Advanced Materials Research
Vol. 500
Vol. 500
Advanced Materials Research
Vol. 499
Vol. 499
Advanced Materials Research
Vol. 498
Vol. 498
Advanced Materials Research
Vol. 497
Vol. 497
Advanced Materials Research
Vol. 496
Vol. 496
Advanced Materials Research
Vols. 490-495
Vols. 490-495
Advanced Materials Research
Vols. 488-489
Vols. 488-489
Advanced Materials Research
Vol. 487
Vol. 487
Advanced Materials Research
Vol. 486
Vol. 486
Advanced Materials Research
Vol. 485
Vol. 485
Advanced Materials Research
Vols. 482-484
Vols. 482-484
Advanced Materials Research
Vols. 479-481
Vols. 479-481
Advanced Materials Research
Vols. 476-478
Vols. 476-478
Advanced Materials Research Vols. 488-489
Paper Title Page
Abstract: An immunochemistry-based assay for non-instrumental simultaneous detection of fumonisins in food was developed. The method was based upon the direct competitive immuno-reaction and the horse radish peroxidase enzymatic reaction. The assay was developed to show a visual detection result, according to a yes/no response to the LOD of fumonisins. The limit of detection (LOD) was 40 μg L-1. The assay could be accomplished within 15 min in all and 4 min for chromogenic substrate application. The fumonisin contaminations in different kinds of food were analyzed by the proposed method and the results were confirmed by ELISA. Avoiding time-consuming reaction steps and complicated pre-treatment procedures, this assay was demonstrated as a promising tool for on-site sample detections.
1568
Abstract: A confidentiality system generally needs to operate under a non-network environment. Hence, the adoption of an offline model is necessary to realize data sharing. An offline data-sharing model based on encrypted Extensible Markup Language (XML) files is designed. The combination of various techniques, such as XML mode, XML encryption, and XML signature, and the introduction of the Security Solution Support Center enable the proposed model to achieve a safe point-to-point data interactive mode and a security-based software module. The software system based on this model can ensure that data files generated from the data provider could only be identified and verified by the authorized data receiver.
1574
Abstract: The time series ARIMA (3,1,4) model was established, which is taken into use of price forecasting. Then the forecasted price was applied to mining technical and economic index optimization study. Lead prices could be reliably predicted by time series ARIMA model, which had a high accuracy and the percentage of prediction error was 2.97% on average. It can solve the problems of the price data lag in the study of mine economic index optimization very well.
1582
Abstract: Fractal image compression is a lossy compression technique developed in the early 1990s. It makes use of the local self-similarity property existing in an image and finds a contractive mapping affine transformation (fractal transform) T, such that the fixed point of T is close to the given image in a suitable metric. It has generated much interest due to its promise of high compression ratios with good decompression quality. Image encoding based on fractal block-coding method relies on assumption that image redundancy can be efficiently exploited through block-self transformability. It has shown promise in producing high fidelity, resolution independent images. The low complexity of decoding process also suggested use in real time applications. The high encoding time, in combination with patents on technology have unfortunately discouraged results. In this paper, we have proposed efficient domain search technique using feature extraction for the encoding of fractal image which reduces encoding-decoding time and proposed technique improves quality of compressed image.
1587
Abstract: Transfer function is a very important parameter to evaluate the system performance, and it is one of the key methods to process and analyze information. First, the feasibility of this method is analyzed by the theory simulation in this paper. Second, the median is selected to filter the noise in the spectral data by comparing median filtering and Db3 wavelet filtering results. And then, the transfer function method is used on the data processing that captured by a linear CCD spectrometer. The experimental results show that the spectral data processing method base on the transfer function given in this paper is reasonable. This method can further improve the accuracy and the resolution of the instrument, and can make it possible to get a wide application of the CCD spectrometer.
1592
Abstract: English major students in China’s provincial higher institutions are facing a very fierce employment situation. In order to improve the students’ quality and their competitiveness of getting a job, we investigated the curriculum and cultivation modes for English majors, the teaching and learning conditions of twenty three provincial colleges and universities of Henan Province in China. On the basis of investigation and analysis of the existing problems, this paper puts forward some countermeasures. Colleges and universities of different types and at different levels should have different English majors training modes in order to have their own outstanding features. Inter-disciplinary English talents can be cultivated by paying attention to students' integrated English language competence and humanistic quality by strengthening English teachers’ training and inter-university cooperation and by innovating the English major undergraduates’ cultivation methods.
1597
Abstract: The network revolution has dramatically changed the way individuals communicate and conduct business. In the whole network system, WLAN is the most easily linked to the users. The diversity of WLAN communication makes it faced with various information security threats. This paper provides necessary and sufficient conditions for wireless network to lead to an increased security level. Concerns for WLAN security and confidentiality in a university environment were expressed in the paper. A number of recommendations are provided to initiate and promote WLAN security. The contribution of this paper is divided into three parts. Firstly, it introduces the overall network and the WLAN of Ningbo University in general. Secondly, it analyzes different WLAN protocol defects and the information security threats and attacks known in the campus LAN. Thirdly, it provides WLAN communication security precautions and the strategies adopted by our university for solution from the aspects of technique and management respectively.
1603
Abstract: The urban appraisal is the foundation of the chain enterprises’ successful sitting strategy, which greatly reflects the enterprise’ competitive power and the orientation of expansion strategy. This paper aims to study the problem of city selection of the chain enterprise. First of all, it uses the cluster analytic method to classicize the city, and then through establishes the city evaluation model, carries on sorting using the analytic hierarchy process to the similar city. Finally, it makes the empirical analysis to the six cities in Jiangsu Province. At last it establishes the model of urban evaluation which is based on the AHP theory to solve the problem of sitting of the retail chain enterprises, which has important theoretical significance in guiding how the chain enterprises expand and choose a new region orderly.
1609
Abstract: The contemporary manufacturing industries highly depend upon the change in customer needs and also focus on their varying demands across the supply chain. The uncertain demand and supply factor paves the successful supply chain of the manufacturing organization. The manufacturing organizations themselves imply many quality principles to withstand in the competitive market. This article deals with the selection of best suitable alternative for the case supply chain using Fuzzy Analytical Network Process (ANP). The advantage of using Fuzzy ANP is the selection of best suitable alternative by considering various interdependent values across the supply chain and also overcome vagueness associated with the computation.
1614
Abstract: Traditional Hough transform (HT) methods based on parameters decomposition do not give good result for concentric circle detection, for the reasons of its large amount of calculations, high demand of storage space and low efficiency in real-time application. To compensate the weaknesses, this paper employs a kind of improved Hough transform method which aims at reducing the parameters space. In this paper, the detection method is further improved through adding an edge detection procedure based on global threshold. The experimental results show that this algorithm meets the on-line detection of high accuracy requirement, with superior real-time performance and stronger anti-interference ability.
1619