Advanced Materials Research
Vol. 937
Vol. 937
Advanced Materials Research
Vol. 936
Vol. 936
Advanced Materials Research
Vol. 935
Vol. 935
Advanced Materials Research
Vol. 934
Vol. 934
Advanced Materials Research
Vol. 933
Vol. 933
Advanced Materials Research
Vols. 931-932
Vols. 931-932
Advanced Materials Research
Vols. 926-930
Vols. 926-930
Advanced Materials Research
Vol. 925
Vol. 925
Advanced Materials Research
Vol. 924
Vol. 924
Advanced Materials Research
Vol. 923
Vol. 923
Advanced Materials Research
Vol. 922
Vol. 922
Advanced Materials Research
Vols. 919-921
Vols. 919-921
Advanced Materials Research
Vol. 918
Vol. 918
Advanced Materials Research Vols. 926-930
Paper Title Page
Abstract: Face recognition belongs to the important content of the biometric identification, which is a important method in research of image processing and pattern recognition. It can effectively overcome the traditional authentication defects Through the facial recognition technology. At present, face recognition under ideal state research made some achievements, but the changes in light, shade, expression, posture changes the interference factors such as face recognition is still exist many problems. For this, put forward the integration of global and local features of face recognition research. Practice has proved that through the effective integration of global features and local characteristics, build based on global features and local features fusion face recognition system, can improve the recognition rate of face recognition, face recognition application benefit.
3598
Abstract: In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed that their scheme had the properties of secrecy, unforgeability, non-repudiation and signer’s identification, and the proxy-protected version could assure the proxy-protection property. In this paper, we show attacks on the basic scheme and we also point out that even if the central authority is engaged, the basic model is not proxy-protected.
3604
Abstract: In this paper, first introduce data mining knowledge then focuses on the clustering analysis algorithms, including classification clustering algorithm, and each classification typical cluster analysis algorithms, including the formal description of each algorithm as well as the advantages and disadvantages of each algorithm also has a more detailed description. Then carefully introduce data mining algorithm on the basis of cluster analysis. And using cohesion based clustering algorithm with DBSCAN algorithm and clustering in consumer spending in two-dimensional space, 2,000 data points for each area, and get a reasonable clustering results, resulting in hierarchical clustering results valuable information, so as to realize the practical application of the algorithm and clustering analysis theory combined.
3608
Abstract: Automatic recognition of the line in the image is an important work in the field of machine vision and image processing. Focusing on the problem of the computational cost and large invalid sampling in the line extraction algorithm using standard Hough transform (HT). An improved HT algorithm is proposed to solve these problems. The parameters of the improved algorithm can be reduced to one and the accumulator is operated by setting the tolerance. Then the existence of linear is determined by seting the threshold. The experimental results show that the algorithm not only can effectively solve the problem of local maxima and improves the algorithm speed and reduces the storage space,but also the accuracy of line extraction is improved.
3612
Abstract: As bearing of the DCI format information, PDCCH is the core of resource allocation and control information scheduling of TD-LTE system. The receiver PDCCH blind detection process has a crucial impact on the response time of the system. This article first introduced the blind detection process, then based on the research of the blind detection algorithm, FPGA implementation of the algorithm is presented and simulation, synthesis and board level validation is carried out on XINLINX Virtex-6 (XC6VSX475T) chip, finally the results of simulation and realization are analyzed. Results show that the proposed blind algorithm applied to the TD-LTE RF conformance test instrument has good efficiency and reliability.
3616
Abstract: With the coming of the era of big data, various types of databases are emerging, the data synchronization between heterogeneous databases is becoming more important, Goldengate has a very good performance, and it is used widely now. Goldengate can be used for data synchronization from Oracle to Oracle and from Oracle to other databases.
3621
Abstract: Under the short observation epoch, due to the impact of various noise, the ambiguity float solution accuracy is poor, seriously affecting the proper follow-up ambiguities fixed . This paper proposes the use of baseline length and pitch angle restriction to solve the ambiguity float solution., which Improved the accuracy of ambiguity float solution within a short time .And on the basis of ambiguity candidates which obtained by using conventional LAMBDA algorithm, we utilize baseline length and orientation angle as condition to check up ambiguity candidates individually, compared to conventional LAMBDA algorithm, the proposed method greatly improves the success rate of correct ambiguity fixed, and according to simulation experiments, under the single epoch circumstances, the success rate of correct ambiguity fixed by improved method is approximate to 98%.
3625
Abstract: . Greater demands are imposed on the radar anti-jamming ability by the modern warfare. How to objectively test this ability has been an important problem demanding p romp t solution by both the radar developer and the user. This paper presents a jamming evaluation system based on improved grey correlation method. First it calculates the correlation of each index of the system by using the Delphi method for processing the expert scoring, which is taken as a result of the importance of each index score, then it associates degree and importance of each index, and filter out the initial indicators; Finally, through the analysis of the correlation between the primary indicators, an effective indicator system is given. By the real data sets, the experimental results show that the improved grey correlation analysis method is superior to principal component analysis.
3629
Abstract: Utilizing interval number theory, this paper explores a sorting method to assess quality curriculum. Based on comprehensive analysis of a variety of factors affecting quality curriculum, using combination weighting methods of objective and subjective, we give the corresponding weight interval values of evaluation indicators. Furthermore, we give the sorting steps of quality curriculum assessment based on interval numbers, and give an application instance.
3633
Abstract: In this paper, we analyze the disadvantage of common generating test paper algorithm. An improved genetic algorithm (IGA) is proposed and used in auto-generating examination paper algorithm. We design the mathematical model of auto-generating test paper algorithm and improved the traditional GA fitness evaluation form. A computational study is carried out to verify the algorithm. Simulation results demonstrate that the performance of IGA can work efficiently than traditional ones.
3637