Advanced Materials Research Vols. 971-973

Paper Title Page

Abstract: Researches on surface electromyography (sEMG) for upper-limb prosthesis control have been going on for several years. Most published studies on prosthesis usually use the steady-state sEMG or the transient sEMG for identification. However, the transient sEMG is less stable than steady-state sEMG. The nonstationarity in transient sEMG greatly affects the performance of myoelectric control. In this paper, we propose a method based on sparse representation to capture the characteristics of transient sEMG to identify movements. Experiment results show the proposed method extracts the variations in transient sEMG activity from different movements effectively. The proposed feature achieves a satisfactory classification rate, which outperforms the other features.
1651
Abstract: A new fitness function is introduced in order to maximize the number of task served by the multi-agent system (MAS) with limited resource, while the tasks information remains unknown until the system found them one by one. The new fitness function not only considers to maximize the profit of the system which can be seen as to maximize the remaining resource of the system in the case of the MAS with limited resource, but also takes the balance of remaining resource in to account and it can makes a compromise between them. This paper uses an improved discrete particle swarm optimization to optimize the coalition of MAS. In order to improve the performance of the algorithm we redefine the particle velocity and position update formula. The simulation results show the effectiveness and superiority of the proposed fitness function and optimization algorithm.
1655
Abstract: Safety is the premise of network operation, network security is not only a single point of security, but the safety of the information network, need to be done from various solid protection. Analyzed the current form and face all kinds of LAN network security threats and network security precautions, technology, this paper expounds the LAN the importance of the current network security in our lives.
1659
Abstract: The development of network technology is changing our teaching. Specially, the network has become an important tool of resource sharing, which greatly improved the efficiency of information retrieval. But, the interactive function of network has not obtained the very good play in teaching. With the collaboration of learning features and instant messaging software, analyzes the teaching function of instant messaging software, puts forward the scheme of network learning community construction through instant messaging software, construct learning-centered teaching.
1663
Abstract: Anonymous multi-receiver encryption (AME) achieves the security properties of confidentiality and anonymity. Thus, it can be used in VoIP (Voice over Internet Protocol), pay-TV systems, et al. In 2012, Zhang et al. proposed an efficient anonymous multi-receiver encryption protocol. They claimed that their protocol can protect the receiver identity privacy and keep message confidential. In this paper, we point out the weaknesses of Zhang et al.'s protocol. Their protocol cannot satisfy the anonymity against the inner attackers. On the other hand, their AME protocol cannot satisfy the indistinguishability of encryptions under selective multi-identity, chosen ciphertext attacks (IND-AME-CCA). Thus, Zhang et al.'s protocol is insecure. The analysis is important for the engineer to mitigate the security risks.
1667
Abstract: Technology is not neutral, any technology has a certain value orientation. The Digital and Virtual which inherent in 3D animation technology, leading 3D animation images reflect a new level of visual orientation. Spectacle victory narrative is mainly reflected in its visual highlight.
1673
Abstract: To achieve better MP3 audio output quality, this thesis makes research of D/A chips that most MP3 players to ultimately make the decision of using one-bit DAC as the way of DAC and audio output. And this overall design scheme is given out as well. Decoding MP3 files through upper computer software of PC and transmitting data to one-bit DAC module through serial ports. DAC is realized in FPGA chip through Verilog Language. And high shelf is used in the output section of one-bit DAC module. Finally, analyzes the output audio frequency of one-bit DAC module, surveys general performance of the overall play system and DAC module.[1][2]
1676
Abstract: In wideband radar situation, target-spread and all scattering points back wave could be considered as the pulse train of random parameters. The wideband radar target and built the related model. Then it gave two methods of target detection, one is Energy Accumulation and the other is the IPTRP. It also presented the simulation result of these two methods performance curves. It showed that the IPTRP improved by more than 3dB in the same SNR.
1680
Abstract: this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.
1684
Abstract: This paper analyzes the characteristics of a high-frequency signal transmission power lines ; focused on the spread spectrum communication technology in power line carrier communication ; -depth study of the spread spectrum modulation and demodulation techniques in communication technology-based , high-performance power line carrier dedicated MODEM chip SSC P300 internal works. Focuses on the design of the concentrator hardware systems.
1688

Showing 371 to 380 of 618 Paper Titles