Advanced Materials Research Vols. 712-715

Paper Title Page

Abstract: In the box part design stage, for the realization of the design and manufacturing sector information sharing, box geometrical and non-geometrical information was integrated into the 3D model, to realize the product 3D digital definition. The feature evaluation rules by the relationship between the digital product definition and manufacturing resource information was builded and preferred algorithm of the machines based on the theory of analytic hierarchy process was established to choose the most appropriate manufacturing resources which can help product process design.
2478
Abstract: For the purpose of effectively reducing the degree of complexity and improving the efficiency, the method of assembly sequence planning based on connector structure and ant algorithm was proposed. The concept of connector structure was presented, which was regarded as basic assembly unit to cover features of assembly parts. Then, a model of assembly sequence planning was built, which represented the precedence constraint relationship among connector structures. Additionally, the combination of the connector structure concept and characteristics of ant colony algorithm was developed for generating optimal assembly sequences under the guidance of precedence relations in the model. Finally, an example was studied to illustrate the effectiveness of the strategy.
2482
Abstract: In this paper, we introduce a class of vector-valued four-dimensional wavelet packets according to a dilation matrix, which are generalizations of univariate wavelet packets. The defini -tion of biorthogonal vector four-dimensional wavelet packets is provided and their biorthogonality quality is researched by means of time-frequency analysis method, vector subdivision scheme and functional analysis method. Three biorthogonality formulas regarding the wavelet packets are established. Finally, it is shown how to draw new Riesz bases of space from these wavelet packets. The sufficient condition for the existence of four-dimensional wavelet packets is established based on the multiresolution analysis method.
2487
Abstract: Robust regression, based on the robust estimation, can effectively eliminate or weaken the influences of outliers. However, different robust methods have different abilities to eliminate or weaken the influences of outliers. The current paper employs simulation experiments, taking unitary linear regressions with different numbers of observations, different numbers of gross errors and different values of gross errors as examples, to compare the robustness of 13 commonly used robust estimation methods by the average values of relative gains. The results indicate that the L1 and GermanMcClure methods are relatively more efficient for unitary linear regression. They can more efficiently eliminate or weaken the influences of gross errors on regression coefficient valuation than other robust estimation methods.
2493
Abstract: mage calibration is a necessary step in image processing. Similarity transformation is a widely used image calibration method. Robust estimation methods are often used to eliminate or weaken the influences of gross errors on image calibration. However, different robust estimation methods have different capabilities in eliminating or weakening gross errors. The current paper employed simulation experiments using different coincident points and the number of gross errors included in the observations to compare the robustness of 13 commonly used robust estimation methods. Results indicated that L1 and GermanMcClure methods are relatively more efficient than other robust estimation methods for image calibration based on similarity transformation.
2497
Abstract: This paper first briefly introduces the basic overview of the broadband access and the classification. Second this paper focuses on broadband access network technology application of optical fiber, finally puts forward the development of the optical fiber broadband access network might cover APON, BPON and EPON phase, from broadband pointto-point Ethernet fibre optic system and GEPON start and even finally GPON phase transition to the initial assumption.
2503
Abstract: In the research area of network security, we often need to analyze the Internet traffic in real time. But the Internet traffic is usually very heavy, so it is very hard for us to analysis each packet one by one. Alternatively, analyzing the Internet traffic on flow level is often employed. Before analyzing the traffic flows, how we can fast construct and update these flows is a key issue. To solve this issue, in this paper, we propose a fast connection construction and update algorithm. Firstly, we define bidirectional flows as connection. Then, we use hash table to store the connection records and use this connection construction and update algorithm to ensure that these connection records can to be stored in memory in heavy traffic environment to achieve real-time traffic analysis. At last, the experiments show that the algorithm we proposed is efficient and can meet the traffic analysis need.
2506
Abstract: In the prediction and improvement of integrated circuit yield, it needs to convert CIF file to BMP file in order to calculate the critical area accurately and optimize the subsequent layout, at the same time, the image format of layout is the foundation of random defects hot spot detection. Firstly, the structures of CIF file and BMP file are studied, and various commands of CIF are deeply analyzed. Secondly, we design the algorithm that is based on the primitives are converted into BMP according to the representation of four basic primitives (rectangle, polygon, circularity, line with width) in CIF layout. Finally, we realize the algorithm of the whole CIF files is converted into BMP files. It is simple, conversion accuracy is high, more importantly, laid the foundation for the improvement of integrated circuit yield, and use C++ language to realize the CIF files conversion software based on the algorithm.
2510
Abstract: To improve the confidentiality and availability of the network, it is important to provide multilevel security in the physical layer of optical networks. Based on the orthogonal characterization of OFDM, we introduce a new electronic encryption method for the encryption of the subcarriers symbols after data mapping. Since all-optical networks are emerging as implementations for very high data rate communications, flexible switching and broadband application support, we present a novel all-optical security system technique using random sequence encryption. The noise function was applied via a pseudo-random noise generator seeded with an encryption key. We analyze the performance of both security systems under different application circumstances. Our results confirm the effectiveness of the security technique to make the system less vulnerable to attack.
2514
Abstract: Electronic commerce is one of the important means for small enterprises to innovate business model. In order to more deeply understanding the phenomenon, this paper systematically reviews related research about key factors affecting small enterprises E-commerce adoption decision, establishes theoretical model of small enterprises E-mmerce adoption decision based on TAM model & TOE framework, and proposes the corresponding research hypothesis. The identification of the key factors influencing small enterprise E-commerce adoption not only supplies practice guidance for enterprise innovation, but also helps to improve innovation success rate for enterprise technology and management .
2521

Showing 501 to 510 of 644 Paper Titles