Advanced Materials Research Vols. 765-767

Paper Title Page

Abstract: Color is the most widely used visual feature in content based image retrieval. The visual coherence color space, HSV, is adopted to represent image. Hue component is used to denote color. Hue difference statistic is proposed to extract color change information as supplement to color feature. The image is divided into sub images equally. Color and change information is extracted in each region. After feature vector clustering and coding, image content can be expressed as vector codes. The text based analysis technology is used for image retrieval. Experiments show that the proposed method can realize efficient retrieval for unconstrained scene images.
1046
Abstract: Discovery of computer networks topology is always an important basement for network management. As IPv6 becomes the official standard, topology discovery methods should be changed as well. In IPv6 network, Anonymous Routers (AR) is one problem that we must deal with. AR is one kind of router we dont know its interface information, which makes it very difficult to find out their interconnections through common ways. This paper introduces a solution to deal with it, using source-routing traceroute command and nodes degree to merge ARs or find out their relation, and finally get the topology graph.
1050
Abstract: The BP neural network is easy to fall into local minimum point, the algorithm convergence speed slow, this paper puts forward an improved algorithm of flexible neural tree, introduced the basic theory knowledge of Flexible neural tree , analyzes the characteristics and advantages of the neural tree. The structure optimization and parameter optimization are adopted some optimization algorithm, Introduced the multi expression programming algorithm for optimization of flexible neural tree structure and by using the improved particle swarm algorithm to optimize the parameters of flexible neural tree, Finally the establishment of complete flexible neural tree model.
1055
Abstract: There are many studies about application-level maintenance at present, with different levels and depth and business logic. However, there are some common characteristics from two respects: incident management and problem management of ITIL. This paper designs an application-level maintenance platform (AMP) on ITIL, which is a set of practices for IT service management (ITSM).AMP separates common characteristics from non-common characteristics collected, and implements functions of common characteristics. Users only develop functions of non-common characteristics to get a maintenance system for specific application quickly. AMP has been applied in practice successfully.
1060
Abstract: The problem about cooperation anti-missile network of warship fleet has been the research hotspot. In order to evaluate the edges for the warship fleet cooperation anti-missile network, a new approach for evaluating the critical edges is proposed by considering the influence of endpoint nodes. The method that edge betweenness is used as the index of evaluating critical edge is incomplete. Aimed at the built operation network, the method is used in the case. The result indicates that the method is reasonable and effective.
1064
Abstract: According to complex context relation of ontology, considering different input schema, ontology graph is created with general environment. Based on ontology structure, the paper constructs multiple level graph representation, By introducing similarity propagation of structural and instance level on context relation and rapid mapping with a rapid matching algorithm, a composite ontology mapping strategy is proposed, which iteratively achieves ontology mapping result with reused idea. Finally feasibility and effectiveness of the strategy is proved by complexity analysis to algorithm and some contrast test.
1068
Abstract: this paper presents a new scheme for enhancing the security of full disk encryption relying on the double sequence encryption based on chaotic map in order to improve the performance of its practical implementation. The aims of the proposed scheme are to design a keystream generator for the tweakable enciphering mode in space or time sequence using the real-time embedded device through sequential change detection on the disk read-and-write request. This design of the scheme is based on re-keying principle and derived from information-theoretical evaluation. Analyses show that the scheme is provably secure and can prevent inner and outer attackers from attacking. To the best of our knowledge, the scheme offers the first comprehensive solution to the watermarking attack in the same sector.
1073
Abstract: in recent years, the gradual expansion of the scope of application of RIAs Flex technology. Adobe launched the Cairngorm application development framework. The Cairngorm framework is the mainstream framework for Flex application development, the framework is based on the MVC design pattern, it simplifies the application development model. The author, after a careful study of the entire framework, has made some improvements on the Cairngorm framework of service call mechanism, which proposed the Cairngorm framework of improved. The Cairngorm framework improved more suitable for small and medium-sized Web applications development and maintenance.
1077
Abstract: This paper analyzes the catalogue characteristics of network information resources, proposes a way of designing meta-data framework of network information resources. Then, a method of grading elements and modifiers based on importance is given. Finally, it introduces the description rules on elements and modifiers.
1082
Abstract: Recently, with the development of Internet and the coming of new application modes, data storage has some new characters and new requirements. In this paper, a Distributed Computing Framework Mass Small File storage System (For short:Dnet FS) based on Windows Communication Foundation in .Net platform is presented, which is lightweight, good-expansibility, running in cheap hardware platform, supporting Large-scale concurrent access, and having certain fault-tolerance. The framework of this system is analyzed and the performance of this system is tested and compared. All of these prove this system meet requirements.
1087

Showing 231 to 240 of 717 Paper Titles