Applied Mechanics and Materials
Vols. 365-366
Vols. 365-366
Applied Mechanics and Materials
Vol. 364
Vol. 364
Applied Mechanics and Materials
Vols. 361-363
Vols. 361-363
Applied Mechanics and Materials
Vols. 357-360
Vols. 357-360
Applied Mechanics and Materials
Vols. 353-356
Vols. 353-356
Applied Mechanics and Materials
Vols. 351-352
Vols. 351-352
Applied Mechanics and Materials
Vols. 347-350
Vols. 347-350
Applied Mechanics and Materials
Vol. 346
Vol. 346
Applied Mechanics and Materials
Vol. 345
Vol. 345
Applied Mechanics and Materials
Vol. 344
Vol. 344
Applied Mechanics and Materials
Vol. 343
Vol. 343
Applied Mechanics and Materials
Vols. 341-342
Vols. 341-342
Applied Mechanics and Materials
Vol. 340
Vol. 340
Applied Mechanics and Materials Vols. 347-350
Paper Title Page
Abstract: The stand or fall of database design was related to an information management system was really practical. Analysis of user demand from the library management information system, the design and implementation of the database part in the system development process was discussed as a key point, and the concrete realization link was analyzed and discussed also.
2533
Abstract: This paper discusses the application of the technology of NetUI flow page in the business logic of Web applications. The page flow uses declarative programming method, and has session state and modular design, which can be nested to use and effectively separate the logical code in the Web applications, to make the application structure clear, easy to be read and modified. The paper references a business logic of the users login authentication to illustrate the implementation process of the entire page flow.
2536
Abstract: Thispaper presents aCoal Heavy Haul Transportation Assembly Scheme Problem (CHASP), in which the time consuming functions, assembly number constraints and assembly weight constraints etc are considered. The time consuming costs consist of residence time and disassembly time. The disassembly time functions are usually nonlinear functions of unit train departure directions. Then, a nonlinear 0-1 programming is formulated for the problem and solved by lingo mathematical solver. Considering the complexity of the problem, a kind ofGenetic Algorithm is proposed to solve it. Extensive computational experiments are taken on randomly generated data, the detailed results are given and the genetic algorithm is shown to be efficient.
2541
Abstract: In many practical data mining applications, unlabeled training examples are readily available but labeled ones are fairly expensive to obtain. Therefore, as one type of the paradigms for addressing the problem of combining labeled and unlabeled data to boost the performance, active learning has attracted much attention. In this paper, we propose a new active learning approach based on diversity maximization. Different from the well-known co-testing algorithm, our method does not require two different views. The comparative studies with other active learning methods demonstrate the effectiveness of the proposed approach.
2548
Abstract: Cybersecurity, as stated in the 2010 National Security Strategy of America, threats represent one of the most serious national security, public safety, and economic challenges we face as a nation. This paper examines the cybersecurity situation that the nation faces. Based on this, the vulnerabilities present in information systems and systems supporting critical infrastructure to cyberattacks are discussed. The argument is presented that Chinas internet censorship techniques have improved that nations Cybersecurity, which could affect the outcome of a conflict in cyberspace. The key future features of the Cybersecurity in China are put forth at the end of the treatise. The author believes such analysis can credibly help the establishment of the national Cybersecurity strategy.
2553
Abstract: Based on the idea of "functionality-centric", this paper proposes a complete set of oriented semantic query methods for Deep Web, builds up the relevant software architecture, provides a new method for full use of Deep Web data resources in semantic web environment through describing the establishment of the semantic environment, re-writing the SPARQL-to-SQL query, semantic packaging of semantic query result, and the architecture of semantic query services.
2559
Abstract: In the service-oriented environment, the composition of multiple web services is always used to satisfy the given request. To meet the request, the compositions of the services are various. Aim at such difficulty, described with the environment ontology, the relative theory of Petri net is proposed to build up the service composition requirement model. After simplify the model, an algorithm of building a reachability tree is proposed. Then all the possible service compositions are got through an algorithm similar as depth-first search. At last, we use the classic example of travel arrangement to verify the theory above all.
2564
Abstract: With the rapid development of Internet, e-commerce had been widely using by more and more people, so had shopping online . The J2EE architecture was adopted in this paper. An florists shop online system was designed and implemented based on the analysis of the actual needs of users. Through running test for a period of time, the system could be operated steadily, and its function was complete. The system could achieve flower sales on line that was highly efficient and convenient, and the design purpose was achieved also.
2571
Abstract: The web data collection is the process of collecting the semi-structured, large-scale and redundant data which include web content, web structure and web usage in the web by the crawler and it is often used for the information extraction, information retrieval, search engine and web data mining. In this paper, the web data collection principle is introduced and some related topics are discussed such as page download, coding problem, updated strategy, static and dynamic page. The multithread technology is described and multithread mode for the web data collection is proposed. The web data collection with multithread can get better resource utilization, better average response time and better performance.
2575
Abstract: In this paper, FLANN(functional link ANN) filter is presented for Gaussian noise. FLANN is a singer layer with expanded input vectors and has lower computational cost than MLP(multilayer perceptron). Three types of functional expansion are discussed. BP(back propagation algorithm) for nonlinear activation function and matrix calculation for identical activation function are exploited for training FLANN. Simulation shows that convergence is not guaranteed in BP and related to the initial weight matrix and training images, and that linear FLANN trained by matrix calculation performs better than both nonlinear FLANN trained by BP and Wiener filter in detail region in environment of Gaussian noise
2580