Emerging Engineering Approaches and Applications

Volume 1

doi: 10.4028/www.scientific.net/AEF.1

Paper Title Page

Authors: Ji Zhuang Hui, Yan Ma, Ze Feng Liu

Abstract: In order to meet the needs of high speed and high precision computerized numerical control machining, a calculation based on the control of...

262
Authors: Zhi Qiang Cai, Shu Dong Sun, Shu Bin Si, Ning Wang

Abstract: To facilitate the application of Bayesian network in engineering fields, learning proper structure from dataset is one of the most...

268
Authors: M. Reza Soleymani Yazdi, Michel Guillot

Abstract: This paper presents first a newly developed clustered neural network, which incorporates self-organization capacity into the well-known...

273
Authors: Wei Qing Wang, Yu Hua Yan, Rong Yu

Abstract: At the first, the algorithm unifies the all of the pixel domain within the rectangular pixels to . At the same time, it gave threshold value...

278
Authors: Wei Qing Wang

Abstract: Currently, the thinning algorithms based on the template have no completeness, so there are more error-retention and error-deletion pixels...

283
Authors: Jian Li Guo, Wei Wu, Shu Bin Xu

Abstract: The inherent dynamic and mobile natures of mobile ad hoc networks bring its flexibility and convenience in network deployment and...

288
Authors: Jun Wu, Run Hua Shi, Hong Zhong

Abstract: This paper proposes a hierarchical key management scheme in the mobile Ad hoc networks. In this scheme, there are two kinds of server nodes:...

295
Authors: Ning Zhao, Wei Jian Mi, Dong Sheng Wang

Abstract: This paper discusses the problem of determining a storage location for each unloaded container in the principle of cycling trailer...

300
Authors: Xue Chen, Fang Tao, Wu Chao

Abstract: The Associated Knowledge Flow (AKF) on the Web is an ordered sequence of Web pages that have associated relation. The associated relation...

305
Authors: Deng Yin Zhang, Zhen Xing Wang, Xiao Qiang Zhao

Abstract: In modern network confrontation, it is very important to improve the viability of web malicious code. According to the generation and...

310

Showing 51 to 60 of 81 Paper Titles