Applied Mechanics and Materials Vol. 422

Paper Title Page

Abstract: First, heuristic clustering method based on local information is introduced, second, the label propagation method based on local information is summarized, and then problem of the iterative process and a random strategy to select a node that belongs to the cluster structure are analyzed. Label propagation algorithm base on the similarity of node attributes is improved. At last, the experiments are used to help discover the efficient and availability of the algorithm, and put the algorithm into preliminary application.
279
Abstract: The demands of tourism text translation go up drastically with the rapid development of the tourism industry in China. As the traditional translation mode is characterized by time-wasting and low-efficiency, it is difficult to adapt to the tourism industrial boom. Therefore, it is advisable to make full use of the advanced translation platform built by computer-aided memory techniques, convenient human-machine interactive system, open vocabulary, memory and terminology databases. Thus in this paper, based on the practice of translation, we will explore the application of computer-aided translation technology in C-E translation of tourism texts from the lexeme, syntax and discourse level to improve translation efficiency and quality.
285
Abstract: In recent years, 3S geography tech strode out of the ivory tower and was quickly extended to many areas of geography, more profound impact on our lives. Construction of shopping centers around the need to count the daily consumption of residents, authorities need to understand the floods caused economic losses, transportation management need to master the urban traffic conditions, geography teaching need to master modern teaching methods and other issues like this, there is even more complex the problem can be solved by means of high-tech means geography, its efficiency and scientific nature are difficult to compare with traditional means.
291
Abstract: In order to reduce uncertainty of maintenance support analysis result, the article puts forward a method to analysis the sensitivity of result uncertainty on input parameter. Firstly, the paper analysis the uncertainty measurement methods and uncertainty production mechanism of model output result. Secondly, the sensitivity parameter and sensitivity analysis method which based on conditional entropy thought are given. Thirdly, it briefly introduces blind number theory used in analysis data with uncertainty. Finally, combined with the mean maintenance time model case, the paper illustrates the availability of uncertainty sensitivity analysis method and proves the conclusion that uncertainty sensitivity analysis cant be equated to derivation.
296
Abstract: AbstractIn Multi-user and Multi-take environment, to ensure the normal operation of the system, we must to take measures in advance, to avoidance strategy or prevention strategy take place, The Bankers Algorithm is the famous method to avoidance strategy. In this paper, we studied the principle and data structure of Bankers algorithm, designed the concrete steps of the algorithm, and implement the algorithm by design a program. In the experiment, although we repeated changes the method of the loop algorithm, we Can still get the same conclusion. That is: no matter what loop order, the result that system is in or not in safe is the same. Because if in safe station, the system sometimes exist several security sequence, We adopted a different method, in which different sequence obtained..
303
Abstract: This paper mainly introduces the basic dynamics model of evolutionary game theory: asymmetric replicator dynamic model and asymmetric replicator dynamic model and its relative conclusions. In order to facilitate understanding, a few simple examples are cited in the text to illustrate the differences between them. On the basis of the above, it also introduces theorists for random dynamic researches and theoretical achievement. Finally, this paper compares the classic game theory and evolutionary game theory in dynamic conceptual difference.
309
Abstract: Traditional Key Chain (CC) technique encounters problems, such as the limit of application field of CC and the imperfectness of buffer management mechanism. Firstly, in this paper, CC is applied to cost management and integrated model of schedule buffer and cost buffer is made; Secondly, buffer management mechanism of schedule and cost is established to scrutinize synchronously the state of project schedule and cost; Finally, integrated buffer trend of schedule and cost is depicted to be used as an effective tool to control project schedule and cost.
321
Abstract: Collaborative competition between manufacturers and monopoly supplier is a game relationship, which is very complicated. It involves many factors, both collaborative management relations, and there is competition between non-cooperatives. The enterprise core ability in the relationship is the research variables of the analysis. Meanwhile, it is necessary to establish a negotiation model, but because the quantization of core competence has a certain degree of difficulty, to quantify and measure the bargaining power is very difficult. Quantification of core competence and bargaining power are to be further analyzed and researched.
327
Abstract: From the perspective of combination principles, product form is divided into several modules for extracting profile curves; applying Genetic Algorithm (GA), product form chromosomes are coded in tree structure, through crossover and mutation operators to generate new programs; the method of product semantics is introduced into the process of evolutionary computation to enhance the interactivity of evolutionary computation by fuzzification, in which designer can decide the orientation from the selected products and guarantee the results can reflect the designer's innovative ideas. With Visual Basic and Rhinoceros platform a product form innovative design system is developed.
336

Showing 51 to 59 of 59 Paper Titles