bayesian net is proposed. Furthermore, the method of getting causal intensity based on decision table to calculate the confidence degree of corresponding battlefield situation node is researched, and the confidence degree is modified by non-redundant attribute value. Finally, the state transition of battlefield situation based on Bayesian net inference is discussed in detail. And a case study of anti-air operation is given to verify the correctness and validity of the proposed method.
501
Abstract: Plasmodiophora fire of broad bean is responsible for Olpidium Viciae Kusano, which is a kind of Fungi subdivided into bacteria flagellum amon. We have developed a polymerase chain reaction based method for the rapid identification internal transcribed spacer (ITS) regions of productionally significant fungi Olpidium Viciae Kusano from areas of 2500~3000 metres above sea level. Sequences of the nuclear internal transcribed spacer (ITS) regions ITS1 and ITS4 have been used widely in molecular characteristic studies because of their relatively high variability and facility of amplification. A universal quickly SDS micro-DNA extraction method was used combining a RNaseA pretreatment step to remove PCR interferential RNA. Target sequences in ITS regions genomic were amplified by PCR and sequenced. Using Hanpanchun lesion and healthy bean leaves as template and ITS1, ITS4 as primer to amplify ITS region, the results revealed ITS gene of broad bean genome could be amplified with size of 750bp from healthy leaves, it could be amplified two fragments of 750bp and 500bp from the DNA template extracted from Hanpanchun lesion tissue. The ITS sequence of Olpidium Viciae Kusano is 99% homoeology with Cercospora (grey speck) pathogen. This may lay the foundation for research about classification and analyze evolutionary relationships of Olpidium Viciae Kusano.
507
Abstract: The analysis of the codon usage pattern of Porcine Cytomegalovirus (PCMV) DPOL gene has both theoretical and practical value in understanding the basics of molecular biology and selecting appropriate expression systems to improve the expression level. In this study, the codon usage pattern of PCMV DPOL gene and other 36 reference herperviruses were analyzed, the results showed that the codon of PCMV DPOL gene was strong bias toward the synonymous codons with G or C at the third codon position, and was closer relatively to these viruses which were classified in Betaherpesvirinae. Correlation analysis indicated that there was no obvious correlation between PCMV DPOL gene and it’s host swine, and 13 codons showed distinct usage preference between PCMV DPOL gene and H.sapiens, whereas 16 in the E.coli and 27 in the yeast. Thus the mammal expression system may be more appropriate for the expression of PCMV DPOL gene.
514
Abstract: The regional technological innovation capability is an important standard to weigh the development of regional economies, and it also plays a crucial role in the growth and competition of the regional economies. As there is really quite a difference in the capacities of regional technical innovation, this paper first makes a principal component analysis (PCA) on the indexes of capacities of regional technical innovation by adopting MARLAB. Then, it clusters them based on extracted principal component scores and the results were analyzed. Through the discussion on clustering results, it could help us to improve the knowledge of regional economic unbalance and capacity of regional technical innovation
521
Abstract: As a computing mode, cloud computing has applied on the manufacture and life, its advantage such as convenience, shortcut and on-demand service is emerging gradually. This paper researches that how to make the usage of cloud computing high-efficiency. It summarizes the characteristic of cloud computing portal management model by analyzing the demands of security, visualization and individuation services. It researches the models both from customer entrance & management and individuation service stocking & management.
525
Abstract: Disperse device and multiple physics parameter are the important specialties of large-scale complex electromechanical system. A new hardware network is presented according to these specialties and management of the device in this paper. In the network, some wireless mobile terminal carried by maintenance personnel are employed to data acquirement and sent data to fixed diagnosis center. The center is employed to fault diagnosis, feed back the diagnosis result to corresponding wireless mobile terminal, data management and trend analysis.
531
Abstract: This paper presents a blind watermarking algorithm based on quantization index modulation (QIM) and singular value decomposition (SVD) in the wavelet domain. Obtain approximation sub band of the wavelet domain coefficient matrix by performing a wavelet transform on host image. The QIM technique determines the quantization step for each embedding block. The SVD technique is modified the SVs of each embedding block. The watermark encrypted by a chaos sequence generated by Lorenz chaotic system is embedded the host image. The experiments show that this paper presented algorithm in various attacks against the image has good robustness especially for against geometric attacks and image compression.
536