Applied Mechanics and Materials Vols. 347-350

Paper Title Page

Abstract: The development of computer science and plane geometry brings a new favorable opportunity for the research about the Four-color Theorem. After converting original map to undirected graph, this paper proposes a new method based on undirected graph and polygon triangulation to prove the Four-color Theorem.
2832
Abstract: Part of speech contains important grammatical information, so it has great significance for the natural language understanding while the words in the sentence are marked on the parts of speech. POS tagging rules based on statistical methods and rule-based method can mining effectively, but its marked accuracy need to be improved. This paper presents a statistical method and rules of the combination of speech tagging rule mining algorithm in order to improve the correct rate of marked.
2836
Abstract: In this paper, Let be a real expansive matrix, it mainly discusses the existences of frame wavelet set, we discuss the characterization of frame wavelet sets in, and several examples are presented, in order to deepen the understanding of frame wavelet set, which gives the two related theorems; we try to use an equivalent condition to describe frame scale sets, and give an equivalent description about a normalized frame scale set.
2841
Abstract: Aiming to lack for the verification method of equipment maintainability quantitative requirements, this paper researched the verification method of average replacement time through virtual simulation technology, and proposed the mathematical model of average replacement time, which can lay the foundation for maintainability virtual verification.
2846
Abstract: Based on the concept and organization mode of CSCW (computer support cooperative work), this paper is to describe the research on establishing an organization structure which has one center and multiple cooperative work nodes. By employing advanced multi-media processing technology and method, it shall constitute a cooperative work platform providing remote video conference capability. Moreover, it also focus on some key points including nodes management, operation information sharing and operation control of remote nodes etc. which shall improve performance of work platform including flexible structure, easy integration and high-efficiency of operation.
2850
Abstract: A kind of text classification method based on fuzzy vector space model and neural networks is proposed in the paper according to the problems that a text can be belongs to many types during the text classification. Fuzzy theory is adopted in the method to look the occurring position of feature items in text on as the important degree (membership) reflecting text subject, and fully considered the position information while the features are extracted, thus the fuzzy feature vectors are constructed, as a result, the text classification is close to the manual classification method. The established networks are constituted of input layer, hidden layer and output layer, the input layer completes the inputs of classification samples, hidden layer extracts the implicit pattern features of input samples, the output layer is used to output the classification results. Finally the effectiveness of this method is proved by some documents of Wan Fang data in experimental section. (Abstract)
2856
Abstract: As the traditional network defense is built on intrusion detection and passive protection, which is weak at dynamic response. The network deception technology in active protection is analyzed, and a network deception system based on active security model is proposed in this paper. This system implements a visual service of Honeypot as bait, analyses intrusion data and extracts new features and rules to enlarge the intrusion detection system feature library. The defense policies could be delivered real-time by management center. The problems of false alarm and leaking alarm for firewall or IDS are improved. And the limitations of single technology on the cooperation are overcome by linkage of Honeypot, firewall, IDS and router. The efficiency of unknown intrusion detected is increased.
2860
Abstract: The handling equipment optimization problem of material handling system for large ships is discussed in this paper. The optimization models for two supply ways which includesshore-to-ship and vessel-to-vesselare proposed respectively, which are converted to linear programming problems in order to analyze large ship material supply handling system of equipment optimization.
2865
Abstract: In this paper, we propose a 3D tree simulation method which is based on fractal theory and combined with the morphological characteristics of trees. By modifying a few simple parameters we can achieve the realization of different types of 3D tree automated generation. According to the tree structure fractal self-similar characteristic, combined with the morphological characteristics of the trees, we abstract identified class to realize the description of each organs attributes and functions; Using random control function to improve the fractal iterative methods to make the generated trees more realistic; With the help of the developing platform of Visual C++ language and OpenGL, we can realize 3DTrees optimize modeling and visualization simulation. Experiments show that the method generates visually convincing results.
2869
Abstract: Recovery of degraded images due to motion blurring is a challenging problem in digital imaging. This paper presents a new method of Dirac Delta function algorithm to restore motion blurred images based on an analysis of the characteristics of the inverse filter method and the traditional algebraic method. Experimental results show that the new method is effective in performing motion blurred images at arbitrary direction restoration and extensively validated with different amount of noise in the images.
2874

Showing 571 to 580 of 805 Paper Titles