Advanced Materials Research
Vol. 937
Vol. 937
Advanced Materials Research
Vol. 936
Vol. 936
Advanced Materials Research
Vol. 935
Vol. 935
Advanced Materials Research
Vol. 934
Vol. 934
Advanced Materials Research
Vol. 933
Vol. 933
Advanced Materials Research
Vols. 931-932
Vols. 931-932
Advanced Materials Research
Vols. 926-930
Vols. 926-930
Advanced Materials Research
Vol. 925
Vol. 925
Advanced Materials Research
Vol. 924
Vol. 924
Advanced Materials Research
Vol. 923
Vol. 923
Advanced Materials Research
Vol. 922
Vol. 922
Advanced Materials Research
Vols. 919-921
Vols. 919-921
Advanced Materials Research
Vol. 918
Vol. 918
Advanced Materials Research Vols. 926-930
Paper Title Page
Abstract: On the problem of data quantity in anomaly detection, traditional dendritic cell algorithms should be improved by proposing an antigen data preprocessing method which introduced suspected abnormal base. The abnormal data should be judged with high efficiency in the shortest time possible by double anomaly detection. First of all, set of the original data should be preprocessed into individual antigen, and was matched with the suspected abnormal base to conduct the first anomaly detection. Then a double anomaly detection should be conducted by dendritic cell algorithm and the intensity of anomaly be judged according to the dynamic anomaly index. Experiments show that this algorithm produces better effect on both time and accuracy.
3034
Abstract: In this paper, we introduce a new method for ellipse detection. For any object has closed curve in a digital image, it is easy to calculate the centroid of the object. We assume the object is an ellipse, and then by rotating, scaling this object, it can be transformed to a circle. So, ellipse detection problem becomes circle detection problem. Compared with other detection methods, our method only need process border points of the object, hence has higher detection speed.
3038
Abstract: The three-dimensional solid models of five different length and shaft diameter anchor of bolt were constructed based on ANSYS software, and making static analysis and modal analysis on it to obtain the stress nephogram and natural frequency of bolt. Research on the stress condition of bolt in static analysis. In modal analysis, researching on the effect regular of the change of length and shaft diameter size on the bolt transverse vibration, the longitudinal and torsional vibration of three natural modes of different frequency, providing a reference for the structure design and reasonable choice of bolt type for corresponding condition.
3042
Abstract: This paper investigated hybrid projective synchronization of fractional order hyperchaotic systems with different orders. Based on the idea of active control and the stability theory of linear fractional-order system, we design the effective controller to realize the hybrid projective synchronization. Numerical simulation results which are carried show that the method is easy to implement and reliable for synchronizing the two nonlinear fractional order hyperchaotic systems while it also allows both the systems to remain in hyperchaotic states.
3046
Abstract: In the task of the image processing and analysis, the background noise removal is a important step. In the image background noise removal, there are many methods which is popular for the researchers. For example, the gray threshold methods are commonly taken to remove the noises which have large contrast to the interest objects. However, there are many noises with no variance with the interest objects in the gray level. For these noises, the gray level based noise removal method is totally futile, while the contour feature has its super performance for reducing this sort of noise. For the contour feature based image background removal method, the contour model is the key. This paper proposes a novel method for modeling the contour feature of the interest objects. With this method, a novel background noise which has the same gray level to the background noise is totally removed.
3050
Abstract: Based on the location of the routing protocol because it avoids the shortcomings of flooding mechanisms and has a good scalability, become research focus in frequent changes network topology VANET .GPSR based on node location only for data forwarding, so it is important to vehicle node location information is accurate, directly affect the normal data forwarding. For GPSR algorithm the destination node location inaccuracy problem, this paper introduces the concept of expectation domain to estimate the location of the destination node movement range, and the last hop neighbor node selection of the destination node to join discriminant mechanism. The simulation experimental results show that the improved GPSR protocol has a higher packet delivery rate.
3054
Abstract: In order to improve the generality and real-time of image matching procedure, Visual Studio 2010 and MATLAB R2009a have been used as the platform to research mixed programming and improved SIFT algorithm. In this method, the advantages of C # and Matlab have been combined to reduce the difficulty of programming and to improve programming efficiency. The results show that, improved SIFT algorithm can greatly improve real-time of matching program while guaranteeing good matching rate, its suitable in real-time applications.
3058
Abstract: In order to obtain the effective network intrusion alarm information, and reveal the intention of attackers, an intrusion scenario dynamic correlation algorithm is proposed based on single value causality diagram. According to the composition principle of single value causality diagram, the key factors of the cause and effect diagram are defined. By relating the alarm information of intrusion detection system, attack scenarios are constructed based on cause and effect diagram, and dynamic correction is conduct. Based on the MIT Lincoln laboratory data sets, the correlation test is done using the above attack scenario correlation algorithm. Test results show that the reconstruction of attack scenarios and actual condition have very good consistency, proving that the proposed correlation algorithm can correctly reflect the real hacker intrusion process. The research of this paper provides effective help for the security administrator to implement effective management measures.
3063
Abstract: On the demands of real-time and effective transmission of a huge number of data in the construction of digital blasting vibration measurement information management system, lifting wavelet algorithm was introduced for blasting vibration signal compression. Interpolation wavelet, lifting db and traditional db wavelets were used for decomposition-threshold processing-reconstruction. Compression algorithm for the short-term and non-stationary blasting vibration signal was proposed, by analyzing the compression quality. Research results lay a favorable data processing basis for the construction of digital blasting vibration measurement platform and large network blasting vibration monitoring system.
3068
Abstract: Because of the structure of the CANDIDE model is simple and the quantity of its marginal gridlines is small, an obvious marginal trace would appear while the face changed. In view of this, this paper proposed a method which refined the facial outline gridlines to improve the effect of facial transformation. Firstly, the feature point of the pupil is set to enhance the location veracity of the model, then 44 key feature points are chosen to represent the information of the basic facial features. The face matching is realized by ASM algorithm, then fit and refine the extracted contour line personalized to enhance the expressive force of the model of CANDIDE-3. Experimental results show that the result of facial transformation has been optimized. The effect of the transformation is optimized on the premise of the computation speed is guaranteed, and the result looks more naturally.
3073