Applied Mechanics and Materials
Vols. 143-144
Vols. 143-144
Applied Mechanics and Materials
Vol. 142
Vol. 142
Applied Mechanics and Materials
Vol. 141
Vol. 141
Applied Mechanics and Materials
Vol. 140
Vol. 140
Applied Mechanics and Materials
Vols. 138-139
Vols. 138-139
Applied Mechanics and Materials
Vol. 137
Vol. 137
Applied Mechanics and Materials
Vols. 135-136
Vols. 135-136
Applied Mechanics and Materials
Vols. 130-134
Vols. 130-134
Applied Mechanics and Materials
Vols. 128-129
Vols. 128-129
Applied Mechanics and Materials
Vol. 127
Vol. 127
Applied Mechanics and Materials
Vols. 121-126
Vols. 121-126
Applied Mechanics and Materials
Vol. 120
Vol. 120
Applied Mechanics and Materials
Vols. 117-119
Vols. 117-119
Applied Mechanics and Materials Vols. 135-136
Paper Title Page
Abstract: Based on the probability model of clustering algorithm constructs a model for each cluster, calculate probability of every text falls in different models to decide text belongs to which cluster, conveniently in global Angle represents abstract structure of clusters. In this paper combining the hidden Markov model and k - means clustering algorithm realize text clustering, first produces first clustering results by k - means algorithm, as the initial probability model of a hidden Markov model ,constructed probability transfer matrix prediction every step of clustering iteration, when subtraction value of two probability transfer matrix is 0, clustering end. This algorithm can in global perspective every cluster of document clustering process, to avoid the repetition of clustering process, effectively improve the clustering algorithm .
1155
Abstract: The tendency of future communication network is to set up an environment supporting network convergence as well as dynamic service collaboration. The recent Internet of Things (IoT) visions makes provision of User-Centric and active service to common users an important aim. Service-Oriented Architecture (SOA) based on Web service technology works well for provision of request/response style passive service. However, services and devices in IoT or mobile environment may dynamically interact and cause a considerable amount of states changes, which calls for an active and more flexible framework to enable interactive service provision. In this paper we propose an Event-driven SOA based service integration framework (EDSIF) for provision of active service. Compared with traditional SOA based service provision method, this approach will facilitate real-time event processing as well as intelligent service coordination. We present the concept model of Event-driven SOA and the key components of EDSIF. We also illustrate the ECA4IoS rules for active service execution and the enhancement work of WSN broker towards an effective EDSIF.
1159
Abstract: A new feeding form is designed as a discontinued T-shaped in this paper. This paper also models a function with restrict conditions, a set of data is educed by optimizing nonlinear function, which is transformed through adding penalty function. At last, when the two-set coaxial impedance matching apparatus is fixed on the antenna, a comparison of simulator between the impedance and without it indicates that the matching results are satisfactory.
1168
Abstract: An efficient and secure two-way asynchronous quantum secure direct communication protocol by using entangled states is proposed in this paper. Decoy photons are utilized to check eavesdropping; the securities of the protocol are equal to BB84 protocol. After ensuring the security of the quantum channel, both parties encode the secret message by using CNOT operation and local unitary operation separately. The two-way asynchronous direct transition of secret message can be realized by using Bell measurement and von Neumann measurement, combined with classical communication. Different from the present quantum secure direct communication protocols, the two parties encode secret message through different operations which is equivalent to sharing two asymmetric quantum channels, and the protocol is secure for a noise quantum protocol. The protocol is efficient in that all entangled states are used to transmit secret message.
1171
Abstract: The article tracks the fruit-trees robot, and analyzes the fruit-trees robot’s dual-motor control system. Based on the speed incremental PID closed-loop control algorithm of the step DC motor, the PID controller’s proportional coefficient, integral coefficient and differential coefficient is concluded. It demonstrates from the stimulations and experiments that the usage of speed incremental PID control do better at the response speed and stability than the open-loop control motor when the robot is run by a straight line on the ground at the 3000rpm.
1179
Abstract: This paper is analyzed based on the principles and methods of the information electromagnetic disclosure. FLO/EMC research is done of the problem of the developed anti-disclosure electronic equipment box [1]. The current distribution of the box's inside surface is analyzed through simulate the shielding box's gap. The shielding effect of the box's different gaps in given. With the principle of the information leak, the suggestions of the conductive gasket to prevent information leak is proposed to support the design of the anti-leakage equipment theoretically.
1183
Abstract: In view of the electromagnetic information leakage of information security implication, the time-frequency characteristics of radiation signal from LCD display with a resolution of 1280×1024 through simulation is analyzed in this paper. The design and measurement of the shielding box is given. A USA military standard testing is made, which shows that the designed shielding box is less than the overall emission of radiation 35 dBμV/m and with a proper increase In protection radius, the amount of its radiation emission can be reduced to 20 dBμV/m or less, lower than the 20 dBμV/m of the ambient noise thus meeting the information security requirements.
1187
Abstract: This paper presents how credibility theory and chance constrained optimization method can be efficiently applied for modelling and solving transportation problem in fuzzy environment. Since the proposed transportation model includes fuzzy variable coefficients defined through possibility distributions with infinite supports, it is infinite-dimensional optimization problem. Therefore, we can not solve directly it by conventional optimization algorithms. To overcome this difficulty, we will discuss the approximation of the fuzzy transportation chance constrained problem in this paper, and design a heuristic algorithm, which combines approximation method (AM), neural network (NN) and genetic algorithm (GA) algorithm to solve this transportation chance constrained model. Finally, we present one numerical example to show the feasibility and effectiveness of the proposed method.
1193