Advanced Materials Research
Vol. 743
Vol. 743
Advanced Materials Research
Vol. 742
Vol. 742
Advanced Materials Research
Vol. 741
Vol. 741
Advanced Materials Research
Vol. 740
Vol. 740
Advanced Materials Research
Vol. 739
Vol. 739
Advanced Materials Research
Vol. 738
Vol. 738
Advanced Materials Research
Vols. 734-737
Vols. 734-737
Advanced Materials Research
Vols. 732-733
Vols. 732-733
Advanced Materials Research
Vols. 726-731
Vols. 726-731
Advanced Materials Research
Vols. 724-725
Vols. 724-725
Advanced Materials Research
Vol. 723
Vol. 723
Advanced Materials Research
Vol. 722
Vol. 722
Advanced Materials Research
Vol. 721
Vol. 721
Advanced Materials Research Vols. 734-737
Paper Title Page
Abstract: The author adopts Monte Carlo compute method to simulate the linear polymer chain lattice model in multiple chain systems of different volume fraction Φ while chain length n=50, and makes a research on the variational situation of the size (measured with the mean-square end-to-end distance <R2> and the mean-square radius of gyration <S2>), shape (measured with the mean asphericity factor ) with changing of the interaction energy between solvent molecule and polymer chain segment molecule εPS. Results indicate <R2>, <S2> and have the changing rules that they become small with the increase of the εPS.
3141
Abstract: The nonlinear analysis of HRV index can effectively evaluate the drivers mental and physiological stress reaction during driving. By collecting drivers ECG signal on the Prairie Highway and based on nonlinear analysis of HRV, it is found the drivers Correlation Dimension (D2) changes significantly and has a strong negative correlation with driving time, and the regression model under the Prairie Highway environment has been built in this paper. Combining the difference test between the dynamic and static index, the study has concluded drivers sympathetic nerve activity decrease after continuous driving for 30min, and D2 is 2.034-2.593 after 110min.The complexity of drivers autonomic nervous system and the adjust ability of adapting to the environment decrease significantly on the Prairie Highway. These will offer the theoretical basis for monitoring driver fatigue and designing Prairie Highway.
3145
Abstract: In order to realize the water-saving irrigation of field plots path pipeline deployment management and control, the pheromone of ant colony algorithm for optimization design of. Ant colony algorithm (ACA) is a kind of Bionic Engineering with the development of the optimization algorithm, is mainly based on ant foraging in the search for the shortest path model and form. This article attempts in the existing ant colony algorithm combinatorial optimization of real defect on the basis of field plots, to coordinate as a data source, An improved ant colony algorithm for field plots wiring path design, thereby improving the ant colony algorithm in an iterative process to update the optimal solution ability, Finally in the same number of iterations to find path shorter, cost less rules, solve agricultural water-saving irrigation pipeline path optimization deployment problem. And in the VC++ program validation path optimization problems. The test results show that, under the same climatic conditions, route optimization design results can be deployed for water saving irrigation pipeline layout management provides reference basis and data support.
3152
Abstract: With the rapid development of network technology and software technology,the application of digital signature technology is increasingly widespread. The paper first introduced some basic concepts of digital signature,then made a detailed description of the application of digital signature,and finally made a preliminary analysis of some of the problems faced by the current digital signature technology.
3158
Abstract: Information value model simplify the total information of evaluation unit down to sum of each factor, what may influence the prediction accuracy when factors are strongly correlated . Thus, its better to select the original modelthe multi-factor combined information value model, which directly calculate the information of factors-combination. However, the calculation is hard to realize due to the large number of combinations. In this paper, we propose a method that can quickly calculate the information. Taking Badong area for example, selecting slope, aspect, lithology, distance to drainage system and distance to road as influence factors, constructed the ideal information value model and the multi-factor combined information value model respectively. We found that the former model accuracy is 71.1%, with the latter is 80.3%. The result proved that the correlation between factors may have great influence, and showed the multi-factor combined information value model is better in a way.
3163
Abstract: Based on the application of cloud computing, digital library is a cloud with a powerful computing capability, which is integrated from many relatively low cost computing entities through network. This cloud can be applied to store all types of document resources and conduct computing application, so as to unify the management by the means of resources sharing. The users can use a variety of terminal equipment to access it without any limitation of time and place, and it can carry on the service charge process based on the use of resources. The framework of digital library based on cloud platform can be divided into 3 layers: core service, service management as well as user access interface. Digital library based on the cloud computing platform is confronted with some security problems, such as data security, user privacy leaks, virtualization security etc. The paper discusses the corresponding strategies from the perspectives of WEB browser security, data encryption, identity authentication and authorization decision, virtual security technology, and establishment of cloud computing security standards and evaluation system.
3171
Abstract: There are not a set of perfect rules as well as implementation methods to meet the demand of electric marketing business and to transform Common Information Model (CIM) into the logical model. In this paper, the complex inheritance relationship, such as the absence of multiple inheritance and the empty of parent class, is considered in CIM. This paper also focuses on the universally unique identifier IdentifiedObject class, from which most classes inherit. Moreover, based on the research about the complex inheritance relationship from CIM to the logical model, several mapping rules are introduced, which can make the transformation come true.
3175
Abstract: This paper discusses an in-depth analysis of various encryption technologies, such as RSA, DES, SHA-1, improves DES algorithm and combines their advantages, then put forward a new communication security model based on various algorithms. Thus increasing the security of asynchronous network communication system.
3180
Abstract: A robust Kalman-type recursive filter has been proposed for descriptor systems subject to linear unstructured additive uncertainties in this paper. It is proved that the linear additive uncertainties during filtering can be represented by the intersection of a series of additive uncertainties relying on the actual plant. A set of additive uncertainties independent of the actual states is utilized in this paper to include this intersection, whose parameters can be obtained offline through convex optimizations. A numerical simulation shows that the algorithm can be realized recursively for linear additive uncertain-ties, and verifies the effectiveness of the proposed algorithm.
3186
Abstract: It is important to use electric power safely. Electric arcing faults on the low voltage power lines must be detected and power sources have to be shut down before fire hazards. In this paper, it suppose a method to analyze and detect arc fault characteristics. The current waveforms are different in arc fault and normal operation conditions. The discrete wavelet transform is used to obtain the spectrum characteristics of experiment data and the spectrum energy statistics can reflect the characteristics. Additionally, the values of spectrum energy are input of the back-propagation neural networks (BPNN), which can identify the arc fault efficiently. The test results have demonstrated that the proposed method is effective.
3190