Advanced Materials Research Vols. 433-440

Paper Title Page

Abstract: An algorithm of sequence medical images segmen- tation is proposed based on the combination of snakes algorithm and contour interpolation algorithm. Firstly, this algorithm uses snakes algorithm to segment the key layers in which target area change drastically. Then the algorithm calculates the position of reference points in the middle layers with the contour interpolation algorithm. Finally, snakes algorithm is applied again to segment the middle layers. Thus the segmentation of the sequence medical images are accomplished automatically. The experiments showed that the algorithm can obtain the boundary of the desired object from a sequence of medical images quickly and reliably.
3636
Abstract: Compound KdV equation and MKdV equation are investigated in the presented work, with the aid of Matlab software, using the trigonometric function transform method and the Wu elimination method, and more exact traveling wave solutions are obtained for compound KdV equation and MKdV equation.
3642
Abstract: On the absence of space-time information, it is difficult to extract the character stroke feature from the off-line handwritten Chinese character image. A feature extraction algorithm is proposed based on analog space-time process by the process neural network. The handwritten Chinese character image is transformed into geometric shape by different types, different numbers, different locations, different orders and different structures of Chinese character strokes. By extracting fault-tolerant features of the five kinds of the off-line handwritten Chinese characters, the data-knowledge table of features is constructed. The parameters of process neural networks are optimized by Particle Swarm optimization (PSO). The handwritten Chinese characters are used to carry out simulation experiment in SCUT-IRAC-HCCLIB. The experiment results show that the algorithm exhibits a strong ability of cognizing handwritten Chinese characters.
3649
Abstract: A stereo matching algorithm with support regions based on color and texture estimate is proposed. Firstly, the initial support regions are selected from the image according to the distribution of the quantized color labels. Then, the texture similarity is used to determine the arm length growing and combine adjacent regions. The accurate support regions are obtained. Thirdly, the support weight is introduced under the constraint of support region. Finally, the initial disparity can be corrected by using disparity adjustment method until a reasonable disparity map is obtained. The experimental results show that the good disparity result can be obtained.
3656
Abstract: This paper has proposed a new approximate matching algorithm—similarity matching, and use the characteristics of algorithm to establish a system of internet music search by humming. The author compared the similarity matching algorithm and dynamic time warping (DTW) algorithm, which is most commonly used to query by humming, by the system of internet music search by humming. On the two standard of the query hit ratio and query speed, we got the result that similarity matching algorithm's comprehensive efficiency is superior, is one of QBH (query by humming) algorithm, which is applicable to the large-scale music library such as internet music search.
3662
Abstract: By reviewing the application status of traditional clock synchronization methods and architectures under different protocols in a comparative way in China, this paper analyzes the application of IEEE1588 protocol in power dispatching automation and puts forward new clock synchronizing schemes in electricity dispatching communication network based on IEEE1588 protocol (or Std. IEC61588) and proposes some futuristic research fields referring to IEEE1588 protocol in power dispatching automation. New schemes have better clock synchronizing precision, featuring in low implementation cost compared with other clock synchronization schemes. At the same time, it will effectively lower system resource requirements, relieve current excessive reliance on GPS clock source, mitigate data fetching and exchange congestion. It will shed light on building domestic power dispatching networks under the PTP protocol as well as constructing smarter power grid both at home and abroad in the future. This work is supported by North China Electric Power University, Sifang & Huaneng Power System Control Co., Ltd and Zhuhai Power Electricity Supply Company in SMART SYNCHRONOUS DEVICE RESEARCH BASED ON IEC61850 AND IEEE 1588 project, which involves a wholesale research in clock synchronization of power dispatching communication networks and developed China’s first set of smart clock synchronization devices, including the clock synchronization handler CSE6000 (briefly introduced in part v) and corresponding kilomega Ethernet switch. Our research results have reached the advanced level at home, and we are applying for a patent protection accordingly.
3669
Abstract: In this paper, the design and implementation of multifunctional intelligent terminal in bank service based on SST89E58 are introduced. This terminal is an interactive interface composed of touch screen and LCD. It is capable to complete such functions as password input, service selection, account information inquiry, service evaluation, advertising display, etc. Therefore, it can conveniently and effectively help customers understand the whole transaction process, thus increasing the efficiency of bank transactions. In this paper, the principle of the system composition, the main hardware circuits and software design, and the software implementation of DES encryption algorithm have been described. And the design has been endowed with favorable practical value.
3677
Abstract: Proxy mobile ipv6 protocol is a mandatory protocol to support inter-working among heterogeneous mobile broadband networks. In order to support compatibility to IPv4 network, a mobility infrastructure in the proxy mobile ipv6 that provide ipv4 extension is presented in this article. An authentication protocol based on authentication option is proposed to protect this proxy mobile IPv6 protocol with IPv4 support. A SVO formal Analysis method is used to prove the security of this protocol.
3683
Abstract: For realizing data acquisition and transmission based on PCI bus, a device driver was designed for data acquisition card, which use TMS320DM642 of TI and it’s PCI interface as transfer protocol. And in this development, we use VC++6.0, DDK and DriverStudio3.2 to develop the PCI bus driver for Windows XP, and realizing DMA high-speed data transfer method between data acquisition card and computer RAM.
3688
Abstract: In wireless sensor networks (WSNs), sensor nodes share wireless channels to communicate with each other. So, link congestion often occurs and induces data retransmission easily. To avoid these issues, data transmission efficiency would be greatly enhanced and the energy consumption of network would save a lot. Based on this idea, we have designed a transmission-effective congestion-cognized (TECC) routing protocol in the paper. Routings are selected probabilistically and real-timely, according to the out-bound nodes’ satisfactory degrees of forwarding. Also, time stamps are used to control nodes’ status, effectively reducing the occurrence probability of conflict and link congestion in networks. Simulation results show that, TECC routing protocol has good performances of low-latency and energy-consuming equilibrium, which could significantly improve energy utilization and data transmission efficiency of network.
3692

Showing 611 to 620 of 1287 Paper Titles