Advanced Materials Research
                        
Vol. 773
                Vol. 773
                    Advanced Materials Research
                        
Vol. 772
                Vol. 772
                    Advanced Materials Research
                        
Vol. 771
                Vol. 771
                    Advanced Materials Research
                        
Vol. 770
                Vol. 770
                    Advanced Materials Research
                        
Vol. 769
                Vol. 769
                    Advanced Materials Research
                        
Vol. 768
                Vol. 768
                    Advanced Materials Research
                        
Vols. 765-767
                Vols. 765-767
                    Advanced Materials Research
                        
Vol. 764
                Vol. 764
                    Advanced Materials Research
                        
Vol. 763
                Vol. 763
                    Advanced Materials Research
                        
Vols. 760-762
                Vols. 760-762
                    Advanced Materials Research
                        
Vols. 756-759
                Vols. 756-759
                    Advanced Materials Research
                        
Vols. 753-755
                Vols. 753-755
                    Advanced Materials Research
                        
Vols. 750-752
                Vols. 750-752
Advanced Materials Research Vols. 765-767
Paper Title Page
            Abstract: Color is the most widely used visual feature in content based image retrieval. The visual coherence color space, HSV, is adopted to represent image. Hue component is used to denote color. Hue difference statistic is proposed to extract color change information as supplement to color feature. The image is divided into sub images equally. Color and change information is extracted in each region. After feature vector clustering and coding, image content can be expressed as vector codes. The text based analysis technology is used for image retrieval. Experiments show that the proposed method can realize efficient retrieval for unconstrained scene images.
        
        
        
            1046
        
            Abstract: Discovery of computer networks topology is always an important basement for network management. As IPv6 becomes the official standard, topology discovery methods should be changed as well. In IPv6 network, Anonymous Routers (AR) is one problem that we must deal with. AR is one kind of router we dont know its interface information, which makes it very difficult to find out their interconnections through common ways. This paper introduces a solution to deal with it, using source-routing traceroute command and nodes degree to merge ARs or find out their relation, and finally get the topology graph.
        
        
        
            1050
        
            Abstract: The BP neural network is easy to fall into local minimum point, the algorithm convergence speed slow, this paper puts forward an improved algorithm of flexible neural tree, introduced the basic theory knowledge of Flexible neural tree , analyzes the characteristics and advantages of the neural tree. The structure optimization and parameter optimization are adopted some optimization algorithm, Introduced the multi expression programming algorithm for optimization of flexible neural tree structure and by using the improved particle swarm algorithm to optimize the parameters of flexible neural tree, Finally the establishment of complete flexible neural tree model.
        
        
        
            1055
        
            Abstract: There are many studies about application-level maintenance at present, with different levels and depth and business logic. However, there are some common characteristics from two respects: incident management and problem management of ITIL. This paper designs an application-level maintenance platform (AMP) on ITIL, which is a set of practices for IT service management (ITSM).AMP separates common characteristics from non-common characteristics collected, and implements functions of common characteristics. Users only develop functions of non-common characteristics to get a maintenance system for specific application quickly. AMP has been applied in practice successfully.
        
        
        
            1060
        
            Abstract: The problem about cooperation anti-missile network of warship fleet has been the research hotspot. In order to evaluate the edges for the warship fleet cooperation anti-missile network, a new approach for evaluating the critical edges is proposed by considering the influence of endpoint nodes. The method that edge betweenness is used as the index of evaluating critical edge is incomplete. Aimed at the built operation network, the method is used in the case. The result indicates that the method is reasonable and effective.
        
        
        
            1064
        
            Abstract: According to complex context relation of ontology, considering different input schema, ontology graph is created with general environment. Based on ontology structure, the paper constructs multiple level graph representation, By introducing similarity propagation of structural and instance level on context relation and rapid mapping with a rapid matching algorithm, a composite ontology mapping strategy is proposed, which iteratively achieves ontology mapping result with reused idea. Finally feasibility and effectiveness of the strategy is proved by complexity analysis to algorithm and some contrast test.
        
        
        
            1068
        
            Abstract: this paper presents a new scheme for enhancing the security of full disk encryption relying on the double sequence encryption based on chaotic map in order to improve the performance of its practical implementation. The aims of the proposed scheme are to design a keystream generator for the tweakable enciphering mode in space or time sequence using the real-time embedded device through sequential change detection on the disk read-and-write request. This design of the scheme is based on re-keying principle and derived from information-theoretical evaluation. Analyses show that the scheme is provably secure and can prevent inner and outer attackers from attacking. To the best of our knowledge, the scheme offers the first comprehensive solution to the watermarking attack in the same sector.
        
        
        
            1073
        
            Abstract: in recent years, the gradual expansion of the scope of application of RIAs Flex technology. Adobe launched the Cairngorm application development framework. The Cairngorm framework is the mainstream framework for Flex application development, the framework is based on the MVC design pattern, it simplifies the application development model. The author, after a careful study of the entire framework, has made some improvements on the Cairngorm framework of service call mechanism, which proposed the Cairngorm framework of improved. The Cairngorm framework improved more suitable for small and medium-sized Web applications development and maintenance.
        
        
        
            1077
        
            Abstract: This paper analyzes the catalogue characteristics of network information resources, proposes a way of designing meta-data framework of network information resources. Then, a method of grading elements and modifiers based on importance is given. Finally, it introduces the description rules on elements and modifiers.
        
        
        
            1082
        
            Abstract: Recently, with the development of Internet and the coming of new application modes, data storage has some new characters and new requirements. In this paper, a Distributed Computing Framework Mass Small File storage System (For short:Dnet FS) based on Windows Communication Foundation in .Net platform is presented, which is lightweight, good-expansibility, running in cheap hardware platform, supporting Large-scale concurrent access, and having certain fault-tolerance. The framework of this system is analyzed and the performance of this system is tested and compared. All of these prove this system meet requirements.
        
        
        
            1087