Advanced Materials Research
Vol. 545
Vol. 545
Advanced Materials Research
Vol. 544
Vol. 544
Advanced Materials Research
Vols. 542-543
Vols. 542-543
Advanced Materials Research
Vols. 538-541
Vols. 538-541
Advanced Materials Research
Vols. 535-537
Vols. 535-537
Advanced Materials Research
Vol. 534
Vol. 534
Advanced Materials Research
Vols. 532-533
Vols. 532-533
Advanced Materials Research
Vol. 531
Vol. 531
Advanced Materials Research
Vol. 530
Vol. 530
Advanced Materials Research
Vol. 529
Vol. 529
Advanced Materials Research
Vol. 528
Vol. 528
Advanced Materials Research
Vols. 524-527
Vols. 524-527
Advanced Materials Research
Vols. 518-523
Vols. 518-523
Advanced Materials Research Vols. 532-533
Paper Title Page
Abstract: In order to overcome the excessive dependence among the traditional intrusion detection system components, high rate false-alarm phenomenon caused by multiple alarms to the same invasion, inability to adaptively replace mining algorithm when testing environment has changed and other issues, this paper puts forward an Agent based distributed adaptive intrusion detection system, which employs Joint Detection mechanism for mining algorithm module, and Dynamic Election algorithm for the recovery mechanism, thereby improving the system adaptive ability to the external change.
624
Abstract: In this paper, intelligent laboratory management system terminal are implemented based on embedded ARM system. The system is composed of ARM applications terminal and network server accessing to Internet, which provides intelligent access control, fire alarm, automatic attendance, video surveillance and voice intercom functions. And also the approval of intelligent online booking, real-time information bulletin features can be achieved. For laboratory personnel management, the system provides a good solution of identification and appointment approval, real-time monitoring, information management background. This paper describes functions of system terminals, focuses on terminal software solutions and key technologies. The terminal is implemented on the S3C2440 processor device and applied to practical engineering, proves the correctness and reliability of the program.
630
Abstract: The paper realizes the face detection algorithm based on the combination of the skin model and the Haar algorithm. Firstly, a platform for sample labeling was constructed, which combines the contour extraction algorithm with manual labeling. By labeling more than 10000 images obtained randomly from the Internet, a large training dataset is available. Then, a skin histogram, a non-skin histogram and a statistical skin model are constructed by analyzing the distribution of the skin and the non-skin color on the basis of a large training dataset. Based on this statistical color model, the skin area is detected and split from video files frame by frame. With the Haar Object Detection algorithm and the morphology algorithm such as erosion and dilation, the background noise and non-face areas are removed from the detected skin area and facial area is detected, which provides the basis for face recognition and the video-based visual speech synthesis. Compared with the Haar-based face detection method, our algorithm greatly improves the rate of correct detection and reduces the rate of the false positives.
634
Abstract: Battle damage level classification and judgment rule are established in order to evaluate battle damage for integrated electronic information system. The function index system of integrated electronic information system is established based on its function hierarchy decomposition through analyzing its function requirements. Using the ideas of fuzzy comprehensive evaluation method and analytic hierarchy process, an evaluation method of battle damage assessment for integrated electronic information system is proposed based on the function index system. The correctness and validity of the proposed method is verified through a calculation example. The result of the example indicates that the damage level of integrated electronic information system can be achieved from the proposed method correctly.
639
Abstract: According to analysis of relationship among fire distribution, area division and path planning, the thought of trinity tactical decision of surface ships formation missile path planning (SFMPP) is put forward. Expandable open simulation architecture is designed and established based on high level architecture HLA. In order to describe simulation requirement, the static structure model and dynamic behavior model were designed based on UML. Based on HLA/RTI specification, federation’s FOM/SOM is designed and developed. The implementation process of simulation system is expatiates, including simulation strategy, time management, modeling and the federates’ implementation process. The realization of SFMPP simulation system provides a reference trial platform for tactical application argumentation and armament development.
645
Abstract: The stock management problems of weapon system’s maintenance and insurance spare part are analyzed, and the advanced experiences about spare part maintenance are summed up. After calculating the compartmentalize, structure and proportion of weapon system’s spare part, analyzing the proportions of spare part concretely, one reasonable stock structure model and the actualized direction are proposed in succession, which can be used as the design-making foundation of consummating the management system about weapon system’s spare part. At last the advice about spare part structure’s optimization is given.
650
Abstract: Because of the universal existence of time-delay phenomenon in industrial process control, this paper analyzes the characteristics of two kinds of control methods, discusses the relations between general control algorithm and Smith predictor compensation, and simulated studies the mismatch of model, the change of delay time and the effect of the disturbance to the system. Simulation results show that: improved Smith predictor controller has the advantages of fast response and low overshoot. Especially in the case of the mismatch of model, it has better robustness and stronger anti-interference ability. The improved Smith predictor brings a good quality, which has little sensitivity to the model parameters. It provides a kind of method to overcome the time delay.
654
Abstract: On the basis of designing testing technological process, this paper introduces expert system into automation testing frame. Through the analysis of testing system state, automation testing expert system generates high-efficient testing cases, leaving automation testing process without manual intervention, thus solve the problem that different testing engineer abilities bringing about different testing qualities. Practice has proved that improved testing frame can high-efficiently test system defects, improving software testing speed and efficiency thereby, moreover guarantee the testing quality.
659
Abstract: It is the requirements of limited resources and realtime in embedded system. Design of network communication system based on embedded system is hard. In this paper, we propose the architecture of embedded network using Modbus TCP/IP protocol, analyze the composition of Modbus TCP/IP protocol. It is that Modbus protocol information can be made in the TCP/IP protocol of the Internet transmission, and thus extend the application of Modbus protocol. The network communication system is designed and implemented on the ARM platform using non-blanking socket in Linux. The system is available, stable and worthy of popularization.
667
Abstract: In this paper, we discuss a method for implementing online Viterbi algorithm as standard relational queries over streaming data. Our primary contribution is an approach to storing and manipulating most probable state paths, the candidate solutions to the problem, within a relational data model. We evaluate our prototype implementation over real-world sensor data from the Intel Lab dataset.
672