Advanced Materials Research
Vol. 545
Vol. 545
Advanced Materials Research
Vol. 544
Vol. 544
Advanced Materials Research
Vols. 542-543
Vols. 542-543
Advanced Materials Research
Vols. 538-541
Vols. 538-541
Advanced Materials Research
Vols. 535-537
Vols. 535-537
Advanced Materials Research
Vol. 534
Vol. 534
Advanced Materials Research
Vols. 532-533
Vols. 532-533
Advanced Materials Research
Vol. 531
Vol. 531
Advanced Materials Research
Vol. 530
Vol. 530
Advanced Materials Research
Vol. 529
Vol. 529
Advanced Materials Research
Vol. 528
Vol. 528
Advanced Materials Research
Vols. 524-527
Vols. 524-527
Advanced Materials Research
Vols. 518-523
Vols. 518-523
Advanced Materials Research Vols. 532-533
Paper Title Page
Abstract: With public emergencies’ frequent occurrences and mobile internet’s fast developments, emergency information managements under mobile Internet environment become a hotspot of study.This paper applies the complex network theory to the study on emergency information’s spread under mobile internet environment. This paper constructs the emergency information’s spread model with different clustering coefficient under mobile internet environment to study emergency information’s spread trend. The result shows that under mobile internet environment there is high relevance between the emergency information’s spread trend and the topological network’s clustering coefficient. Governments can adjust the clustering coefficient to improve the management of emergency information under mobile internet environment.
929
Abstract: This paper proposes a new intelligent vehicle access control system scheme based on image recognition and wireless transmission to achieve the secure, intelligent, and efficient vehicle access control management. The novelty of system is the image recognition based on information of the real-time license plate. If a vehicle wants to pass the gate, its license plate image is sent to the center server by the wireless transmission module. Then the image is analyzed by the server and the characters of the license plate can be recognized. Only the vehicle with permission can pass the gate. Compared with the traditional system, the new system is possible to provide a high-efficient access control and greatly reduce security work load.
934
Abstract: Text clustering typically involves clustering in a high dimensional space, which appears difficult with regard to virtually all practical settings. In addition, given a particular clustering result it is typically very hard to come up with a good explanation of why the text clusters have been constructed the way they are. . To solve these problems, based on topic concept clustering, this paper proposes a method for Chinese document clustering. In this paper, we introduce a novel topical document clustering method called Document Features Indexing Clustering (DFIC), which can identify topics accurately and cluster documents according to these topics. In DFIC, “topic elements” are defined and extracted for indexing base clusters. Additionally, document features are investigated and exploited. Experimental results show that DFIC can gain a higher precision (92.76%) than some widely used traditional clustering methods.
939
Abstract: This article, taking computer as USB (Universal Serial Bus) Host and C8051F340 MCU (Micro Control Unit) from Silicon Laboratories as USB Device Controller, has designed a USB Smallest Communication System. With the help of USB driver source code provided by Windows DDK (Device Development Kit), the system can realize the USB communication function between MCU and computer. The article describes the smallest unit design of USB firmware as well as simple USB application development in detail.
944
Abstract: This paper describes a new trademark image retrieval method based on the weighted region information entropy. In the first stage, image is rotated according to principal orientation, and the object region in the rotated image is extracted. Then, the object region is partitioned into a lot of sub-blocks along its circle orientation. In the third stage, the weighted information entropy of each partitioned region is computed, which construct a feature vector for describing the shape of the image. Finally, the Euclidean distance is adopted to measure the similarity between the images based on the feature vector of each image obtained. Experiment results show that this method can keep good invariance under translation, rotation, and scale, and the retrieved results match human visual perception very well.
949
Abstract: Due to the invariance to scale and rotation, image matching method based on Log-Polar transformation has been extensively applied in target detection and location. This paper analyses the effect on image matching accuracy from variation of scale and rotation, and proposes a modified image matching method based on analysis of data reliability for matching, this method can eliminate the interference from invalid data and improve the image matching performance. Experiments show that this method has better performance in accuracy.
954
Abstract: As a branch of Data-Mining, outlier mining is a promising prospect, and clustering analyse is a kind of technology in spatial outlier mining. The paper analyse the clustering arithmetic , compare some arithmetic of Clustring, and discuss the strongpoint and shortpoint of them.The paper research the spatial data and Outlier attributes in high dimensional space. And analysing the CLIQUE algorithm to detect the Outlier in high dimensional space, this approach can find the outliers in high-dimensional space effectively. In conclusion, the main trends of spatial outlier mining are forecaste.
959
Abstract: In this paper, an information service platform based on expert knowledge database was designed. The platform includes two parts: the front desk and the back management system. The front desk provides a friendly information service window for customers. The back management system includes an expert reasoning machine and a series of expert knowledge databases. Practices showed the information service platform was useful to help university librarians transforming their knowledge structure and improving the quality of information service.
964
Abstract: By defining the degree of dominance between two sets with respect to a certain criterion, a new alpha-dominance relation is proposed in this paper. And then a rough set approach based on this relation in disjunctive set-valued ordered information systems is presented. After that, a ranking method for all objects is introduced to the disjunctive set-valued ordered information systems, and a numerical example is illustrated to demonstrate the validity of this ranking method.
969
Abstract: To implement the problem that the side face detector is slow and its detection rate is low, in this paper, we choose the Adaboost face detection algorithm based on statistics. Then the characteristics of imaging processing software OpenCV and the principle and training flow of Adaboost face detector are introduced. Further, combination with the supplement Haar-like features improved, the full range of face detection based on OpenCV in CodeBlocks is achievement, thereby decreasing the loss of the human faces.
974