Advanced Materials Research
Vol. 545
Vol. 545
Advanced Materials Research
Vol. 544
Vol. 544
Advanced Materials Research
Vols. 542-543
Vols. 542-543
Advanced Materials Research
Vols. 538-541
Vols. 538-541
Advanced Materials Research
Vols. 535-537
Vols. 535-537
Advanced Materials Research
Vol. 534
Vol. 534
Advanced Materials Research
Vols. 532-533
Vols. 532-533
Advanced Materials Research
Vol. 531
Vol. 531
Advanced Materials Research
Vol. 530
Vol. 530
Advanced Materials Research
Vol. 529
Vol. 529
Advanced Materials Research
Vol. 528
Vol. 528
Advanced Materials Research
Vols. 524-527
Vols. 524-527
Advanced Materials Research
Vols. 518-523
Vols. 518-523
Advanced Materials Research Vols. 532-533
Paper Title Page
Abstract: The Frequency-Shift Keying (FSK) signal is frequently used in track circuits because of the strong ability of resistance interference. Symbol rate is one of the important signal parameters for safety of railway. The paper propose a algorithm of high precise detectation of FSK signal using Chirp-Z transform; Theoretically gives the detailed explanation to the major technique, and has carried on the Matlab simulation, The simulation result indicates this method during the enhancement is shifted signal examination precision, reduced the computation order of complexity.
827
Abstract: Characteristics of SketchUp which is a kind of three-dimensional architectural design software and its shortage in real-time splitting are discussed in the paper. Taking a residential building as example, the author introduces the specific method of creating a ladder profile using group. Drawing building ladder profiles become simple and quick by using the method which improves the efficiency of drawing and has a strong practical value.
832
Abstract: The growing interest in the Semantic Web and the Web Ontology Language (OWL) will reveal the potential of Description Logics in industrial projects. The rich semantics of OWL provide powerful reasoning capabilities that help build, maintain and query domain models for many purposes. However, before OWL can unfold its full potential, user-friendly tools with a scalable architecture are required. In this paper, we design and edit the family ontology using Protégé OWL Plugin, which is developed by Stanford University.
836
Abstract: This paper discusses the trusted computing model which is based on existing computer network. The present trusted computing platform has to make big changes on personal pc hardware system in order to realize the trusted computing platform module on pc mainboard or hardware. To solve this, here presents a layered trusted computing platform module, which replaces the original trusted computing platform module with implemented modules on server. The prototype model ensures the trust measurement being implemented on any logical layers of the trusted platform with making a complete trust chain from the beginning of the boot stage of the client operating system. By creating a trusted computer platform with all the computers in the system, real trustworthiness in the entire local area network can be realized.
841
Abstract: This paper put forward an idea of multi-data sources report model based on data dictionary in order to separate the report from application program. When report changed, we can alter the system data dictionary, data source dictionary or modal file dictionary to adapt to new requests without any changes for application program. This brings to high independence between application program and report system. At the same time we can transplant the report system to different software system without any changes.
846
Abstract: This paper analyzes a sort of color still image algorithm based on the Logistic map sorting, and verifies the confidentiality. Further, this algorithm will be applied to the authentication module in network identity authentication system. A new, safe and effective certification system is realized based on the network identity card, and the authority authentication is provided for users requiring identity identification on the network. Nowadays, cryptography and network security is a hot topic for communication and computer industry. Currently, encryption technique in the information security mainly contains conventional private key encryption system and public key encryption system, the former has low computation overhead, but its encryption strength is not high; the latter, although has high encryption strength, its computation cost is huge. Therefore, it has profound theoretical significance and wide application prospects to research a sort of information encryption algorithms and information security software system with security, good confidentiality and high calculation speed. Chaos phenomenon is a determinacy process which is similar to random, and often appears in nonlinear dynamical system, this process is neither periodic nor convergent, and is sensitively dependent on initial value [1-3]. These basic features of chaotic system can just meet the basic requirements of secret communication and cryptology. The researches of Secret communication, information encryption and information hiding technology are based on chaos theory, and have become one of popular and frontier topics developed by the cross fields of international nonlinear science and information science. Also it is an international, high-tech researched new field, cryptography based on chaos theory has recently become very popular science [2]. In our paper, chaotic model images encryption technology is applied to Network identity authentication system to prevent rampant e-commerce fraud.
850
Abstract: We present a more efficient computer-aided diagnosis algorithm to detect pulmonary nodules automatically in CT (Computerized Tomography) scanned images based on region growing with optimization parameters: initial seed points and constraint condition. The former are chosen by 3D (three-dimension) PCA (principal component analysis), and the later is designed by distance map and watershed algorithms. The technique was tested against more than 200 CT images of 10 typical cases from Jilin Tumor Hospital. The results confirm the validity of technique as well as enhanced performance.
854
Abstract: It is difficult to segment instances of object classes accurately unsupervised in images, because of the complexity of structures, inter-class differences, background interference and so on. A multi-scale semantic model method is proposed to overcome the disadvantages existing in most of the relative methods. This method uses generative model to deal with the objects obtained by multi-scale segmentations instead of whole image, and calculates kinds of visual features to mine the topic information of every object. In the segmentation process, a semantic correlative function of every segment block based on KL divergence is built up and minimized to select the object correct regions. Experimental results demonstrate the effectiveness of the proposed method.
859
Abstract: To remedy the defect of data storage possible overflow to lead the latest data loss in the data storage system, this paper proposed a method using data rewind mechanism to store data to solve data storage possible overflow problem. The result indicate that the discrete data storage area is turned into end to end of the closed loop Using data rewind mechanism, to realize a data storage does not overflow. In view of data rewind lead to the problem of incomplete data, the paper put forward the method of the backward analysis, by comparing the adjacent data storage space whether there is the intersection to determine the complete data, incomplete data is discarded.
865
Abstract: Based on survey data selected from detecting coils locating in Shanghai inner loop elevated roads, speed-volume relationship charts were plotted. Some characteristics were selectively analyzed in certain traffic and road conditions such as traffic speed-volume variety characteristics of different lanes in same road section and traffic speed-volume relationship comparison of same lane in different road sections. Finally, statistics models were built to do further study with application of these traffic characteristics. This study can provide reference for traffic design, management and control projects.
871