Advanced Materials Research Vols. 756-759

Paper Title Page

Abstract: This article first analyzes the methods that Windows system manage movable storage devices, introduces the commonly used encryption method for movable storage device, then it designs and implements a software to manage the security of movable storage device. This tool uses such techniques as message capture, operation on disk sectors, registry editing, etc. provides security functions by registration of movable storage device, validity checkout, device encryption, file encryption, control of USB port and operation logging mechanism, thus realizes security control functions for movable storage device.
1532
Abstract: Symbolic dynamics is an iterative system that is generated by a shift on a finite symbolic space. It is a special kind of dynamics. Symbolic dynamics has a lot of theoretical and practical applications in many fields such as physics, computer and so on, so it is important to study its dynamical behavior.Sturmian system that is generated by Sturmian sequences is the least complex kind of symbolic dynamics. In the present paper Sturmian sequences are expanded which make them generality. In fact expanded Sturmian sequences share many of properties of Sturmian sequences, but they cannot completely take place of Sturmian sequences. It appears to make a difference between them. It is of value to study expanded Sturmian sequences.
1536
Abstract: This paper focuses on the issues of real time ETL based on the semi-structured textural data sources. Because the mapping between text data and relational database relies on object-orient programming language, the paper first implements a text-object-relation mapping model for textual data sources based real-time ETL,and then studies the characteristic of real-time and security of purposed model. The cache mechanism aims to solve the performance difference between object-text mapping and object-relation mapping,and furthermore both encryption and signature mechanism aim to guarantee the security of the data in cache. The theoretical analysis and experiments prove the high efficiency and practicality of the mapping model.
1541
Abstract: As the E-commerce develops, it will certainly become a new business model in people's daily life. Computer technology and E-commerce are closely linked and mutually supplementary. However, in the process of the development of E-commerce, security has become more and more prominent and brought some crisis to the sustainable development of the E-commerce. This paper mainly analyses the security problems, safety requirements and computer security technologies in the E-commerce.
1547
Abstract: Nowadays, image fusion is one of the common color balance method. But, the color distortion is prone to occur in the fused image. To overcome such drawbacks, a novel method based on illumination correction was proposed in the paper. First, search the identical or similar ground objects areas on both source images, and calculate the average gray of each color component in the found areas. Then, calculate each color component ratio of the average gray of the reference image to the average gray of the color cast image, and take the ratio as the adjusting coefficients of corresponding component. Finally, each color component is multiplied by the adjusting coefficients separately. The theoretical analysis and experiment results show that the proposed method has better ability in color balance.
1551
Abstract: E-government presents a tremendous opportunity to provide higher quality, and cost-effective government services as well as creating a better relationship between citizens and government. The use of Web GIS makes the sharing and applying traditional GIS being possible. Web GIS provides integrated geo-spatial information and services to users and decision support for the government's macro decision-making. However, the current condition of huge initial capital investment in ICT equipment and IT labor does not change. As Cloud Computing enables sharing of resources and costs across a large pool of users while providing on-demand services with dynamic scalability. E-government with cloud computing raises the utilization rate of resource and reduces the budget. In addition, if e-government system is moved to cloud computing environment, cloud computing can construct the system into a service platform which takes service as its core, realizing the transition of government function and promoting the upgrading of local industry and developing low carbon economy. For this reason this research aims to develop a comprehensive framework of support e-government platform, with a specific focus on the e-government system based on Web GIS and private cloud computing based on OpenStack.
1556
Abstract: Computer assisted language learning provides the primary motive for the reform and development of English (as a second language) teaching. The present paper explores and compares the characteristics of traditional language teaching and computer assisted language learning and points out their advantages and shortcomings respectively. It comes to a conclusion that only by integrating those two teaching models in our language teaching can we cultivate fresh language talents that are skilled and useful in the development of our society.
1561
Abstract: To solve the problem of the bandwidth bottleneck in the traditional IPTV Vod system during the peak hours, the NOVA system is designed which is a P2P-Cloud Vod system with collaborative pre-deployment module based on recommendation scheme, according to the particular user behavior and the regionalization deployment of STBs. The NOVA system pre-deploy the VoD contents which are recommended on the STBs of the region during idle hours, and the STBs in the same region strengthen data collaboration using P2P protocol which results in the reducing of the bandwidth of the VoD server. The experiment shows that the bandwidth can be reduced by more than 20-40% during peak hours by NOVA.
1566
Abstract: Nowadays, 2-D DCT is applied widely. But the transform matrix of DCT is expressed with floating-point numbers, so the computational complexity is high and more system resources are occupied. In addition, the 2-D DCT is accomplished by operating 1-D DCT to the rows and columns of 2-D data successively, which cannt embody the total space characteristic of 2-D transform well. To overcome these drawbacks, 2-D integer SDCT (Sub-matrix Discrete Cosine Transform) was proposed in the paper. First, several matrix operation methods were defined. Then, the basic principle of 2-D integer SDCT was deduced in detail. The theoretic analysis show that 2-D integer SDCT is easy to comprehend, convenient to operate, and simplifies the calculation of 2-D DCT.
1571
Abstract: Image search engine technology is a combination of technologies of database, information retrieval, image processing and computer vision, texture recognition as well as multimedia database and network. This paper aims to present the flow chart of content-based image search engine system and explores the current image search technologies and its future development.
1576

Showing 321 to 330 of 959 Paper Titles