Advanced Materials Research Vols. 403-408

Paper Title Page

Abstract: This paper analyzes the security problem and the popular security technology of Mobile Agent system. A new mechanism of Mobile Agent security system in open platform, a three tier protection model, that is code mess up, limited life time of code and data, encryption, associated with CA, used for protecting Mobile Agent from the attacks of malicious hosts is discussed. A method to deal with Mobile Agent in different level management and certification services, used for constructing hosts’ secure environment is also proposed. The security mechanism has been conducted, which shows the mode has taken into effect.
1332
Abstract: Prediction of car ownership has direct reference significance for the development of urban transportation and construction of urban roads. By analyzing the impact factors of urban auto possession, this paper first analyzes 8 indicators such as urban population, GDP, road passenger traffic and so on determined by some references, then establish BP neural network model to predict the vehicles possession in Hunan Province from 2006 to 2008. The figures of prediction is 989,300, 1,221,800 and 1,370,300 respectively in 2006, 2007 and 2008, which is very close to the real ownership of 946,400,1,217,200 and 1,426,700 respectively. It shows the prediction is very accurate. This suggests that the BP neural network has very strong learning and generalization ability and can be employed in prediction of vehicle possession effectively. The prediction of car ownership, as a foundational work for transportation planning,has direct reference significance on the development of urban traffic,its control and management and construction of urban road, etc.Early in 1940s this research has been started in foreign countries[1]. Many different models of prediction of car ownership have been developed.Many of them are developed mainly based on the factors such as urban economy, population network capacity, the land utilization and parking facilities.In China there are also some researches on this issue. They predicate the car ownership mainly by time series prediction, regression analysis and fractal theory and entropy method [2~6].However, these methods do not comprehensively describe the complex relationship between car ownership and other factors. The author of this paper chooses some car ownership-related factors and employ principal component method to analyze to obtain the main factors, then tries to find the relationship between BP neural networks and car ownership according to these factors so as to predict the car ownership in Hunan Province form 2006 to 2008, which will be greatly significant to the development of urban transportation, management and construction.
1337
Abstract: Through literature review and case study, identifies such factors leading to financial crisis of BMIE as external environment,risk awareness,strategic decision-making,business management,internal control system and corporate governance. It also builds a structural equation model on the base of the investigation data from 279 domestic enterprises. The study result shows that strategic decision-making,enterprise management, enterprise governance and internal control system cast great influence on financial crisis,while the external environment fails to pass the test of significance.
1342
Abstract: The network theft is a common cyber crime. As a new type of theft, theft of their means of theft of objects, and other aspects of its specificity, the state is no longer the traditional theft accomplished consummated theft of state for the network, or give cyber criminals a lot of loopholes in the law, which will indulge all Internet criminals indulging in all kinds of loopholes in the law of theft in violation of the purpose of criminal legislation, which will not benefit social harmony. Completion of the finds on the network by stealing from the account that is more reasonable, more conducive to the kinds of criminal punishment.
1348
Abstract: Image compression is a technology using as little as possible bits to represent the original image. As wavelet transform has local characteristics on the time and frequency domain, it makes up the deficiency of DCT. Moreover, its multi-resolution characteristics can easily associate with the human visual system (HVS). Besides, wavelet-based image compression is prone to combine with new image coding methods. It has become the research hotspots at present. This paper introduces wavelets theory and discusses the research status and progress of wavelet-based image compression then points out the main problems. Finally, the prospect in the future was presented.
1352
Abstract: In order to implement the accuracy and robust of Chinese dates surface defect detection based on machine vision techniques on line, the method of detection for Chinese dates was studied. The Chinese date is segmented from the background in RGB color space by analyzing respectively the histogram of R, G and B channel to make comparing among them and find an optimal one, resulting in good contrast between Chinese date and background in G channel. The brightness of the damaged area edge changed clearly on the whole Chinese dates area according to the gray image of R, G and B channel, especially in G channel. It shows the gray value of the defect area breaking obviously. So the damaged area could be detected by edge detect, through image thinning the defect edge was extracted. Furthermore, the geometry parameters of defect edge were calculated, these parameters could used to distinguish the defect area with the fruit area and the degree of the defect area. Experiments result proved the methods is effective to detect defect area of Chinese date.
1356
Abstract: This paper describes that through Android platform in the mobile terminal we can send or receive the commodity anti-counterfeiting message, send commodity anti-counterfeiting message to enterprise information processing platform, send back the data to mobile terminals which had been processed, and displayed to consumers’ the screen through the information processing. Mobile terminal anti-counterfeiting technology has much more sophistication than the no digital anti-counterfeiting technology. It not only can feedback commodity genuine or fake information to consumer, but also can help the enterprises to realize merchandise sales information collection through computer network technology, database technology, and enterprise intelligent web system.
1360
Abstract: The article sets up a self-adaptive network test model and introduces a system for the course “Linear Algebra”. The system can present different problems on the basis of tester level and the process of answering question. The system may reduce the amount of test question, shorten the time of the test and estimate more accurately the level of the tester relative to tradition test. The paper has certain direction meaning for tester self-test and computer assistant test.
1364
Abstract: The effects of linoleic acid on hepatopancreatic cell culture of the kuruma prawn, Penaeus vannamei were conducted. The culture system consists of 199 media (M 199) supplemented with 0.060 mol/L NaCl, 1.011g/L glucose, 1000 UI/ml penicillin, 1000 μg/ml treptomycin, 20% heat inactivated fetal calf serum (FCS) for primary cells and 10 % for subculture cells. The content of phosphorus in cultured cells was measured. The results show that the growth condition of cultured hepatopancreas cells in P. vannamei was significantly improved by added 160 μmol/L linoleic acid.
1368
Abstract: Using of advanced information technology to make scientific analysis and guidance to operation is serves as an effective means to enhance laboratory manage level. Object-oriented technology and modular design methods, application MVC design and software engineering methods to achieve network laboratory operation management information system based on J2EE and B/S model, gives a complete set of solutions and systems implementation. The operation of the system to improve the quality of education, expanding the scope of services is conducive to sharing resources, improve work efficiency to play a good role, has some practical value and spread value.
1371

Showing 231 to 240 of 984 Paper Titles