Advanced Materials Research
Vol. 979
Vol. 979
Advanced Materials Research
Vol. 978
Vol. 978
Advanced Materials Research
Vol. 977
Vol. 977
Advanced Materials Research
Vol. 976
Vol. 976
Advanced Materials Research
Vol. 975
Vol. 975
Advanced Materials Research
Vol. 974
Vol. 974
Advanced Materials Research
Vols. 971-973
Vols. 971-973
Advanced Materials Research
Vol. 970
Vol. 970
Advanced Materials Research
Vol. 969
Vol. 969
Advanced Materials Research
Vol. 968
Vol. 968
Advanced Materials Research
Vols. 966-967
Vols. 966-967
Advanced Materials Research
Vols. 962-965
Vols. 962-965
Advanced Materials Research
Vols. 960-961
Vols. 960-961
Advanced Materials Research Vols. 971-973
Paper Title Page
Abstract: The widespread deployment of smart meters for the modernization of the electricity distribution network has been associated with privacy concerns due to the potentially large number of measurements that reflect the consumers’ behavior. At the same time, how to extract important knowledge from the potentially large of measurements — these measurements are spilt among various parties, has already became a hot topic in the field of data mining. In this paper, we present protocols that can be used to compute meter measurements over defined sets of meters without revealing any additional about the individual meter readings, and address secure mining of association rules. Thus, most of the benefits of the smart grid can be achieved without revealing individual data.
1692
Abstract: IRFPA is the main direction of infrared imaging technology at present. It has high sensitivity and detection capability, but it also has disadvantages such as bad non-uniformity. Non-uniformity correction is a key technology in the application of IRFPA. As an applicable and real time non-uniformity correction method, the two-point correction algorithmic and single-point correction algorithmic are used widely. Their flow is simple and fixed. They are also suitable to be implemented by FPGA. In this paper, the two-point and single-point method of non-uniformity correction based on FPGA are introduced. And whether the two-point correction or the single-point correction is taken is determined by external control signal. After the completion of the correction coefficients calculation, the coefficients are written into FLASH so that the data will not be lost when the system is powered off.
1696
Abstract: Hard alloy has been widely applied as a type of cutter material and cemented carbide cutting tools have become the main tools for processing enterprises in our country. During the blade production process, traditional artificial detection methods for surface defects can't satisfy the demands of production quality and production efficiency any longer. Online automation rapid detection has been realized based on the Compute Unified Device Architecture (CUDA) by utilizing the computing capability of GPU.
1700
Abstract: On the basis of analyzing the working principle of hard disk partition table in detail, this paper proposes a way to protect valid data in hidden partition relying on hard disk partition table list structure, which facilitates the management of campus computer labs.
Keywords: campus computer labs, hidden, partition, data recovery
1706
Abstract: Face detection is the key point in automatic face recognition system. This paper introduces the face detection algorithm with a cascade of Adaboost classifiers and how to configure OpenCV in MCVS. Using OpenCV realized the face detection. And a detailed analysis of the face detection results is presented. Through experiment, we found that the method used in this article has a high accuracy rate and better real-time.
1710
Abstract: There are two protocols, which are widely used in NGN network, namely the SIP protocol and H.248 protocol. According to different application scenarios and actual need, this paper fuse two different protocol characteristics, and network model is established, these can provide suggestions for the modification of the existing network of China.
1714
Abstract: With the rapid development of information technology, especially network technology, cloud computing, cloud platform, cloud learning as a symbol of the arrival of the cloud era, and promote the development of online education. The typical network learning mode MOOC began to be widely concerned. In this paper, on the basis of the analysis of the MOOC, cloud learning environment as the breakthrough point, this paper expounds the influences of the MOOC mode of cloud learning environment. Put forward on the basis of MOOC, integrate and optimize the existing teaching resources, to build their own cloud learning platform framework for colleges and universities.
1718
Abstract: This paper focuses on the correlation analysis method based on vector space model. In the case of dual classification, this paper made a Joint comparison to find the most appropriate method of selecting featured items for the focused crawler; and then made special effort on analysis and verification of LBTF-IDF algorithm in which the weight calculation method has been improved.
1722
Abstract: A radar target simulation system based on DRFM is designed in this paper ,in this system, the radar signal that is amplified and conversioned by the receive analog circuits is directly sampled by the ADC of DRFM, then the sampled data is stored in QDR2 SRAM array. When need to generate radar target simulation signal, the radar signal data is read from the QDR2 SRAM array and synthesis radar target simulation signal with the target characteristic parameters provided by the host computer. It can be widely used in various radar simulator occasions.
1726
Abstract: Campus networks are education, research and service with network of operation properties, due to network with connection of diversity,uneven distribution terminal, openness, interconnection, borderless, Freedom and so on, Causes the network vulnerable to attacks by hackers and viruses, and caused a great damage to society, schools. In this paper, Base on network security system dynamic APPDRR model for the theoretical guidance,combined with the characteristics of network system, a brief analysis of campus network security risk. And And the current mainstream network security technology were reviewed such as adaptive proxy technology, firewall, stateful inspection technology, agent technology, intrusion detection, security scanning technology. In this paper based on the analysis of campus network security technology research, with strong pertinence and feasibility. Researching on campus network security technologies are of great practical significance.
1730