Applied Mechanics and Materials Vols. 496-500

Paper Title Page

Abstract: The rapid development of Internet has given rise to many new applications. Natural language processing, cloud computing, personalized recommendation technologies and so on are improving the experience of using information resources for people greatly. This paper puts forward the idea of a kind of intelligent learning website, it includes a variety of functions such as goal setting, skills assessment, making study plan, recommending learning content, answering questions, recommending partners and projects, etc. Just like as if user has his own personal trainer. Related implementation techniques are discussed in this paper, and put forwards the algorithm of network user identification based on digitalized persona, it provides a new train of thought of identify users characteristic and demand for precisely personalized recommendation.
2146
Abstract: In general, moving target detection method has the background subtraction method,the adjacent frame difference method and the optical flow method. In order to quickly and accurately detect the moving targets of surveillance video , expand the location tracking study.This paper describes the detection method in real-time vehicle moving target,used AForge.NET library and based on the absolute of image gray difference is greater than the taken threshold value. Implementation results show that this method can effectively and quickly detect moving objects in video sequences.
2150
Abstract: Self-physical simulation technique has been increasingly extensive used in measuring and evaluating the performance of weapon systems. Based on the characteristics of self-physical simulation, measuring methods of this technique to radar range and coordinates tracking accuracy of radar targets have been discussed in this paper, and which lays certain foundations for performance evaluation of weapon system.
2154
Abstract: This article first briefly introduces the characteristic of the wavelets transform ,explains the concrete operations process that the conjugate gradient method restructuring signal, then narrates in detail the modulus maximum value de-noising's algorithm, finally using the dyadic wavelet transform modulus maximum value de-noising method respectively carries the processing on the synthesis and noisy signal and the actual seismic signal, the experimental result indicates that this algorithm makes the good progress, the seismic data quality is enhanced greatly.
2158
Abstract: The modern computer network has been everywhere in our daily life and working. People obtain information from a computer network or use it to improve working efficiency. The computer network becomes more and more important. The information security decides the long-term stable application of the network. Actually, information security receives various security threats during the practical application. If we cannot support effective, reasonable, and comprehensive protection strategy on time, computer network information or data will be stolen and destroyed. This article analyzes and researches various security loopholes that aiming at computer network information security, and provides related protection strategy.
2162
Abstract: The line features are mainly labeled by center line labeling mode, parallel line labeling mode and point labeling mode. These three labeling modes have different needs. In this paper, how to choose the best position labeling is discussed, the location of parallel line labeling is used for dividing dynamic segments based on line labels and obtaining smooth location of line features as the location of labels. The results obtained in this paper can be applied to solve the problems of ambiguous expressions and/or invisibility of labels of line features, achieving the unity of the integrity and aesthetics of the automated output.
2166
Abstract: Security management of information system is one of the important contents of system engineering management, especially the security risk assessment, which places the core center of system engineering. Through risk assessment of an information system can help analyze system safety and find out the potential risk. Build risk model of information safety can provide necessary guidance for security strategy design and the implementation. This article researches the assessment model and method of information security risk.
2170
Abstract: Community detection as a branch of social network analysis has been a hot topic in the past decade. This paper reviews the research about the community detection these years and focuses on the community detection relevant classical algorithms as well as the classic real network datasets.
2174
Abstract: Logging data preprocessing is the basis of reservoir description and reservoir evaluation with logging data, which is a technique that can reduce the influence generated by the nongeological factors (such as the logging environment, logging instrument precision and calibration, the artificial operation etc.) as much as possible by some mathematic methods. This paper analyzes the regular methods of logging data preprocessing such as well logging curve environment correction technique, logging curve normalization technique and logging curve interpolation technique, and presents standard procedure of logging data pretreatment and application results. The result shows that logging preprocessing will get better result.
2178
Abstract: Cross-regional medical information sharing is a research hotspot in the field of current regional health informatization. This paper put forward a system architecture based on IHE-XDS (Integrating Healthcare Enterprise-Cross Enterprise Document Sharing) technology framework, meeting the requirements of ebXML (Electronic Business using eXtensible Markup Language) and distributed access to patient medical documents, and completed the document registration inquiry services and achieved document sharing by studying the mapping relationships between IHE-XDS and ebXML information models.
2182

Showing 471 to 480 of 661 Paper Titles