Advanced Materials Research
Vols. 560-561
Vols. 560-561
Advanced Materials Research
Vols. 557-559
Vols. 557-559
Advanced Materials Research
Vols. 554-556
Vols. 554-556
Advanced Materials Research
Vols. 550-553
Vols. 550-553
Advanced Materials Research
Vol. 549
Vol. 549
Advanced Materials Research
Vol. 548
Vol. 548
Advanced Materials Research
Vols. 546-547
Vols. 546-547
Advanced Materials Research
Vol. 545
Vol. 545
Advanced Materials Research
Vol. 544
Vol. 544
Advanced Materials Research
Vols. 542-543
Vols. 542-543
Advanced Materials Research
Vols. 538-541
Vols. 538-541
Advanced Materials Research
Vols. 535-537
Vols. 535-537
Advanced Materials Research
Vol. 534
Vol. 534
Advanced Materials Research Vols. 546-547
Paper Title Page
Abstract: Multimedia technology development and the implementation of the Internet technology leading to a large number of image information appear, based on keywords retrieval methods of traditional text can not meet the requirement of image information retrieval, this makes the content-based image retrieval technology gradually become the focus of research. Based on the content retrieval technology of the key step is necessary in the extraction of image features, which can be used to extract the features such as color, texture and shape. However, because of the image characteristics can only hold each image similarity of a certain aspects, therefore how to better image will be based on content said image retrieval one of the important research direction. This article reviews some content-based image retrieval comparison, such as color features and the texture characteristics and the extraction of the kind of method, each have their own advantages is in.
595
Abstract: Milk yield automatic measurement in dairy farms plays a very important role in modern production management. Then, the measurement bottle scale and the reading recognition are key steps. So, this paper presents a new effective recognition algorithm on a printed numeric character of milk measurement bottle. The algorithm uses character image Euler number, the structural shape of printed numeric character, and vertical threading of character to accomplish the cascade classification. The method for character image does not need to be complex refining process, and has come up with a new algorithm of feature extraction from image sunken area. It reduces the complexity of the algorithm, the error recognition and rejection caused by thinning deformation. It greatly improves production efficiency and economic benefits. The experiment proves that the method is effective.
599
Abstract: Hidden credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. Current research related to hidden credentials has the shortage that the attribute model cannot provide the complex description. This paper presents a hierarchical hidden credential model which combines the attribute tree structure and the hierarchical identity-based encryption. Attribute tree structure is given that is used to organize sensitive information and the hierarchical hidden credential model is applied to carry and transport credentials, sensitive access control policy, and private resource and so on. This model expands the attribute from a simple atom one to an attribute tree. After the evaluation, it is proven that this model overcomes the shortcomings such as high-load network communication, too many credential exchanges which was caused by attribute-based access control policy. The usability and expansibility of hidden credentials were improved also.
604
Abstract: Flame image processing-based intelligent networked control system scheme of roller kiln is proposed in the paper. Flame image recognition method of simulating artificial-look-fire is proposed for the auxiliary detection of roller kiln burning zone conditions so as to improve the real-time detection accuracy of roller kiln burning zone and the control effect. The hardware and software platform of the system are also designed. The system proposed is mainly composed of six module such as key process detection module, flame process module, recognition model for burning zone, industrial control computer, network transmission module, and actuators. System software is mainly composed of five modules. In conclusion, the paper provides a kind of new method and new idea for research and design on flame image processing-based intelligent networked control system of roller kiln.
612
Abstract: S-boxes bring nonlinearity to block ciphers and strengthen their cryptographic security. A detailed analysis of the cryptographic properties of S-boxes of several block ciphers, such as SMS4, AES, Camellia and SEED, are made in this paper. Some algebraic properties of boolean function of S-boxes such as balanceness, non-linearity, algebraic degree and walsh spectrums are well investigated. We reveal the advantages and disadvantages of those S-boxes used in SMS4, AES, Camellia and SEED as compared with each other.
617
Abstract: Most classifiers lose efficiency with the problem of imbalanced class distribution, which, however, often shows statistical significant in practice. Therefore, the problem of learning from imbalanced datasets has attracted growing attention in recent years. The paper provide a comprehensive review of the classification of imbalanced datasets, the nature of the problem, the factor which affected the problem, the current assessment metrics used to evaluate learning performance, as well as the opportunities and challenges in the learning from imbalanced data.
622
Abstract: Based on detailed analysis of Bouguer gravity anomaly and magnetic anomaly by reduced to the pole, this paper uses correlation analysis method to analyze regional gravity and magnetic anomalies of different filter scales, including filter scales of 50km, 90km, and 130km, and then discusses the contributing factors of local gravity and magnetic anomalies in eastern Xinjiang. The results show that regional gravity and magnetic anomalies are cogenetic anomalies in some areas, such as Hangou, and northern Lamamiao, Jingrquan, and western Qijiaojing, gravity and magnetic anomalies are allogenic anomalies in other areas. The study reveals that regional negative gravity anomalies are chiefly caused by Cenozoic – Mesozoic with larger thickness and lower density, and regional positive magnetic anomalies are mainly caused by Precambrian metamorphic basement with stronger magnetic property uplifting in Turpan – Hami and Santanghu basin. Mantle substances uplifting mainly cause regional positive gravity and magnetic anomalies in Junggar basin. Regional positive gravity anomalies are mainly caused by Pre-Mesozoic with higher density uplifting, and regional negative magnetic anomalies are chiefly caused by sedimentary formation and intermediate acidity rock with larger thickness and weaker magnetism and Precambrian metamorphic basement.
628
Abstract: In order to realize digitizing and networking video surveillance, a kind of excellent technology of video compression is need. In this paper, the audio video coding standard based on AVS-S was systematically introduced, including its development history, target requirements, technical features and existing algorithms. All possible facing problems when AVS-S is applied in mobile video surveillance systems were analyzed. The corresponding solutions were also provided. Especially, how to use intelligent video technology to satisfy with even higher security-monitoring targets was discussed.
634
Abstract: In recent years, extensive attention has been paid to Internet of Things. This paper introduces the development, the standards of data expression, exchange, process and fusion of Internet of Things. It analyses the functions and physical quipments of each of architecture layers and the characteristics of data management on support layer of Internet of Things. Finally, the primarily problems of data management are proposed and corresponding measures to process data problems are given.
640
Abstract: In this paper, we propose a Template-Matching strategy combined with statistics in the tasks of human evaluation of NTCIR to avoid the arbitrariness of human evaluators. By practical operation and within-system checkup, the strategy helps avoid the arbitrariness of human evaluators and provides a benchmark for human evaluation of NTCIR.
645