Advanced Materials Research
Vol. 923
Vol. 923
Advanced Materials Research
Vol. 922
Vol. 922
Advanced Materials Research
Vols. 919-921
Vols. 919-921
Advanced Materials Research
Vol. 918
Vol. 918
Advanced Materials Research
Vol. 917
Vol. 917
Advanced Materials Research
Vols. 915-916
Vols. 915-916
Advanced Materials Research
Vols. 912-914
Vols. 912-914
Advanced Materials Research
Vol. 911
Vol. 911
Advanced Materials Research
Vol. 910
Vol. 910
Advanced Materials Research
Vol. 909
Vol. 909
Advanced Materials Research
Vol. 908
Vol. 908
Advanced Materials Research
Vol. 907
Vol. 907
Advanced Materials Research
Vol. 906
Vol. 906
Advanced Materials Research Vols. 912-914
Paper Title Page
Abstract: In this context, the paper is forecasting PMV index by four environmental variables and two personal variables. The first set of strategies is Using SVR to predict PMV and the second one is PSO-SVR that particle swarm optimization (PSO) is chosen as an optimization technique to optimize the SVR parameters setting. Simulation results are presented for two case studies to validate the proposed methodology in terms of both SVR and PSO-SVR.
1313
Abstract: In order to evaluate the anti-jamming capacity of the radar net under information warfare conditions, this paper adopts the projection pursuit method to convert the main performance indexes which affect the radar net anti-jamming capacity into one dimension projection value, offers their evaluation and ranking of such indexes and achieves the weights of the these evaluation indexes. This method does not only realize the evaluation of the radar net anti-jamming capacity but also provides a new method to evaluate such a capacity.
1318
Abstract: In order to improve the real time prediction precision of sensor output time series, the predictable inner mechanism of time series is analyzed, and a method using wavelet filtering and neural network is proposed. Sensor output time series are first handled with wavelet filtering, and then predicted by neural network method. The proposed method can eliminate effect of measurement noise on prediction precision. Simulation experiment shows a higher prediction precision by the method. A new idea is given to increase prediction precision of sensor output time series by neural network-based methods.
1322
Abstract: The full realization of human visual redundancy safely embedded secret information is information hiding goal Steganography existing image information technology in many fields of image data to achieve the same paper will quantify the signal compression coding theory and methods. information used in dense cover, we propose a fully redundant human visual images of different domain information steganographic method and designed three new error correction method to ensure the accuracy of blind ciphertext information extraction and recovery experiments show that the algorithm spatial statistical properties of the image data changes less with a capacity of more hidden PCT Gao and safety.
1327
Abstract: Remote sensing classification, as an important means of urban planning and construction, has been widely concerned. Urban land use classification is extremely challenging tasks because of some land covers are spectrally too similar to be separated using only the spectral information of remote sensing image. Object-oriented remote sensing image classification method overcomes the drawbacks of traditional pixel-based classification method. It combines the spectral, special structure and texture features of the images, can effectively avoid the phenomenon of "different objects share the same spectrum" or "the same objects differ in spectrum. Support Vector Machine (SVM) is an excellent tool for remote sensing classification. Combination of both can develop their own advantages to do high-resolution remote sensing image classification. Using a public image in Harbin city as an example, classification based on object-oriented method and SVM has achieved better results than traditional pixel-based classification method.
1331
Abstract: Based on the principle of association and parameter-driven, adaptive assembly method of Components and parts is presented. Firstly, assembled relationship is predefined in the system. Then assembled parts to be assembled, the pre-defined relationships are detected in assembly environment. Followed the assembly constraints and size are determined according to the pre-defined relationship. If the part assembly-dimension does not match the size, the assembly-dimension is automatically changed to match interface size. The adaptive assembly of parts and components is completed. Finally, the the above-mentioned functions is achieved via the secondary development of SolidWorks and prototype application example is given.
1335
Abstract: The airport perimeter intrusion prevention system is the first defending line of airport security system, and its position is very important. Based on the correlation of air defense, anti-technology and anti-intrinsic, paper compares the advantage and the disadvantage of domestic airport in the selection of the electronic fence pattern. Through technical analysis of the use of acceleration transducer in networking technology for the prevention of airport apron, combined with the actual situation of the Hangzhou Xiaoshan International Airport in airport apron prevention, the ability of electronic fence used in tracking protection and discrimination for location has been improved through system optimization, expanding the application of the electronic fence at the airport apron prevention system. The paper also prospects the application future for internet of things used in the apron protection system
1339
Research of Data Reliability Technology Based on Erasure Code Redundancy Technology in Cloud Storage
Abstract: In the application of cloud storage, the most important technique is to ensure the safety and reliability of data. Therefore, the safety mechanism of user data reliability must be solved for the cloud storage development. In this paper, the erasure code redundancy technology is introduced into the cloud storage. The user data is divided into several data blocks which are stored in different storage nodes, based on data fragmentation method of erasure code. In Byzantine environment, a subset of different m blocks may decode the different data blocks. So, the fragmentation verification technique is so important that it is the research focus of the erasure code.
1345
Abstract: In this paper, the chaotic orbit in Mandelbrot set is introduced. On the basis of other scholars research, the character and distribution rules of pre-periodic orbits and pre-periodic points-Misiurewiz points about Mandelbrot set chaos-fractal images were studied. The software of constructing the general M-J set with Java Applet is improved. Using the method of computer mathematic experiments, the paper analyses the fixed orbit and period orbit in the M-set, gains the topology relationship of M set in super stable points, a recurrence formula between the period orbit and M-set periodic-buds is created.
1349
Abstract: We propose a collision detection algorithm based on combination of sphere and OBB.The bounding box is divided into upper and lower layers,the upper layer uses sphere to eliminate many disjoint objects, and the lower layer uses OBB to detect the collision between objects.The algorithm can save time and improve the efficiency of collision detection compared with the traditional single bounding box collision detection.
1353