Applied Mechanics and Materials Vols. 380-384

Paper Title Page

Abstract: For efficient collection of speech recordings, the ability to search for spoken terms in the speech stream is an essential capability. Although the Chinese spoken term detection (STD) does not suffer the out-of-vocabulary (OOV) problem as English, it is still hard to retrieve the long spoken terms which contain four characters or more. In this paper, we details our approach for long Mandarin spoken term detection which combines the search on inverted index produced by speech recognizer and linear scan on syllable confusion network. First, we split the long spoken terms into syllables and search the syllables on the inverted index _le to get the segments which may contain the long spoken terms. Then we use a linear scan algorithm on syllable confusion networks (SCNs). On two Mandarin conversation telephone speech sets, we compare performance using the method proposed with that of the baseline syllable-based systems, and our approach gives satisfying performance gains over the others.
2720
Abstract: The Chinese microblog (Weibo) grows quickly and eventually has been an essential tool for Chinese netizens. This paper proposes a cooperationcompetition model for the trend of the hot issues of Sina Weibo based on some hypothesis and parameter settings. After using the equilibrium solution theory of differential equations to solve the cooperationcompetition model, the appropriate strategies to control the trend of hot issues are stated.
2724
Abstract: The paper proposed a new model by applying biological immune into intrusion detection system, in this new model, generated algorithm of the mature detection get improved, the self-et realized dynamic, co-evolution module can effectively find the system potential vulnerabilities and generate the corresponding patch to strengthen the system. As of result, simulation experiment for this new model is did, through the analysis of the result for simulation experiment, it shows that the new model and method has higher rate in making matured detector than the traditional model and method, and new model also has higher detecting rate on intrusion detection. To sum up, the co-evolution method is able to strengthen the system effectively.
2728
Abstract: In the campus roaming, 3D scene is modeled using the 3ds Max .After the completion of texture, baking, output and other related operations, System is designed and developed using virtools. The 3D modeling and interactive function of campus was introduced, and the system optimization and other related techniques are discussed. Taking Chengdu Polytechnic as an example, the design of a real-time interactive 3D virtual campus is completed.
2732
Abstract: Basketball is a technical sport, and players' shooting action will affect the basketball hit rate, which affects the players' performance and competition results. Therefore, in the process of usual training, players should strengthen the basketball technology actions, under this background, the shooting action of basketball players are optimized. The basketball players are shooting, body lean back angle, release angle and release initial velocities as research object, the use of the B/S frame data mining system develops basketball shooting skills and competition information framework model, and the use of eight quantile statistics method determines the membership function, establishing the association of basketball technology actions and marks, according to the association index, it can successfully optimize design of the basketball shooting parameters.
2736
Abstract: The key content for vocational and technical education is practical teaching. Therefore, it is essential to carry out simulation system software in teaching. In this paper, experimental training of analogue simulation is further studied on theoretical significance, application value, special role and system construction. At the same time, experimental training of analogue simulation is proved to realize effectively training target of professional ability for higher vocational, combined with the example of Network Protocol Simulation Teaching System adopted by the department to explain.
2741
Abstract: The component array is a group of components that implement the same functions but provide different qualities. These component implementations can be switched at runtime for satisfying different user requirements and coping with environment changes. However, the design of component arrays is completely performed by hands of developers, which is complex, time-consuming, error-prone, and is poor at keeping up with the actual runtime conditions. This paper presents a scenario-driven state-based approach to modeling component arrays for satisfying requirements of predictable qualities. The automation of four vital steps of this approach is dependent on the interaction based modeling and state-machine based modeling. The approach is illustrated with UML (Unified Modeling Language) and the demonstration and experimentation are implemented on JEE (Java 2 Platform Enterprise Edition).
2745
Abstract: With the rapid popularity of P2P networks, the demand for digital rights management (DRM) in P2P mode is increasing quickly. The research on issuance of digital content licenses is the key issues in DRM. As for the centralized authorization systems, the security and the efficiency have certain defects. An improved distributed license authorization system is presented in this paper. And the nodes in the system are divided into six kinds of roles in accordance with theirs functions and a new non-interactive verifiable secret sharing protocol is introduced. Because of the adoptions of threshold secret sharing mechanism and the independent synthesis peers, the system security is improved in the transmission of digital content license and the burden of nodes is reduced in P2P networks. Each license authorization node gets the correct secret sharing by the non-interactive verifiable secret sharing protocol.
2749
Abstract: When the topology of data network in power grid was destroy, the system still need to provide intrusion tolerance service. The trust values relationship of the nodes in data network need be calculated. The trust value of the upper and lower limit can be deduced and adjusted to eliminate the problem of over-reliance on threshold. And the introduction of confidence values to assess the quality of the trust value. A recursive algorithm is used to obtain the average of the trust data to compute confidence values. The experimental result proves the veracity and validity of the method.
2753
Abstract: According to the problem that the flexibility and efficiency are not high of the current test paper generating system, applying data mining to figure out the inter and intra connection among all the knowledge points of CET-4, mining association rules, and picking out as more potential weaknesses of knowledge points as it can, then selecting items corresponding to the weaknesses and generating a user-level specific suitable test paper. Experiments show that the new test paper generating algorithm (TPGA) based on association rules response intelligently and quickly to different user levels, and provide an essential improvement in test paper generating process for users own good to enhance their exercise results.
2757

Showing 611 to 620 of 1095 Paper Titles