Advanced Materials Research
Vol. 414
Vol. 414
Advanced Materials Research
Vol. 413
Vol. 413
Advanced Materials Research
Vol. 412
Vol. 412
Advanced Materials Research
Vol. 411
Vol. 411
Advanced Materials Research
Vol. 410
Vol. 410
Advanced Materials Research
Vol. 409
Vol. 409
Advanced Materials Research
Vols. 403-408
Vols. 403-408
Advanced Materials Research
Vol. 402
Vol. 402
Advanced Materials Research
Vols. 399-401
Vols. 399-401
Advanced Materials Research
Vols. 396-398
Vols. 396-398
Advanced Materials Research
Vols. 393-395
Vols. 393-395
Advanced Materials Research
Vols. 391-392
Vols. 391-392
Advanced Materials Research
Vols. 383-390
Vols. 383-390
Advanced Materials Research Vols. 403-408
Paper Title Page
Abstract: Optical flow estimation from image sequences is of paramount importance to computer vision applications. Many optical flow algorithms have been proposed for optical flow computation, which minimize a certain energy function involving a data term and a smoothness term. In this paper, we propose a new method to compute optical flow by decomposing the Laplacian operator along the tangential and gradient direction of the image. Experimental results show that the new method could gain more accurate estimation of optical flow around motion discontinuities compared with the classical methods.
2449
Abstract: This paper proposes a new routing strategy on complex networks. Based on the idea of greedy algorithm, our routing strategy chooses the node that has the highest probability to reach destination with the studies of max degree search strategy. In the meantime, the dynamic information like queue length will affect influence our strategy in order to increase the capacity of network. The result of simulation shows our strategy has a better performance compare to other local routing strategy. This strategy can be used on different kinds of complex networks.
2453
Abstract: Grasping security situation of the Internet of Things (IoT) is useful to work out a scientific and reasonable strategy to defend the IoT security. In the interest of resolving the problems of the security situation sense technology for IoT, a security situation sense model based on artificial immune system for IoT is proposed in this paper. Security threat sense sub-model, formulation mechanism for security threat intensity and security situation assessment sub-model are established. The security threats in the IoT environment are surveyed effectively. Quantitative and accurate assessment for the Real-Time security situation is realized. Theoretical analysis shows that the proposed model is significative of theory and practice.
2457
Abstract: In this paper, we use K-means algorithm to realize dynamic clustering for the information of personal credit card bills, and through the statistical analysis of the results, we can get the analytics of the general trend of consumer behavior completely. In the experiment, we use K-means Algorithm to implement the clustering and analyze the experimental results which show that the results of this clustering can play a certain role in the analysis of the credit habit of discreditable users and high quality ones.
2461
Abstract: A numerical model for simulating of 2D flood waves was presented using the physical fractional-step method. Numerical simulations for 2D flood waves were implemented. The comparisons with other numerical solutions show that the proposed method can be capable of dealing with 2D dam-break flood waves.
2465
Abstract: With the continuous development and improvement of wireless communication technology, the logistics information management system based on PC limits the timeliness of information exchange in the logistics business process. The java-based J2ME mobile phone as a wireless terminal device with the convenience of carry; therefore the J2ME technology in the construction of logistics information is a new way of thinking. This paper first makes an overall design of mobile logistics information management system structure, analyzes the basic function of this system, researches the network connection between client and server and realizes the server-side functionality design. Finally, the article concluded that the J2ME technology can be widely used in mobile management system, and the logistic information management system based on J2ME can greatly improve the working efficiency of the logistics enterprise.
2469
Abstract: This paper presents the real estate early-warning and forecasting system developed to monitor and provide pre-warning to the user decision makers in the property market. The paper analyses essential factors affecting the real estate market, and build the conceptual model of the real estate early-warning and forecasting system. A statistical control 3 sigma criteria method has been developed, which can provide to compute the warning limit. In addition, the system framework model has been developed, which can provide a development idea to further design this system.
2473
Abstract: The normal role-based access control (RBAC) model decouples users and permissions through roles,and different software systems have different implementation syteles.The paper proposes an engine model which can configure the RBAC management systems flexibly.It is a configuration tool to generate different RBAC management systems which meet different users’ requirements. The practice proves that the engine model can improve the efficiency and quality of software development. The role-based access control model decouples users and permissions through roles in order to simplify authorized operations and safety management[1]. Many literatures[2-6] discuss the RBAC model from different aspects. Some literatures[2-3] add new elements to the normal RBAC model,and these models are unidimensional according to the manipulated resources.For example, the NIST RBAC reference model [2] extends and standardize the RBAC96 [1] model reasonably.Some literatures[4-5] introduce time property to RBAC model and they are two-dimensional models according to the manipulated resources.Literature[6] furtherly add visual data muster to RBAC model and proposes a three-dimensional access control model. All of these models only discuss access control model theoretically,and different role-based access control modules in software systems have different instantiation sytles.For example, a RBAC module in one software system can not meet the access control requirements in another system because different RBAC modules have different table fields in order to realize certain requirements. This paper proposes a flexible role-based access control engine which can configure the RBAC module for different systmes according to each customer’s requirement.The engine is a configuration tool and it can realize various RBAC modules which have different table fields in database.The paper is organized as follows.Section I introduces the basic concepts of the NIST RBAC model;Seciton II details the description of RBAC engine model and gives the configuration steps using this engine to generate RBAC instances,and at last section III gives an example and concludes the paper.
2477
Abstract: A fully integrated S-band high efficiency power amplifier using the TSMC 0.35 um SiGe BiCMOS technology is presented. The two-stage power amplifier has been optimized for the whole S-band covering 2 GHz to 4 GHz frequency band for higher 1-dB compression point and efficiency. The input and output matching networks are designed on chip. From the simulate result, the two-stage power amplifier achieves high PAE of 28% and saturation output power of 23.3 dBm at 3 GHz, with the small signal gain of 18.7 dB. Besides, this PA realizes the PAE within the band of 2.4GHz to 4GHz exceed 25%, and the highest PAE of 30.6% at 3.4 GHz.
2481
Abstract: In order to reveal the impact of different viewing field on observer metamerism and accuracy of soft-proofing between display and printed samples. An EIZO LCD display was placed inside the back of the viewing cabinet concealed by a grey background board. 38 observers were asked to match 9 test colors for each configuration. The spectra-data of printed samples and the matched color patches were measured by Photo- Research PR-650 in this experiment. The CIELAB color difference was used to evaluate the intra-observer and inter-observer variability under different viewing field. The chromaticity ellipses were used to evaluate the observation variability of an observer repeated several times and all observers. Observers had similar observation variability in the two configurations. Both sets of results had smaller observer variability and a closer agreement to the CIE standard colorimetric observer.
2485