Applied Mechanics and Materials Vols. 303-306

Paper Title Page

Abstract: The world is increasingly awash in more and more unstructured data. Object-based data de-duplication is the current most advanced method and is the effective solution for detecting duplicate data. We developed an energy saving policy for conventional disk based RAID systems. According to the characteristics of object-based data de-duplication, we introduce object layout strategies for unstructured data applications; disk accesses are concentrated in a part of the disks in a long time which is conducive to scheduling other disks into standby or shutdown mode. Our proposed methods reduce energy consumption of de-duplication storage system.
2284
Abstract: Following with news and forums, microblogging becomes the third largest source of Internet public opinion. So it is necessary to do research of microblogging topic discovery. Firstly, we detect hot topics through the the keywords detection algorithm. Secondly, elect most popular microblogging text in the massive microblogging text by combining of keywords weigh and textual information entropy. Finally, using the dynamic clustering algorithm, the microblogging text elected, will form into different news topics by clustering polymerization. According to experimental validation of the true microblogging data, hot topic can be effectively detected from the text of a large number through the method.
2289
Abstract: According to the survey of needs of laboratory management system, teachers and managers have behavior induction role to students’ study. So we set up a laboratory management system with the background of cloud and the internet of things, and design dynamic reports works in the system, including database design and report output format. And analyze user’s behavior induction role through the system.
2294
Abstract: The specialties and limitation of RFID system and device will incur lots of security problems especially when the system contains a lot of tags and many readers,the traditional methods become helpless. Here we present and analyze an improved hash key technique based on multiple readers.
2298
Abstract: Information technology (IT) has been introduced to the construction industry to improve productivity and competitiveness. But IT tools are not being activated because field engineers are not familiar with IT tools, and consider the additional work to be a burden. Therefore, this study aims to examine the potential application of the Digital Pen to the construction industry. The results of this study showed that there is the potential to apply the Digital Pen to many fields of the construction industry.
2303
Abstract: Human-machine Interaction (HMI) system plays a crucial role in borehole-to-surface electromagnetic surveys. In electromagnetic transmission system, real-time monitoring ability about transmitted parameters and states has benefit to prospect accuracy and efficiency improvement. The aim of this study is to develop a HMI software applied to borehole-to-surface electromagnetic transmission system. The HMI software programmed by C language controls transmission system to achieve several main functions, such as frequency transmission, transmission mode alteration, GPS time adjustment, RTC time display and battery power monitoring. From 2009 to 2010, there are four prospecting experiments did for this software. One is in the indoor laboratory, and the others are on the different mineral districts.
2307
Abstract: The structures and contents of researching search engines are presented and the core technology is the analysis technology of web pages. The characteristic of analyzing web pages in one website is studied, relations between the web pages web crawler gained at two times are able to be obtained and the changed information among them are found easily. A new method of analyzing web pages in one website is introduced and the method analyzes web pages with the changed information of web pages. The result of applying the method shows that the new method is effective in the analysis of web pages.
2311
Abstract: Present a semi-automatic method to rapid reconstruct 3D building models from point cloud based on building semantic objects, its symmetric and repeated properties, introduce its basic theory and detailed work flow. Experiment investigation shows that the method is more efficient and more productivity than existing reconstructing methods.
2317
Abstract: The entity can be attributed to two-half dimension modeling in the nature, so it is important to research on 2.5D modeling. Because traditional 2.5D modeling is focus on equal or unequal change in the vertical direction, so it is not good at the entity modeling. This paper is discussed expanding half-dimensional information in the traditional 2.5D modeling in accordance with actual needs. Expanding half-dimensional information contains several parameters of the variable that it can be modeling so fast.
2321
Abstract: Most researches regard the real traffic has self_similarity,so traditional model based passion or Markov can’t adapt to the real traffic.In order to resolve these problems,the estimation is used based on Hurst parameter to detect DoS attack,researching on the affect of Hurst paramerter change brought by DoS attack,By analyzing the 1998 DARPA intrusion detection evaluation dataset show that this method detect DoS attack,and is more reliable on the recognition of all kinds of DoS attack than any other method based on measure precision.
2325

Showing 461 to 470 of 595 Paper Titles