Advanced Materials Research
Vol. 769
Vol. 769
Advanced Materials Research
Vol. 768
Vol. 768
Advanced Materials Research
Vols. 765-767
Vols. 765-767
Advanced Materials Research
Vol. 764
Vol. 764
Advanced Materials Research
Vol. 763
Vol. 763
Advanced Materials Research
Vols. 760-762
Vols. 760-762
Advanced Materials Research
Vols. 756-759
Vols. 756-759
Advanced Materials Research
Vols. 753-755
Vols. 753-755
Advanced Materials Research
Vols. 750-752
Vols. 750-752
Advanced Materials Research
Vol. 749
Vol. 749
Advanced Materials Research
Vol. 748
Vol. 748
Advanced Materials Research
Vol. 747
Vol. 747
Advanced Materials Research
Vol. 746
Vol. 746
Advanced Materials Research Vols. 756-759
Paper Title Page
Abstract: Aimed to the complexity of and weapon equipment system of system (SoS) and demonstration process, we demonstrated the building needs of hall for workshop of meta-synthetic engineering (HWME) for demonstration on weapon equipment SoS from the angle of function and application. Based on the process of demonstration, the framework of HWME for demonstration of weapon equipment system was built. Based on the mechanism of message transferring, arithmetic and mutual ability, the discussion system of weapon equipment SoS was designed by intelligent decision, group decision, parallel engineering. At last, the paper gave the mutual relation on each composing of the discussion system.
1329
Abstract: The JSP and ASP.NET are two common dynamic web technology, both can be embedded into HTML. But each of them has advantages and disadvantages in using and has many differences in nature. How to weigh them and searching for the most accurate and rapid migration plan being the focus we should think about seriously. This article puts forward three methods of code migrations from JSP to ASP.NET Entire code transform migration, Reserved migration and Neutral migration. Additionally, that can obtain the best transplantation method by weighing these pros and cons as well as the performances of the program after migration.
1334
Abstract: Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k, l) joint verification for (t, n) signature is put forward. After being signed by a signer company employing (t, n) threshold signature scheme, the information m is transmitted to a particular verifier company, and then the signature is verified through the cooperation of k ones from the verifier company with l members, so as to realize a directional transmission between different companies. Finally, the application examples of the company encryption communication system, the generating polynomial of company private key and public key were given. The security of this scheme is based on Shamir threshold scheme and Elliptic Curve system, and due to the advantages of Elliptic Curve, the scheme enjoys wider application in practice.
1339
Abstract: With the development of natural language processing technology, a powerful tool containing semantic information is in great need in lexical semantic processing. Aiming at automatic processing of words in machine translation and automatic proofreading, Wordnet mainly provides semantic information in the form of a semantic knowledge database. The Mongolian Wordnet management and application platform includes two parts----the user searching function and the administrator maintaining function. Users can search semantic knowledge online and the administrator can maintain the adding, deleting, revising and searching functions of the database online as well. This article mainly introduces the construction theory of Mongolian Wordnet, the designing frame of the management and application platform, and the designing methods of the main function modules.
1344
Abstract: Segmentation of brain magnetic resonance (MR) images is always required as a preprocessing stage in many brain analysis tasks. Nevertheless, the bias field (BF, also called intensity in-homogeneities) and noise in the MRI images always make the accurate segmentation difficult. In this paper, we present a modified FCM algorithm for bias field estimation and segmentation of brain MRI. Our method is formulated by modifying the objective function of the standard FCM algorithm. It aims to compensate for bias field and incorporate both the local and non-local information into the distance function to restrain the noise of the image. We have conducted extensive experimental and have compared our method with different types of FCM extension methods using simulated MRI images. The results show that our proposed method can deal with the bias field and noise effectively and outperforms other methods.
1349
Abstract: In this paper, a construction management system based on multimedia integration including voice, data, video and location is introduced, for the features of UHV substation construction such as the construction area is large, process is complex, work sites are scattered, the personnel and materials are many and security requires high level. The system can integrate the multimedia information to the dispatching platform for uniform access and management, thus can optimize the management, improve management efficiency and reduce management cost.
1356
Abstract: This paper proposes a new verifiable visual cryptography scheme for general access structures using pi-sigma neural networks (VVCSPSN), which is based on probabilistic signature scheme (PSS), which is considered as security and effective verification method. Compared to other high-order networks, PSN has a highly regular structure, needs a much smaller number of weights and less training time. Using PSNs capability of large-scale parallel classification, VCSPSN reduces the information communication rate greatly, makes best known upper bound polynomial, and distinguishes the deferent information in secret image.
1361
Abstract: Logistics center is a mordern logistic facility. The distribution center location determines the operational efficiency of logistics system. The optimum location of distribution center is important to transportation. In order to improved the algorithm's efficiency, elite strategy was introduced based on the standard immune algorithm. The improved algorithm avoid trapping into local optimal solution and solving the problem more slowly. The role of the elite strategy is to make the optimal solution attractively in the next cycle. This method sovles problem both quantitatively and qualitatively, which makes final solution better in accordance with practical demands.
1366
Abstract: In order to solve the problem of slotting optimization management with automated storage and retrieval system (AS / RS), the genetic algorithms of the slotting optimization process with stereo warehouse were discussed. The process of the slotting optimization was designed by the real-number coding. The mathematical models of the slotting optimization and cargo shipping time were built, and the simulation calculation of the models was done. The stability of the shelf and the efficiency of the accessing goods were significantly improved by the optimization simulation of the distribution of cargo space, after optimizing the storage order. The algorithms of the slotting optimization with stereo warehouse could effectively enhance the frequency of the stock in & out, increasing the revenue.
1371
Abstract: The paper presents a flexible high-performance platform, called VRViewer, developed for supporting interactive Reality 3D, including Building service, Production service, and API service. Building service enables creation and management of contents of Reality 3D. Production service serves the published contents to client applications, and API service provides client applications a set of JavaScript APIs to embed Reality 3D Viewer and interact with VRViewer. With VRViewer, people without technical backgrounds can easily create, edit, and publish contents of Reality 3D. Applications based on the platform can greatly improve their user experience with flexibility and lower cost.
1377