Applied Mechanics and Materials Vols. 513-517

Paper Title Page

Abstract: As an emerging industry, large-scale commercial and residential interior rational planning is related to the comfort of living. This paper proposes a virtual simulation method to design and plan large-scale commercial and residential interior space. The paper uses least squares image matching method in virtual reality to construct spatial distance calculation model, calculate the straight-line distance of key parts in large-scale commercial and residential space, and make up the shortcomings in traditional design. The design can be adjusted to the specific circumstances to reduce the cost of the actual design. Finally, simulation is conducted on basis of design data to prove the advantages of virtual reality.
2307
Abstract: The paper focuses on the specific network contents rapid search methods in public policy formulation. When the public policies contain massive amounts of network contents, the components in the public policies will become complex. The diversity of the data features will cause obvious differences in data attribute which will lead low efficiency in searching some specific contents in public policy formulation and cause some difficulties in the search. In order to avoid the defects, this paper proposes a data mining method based on parallel Apriori algorithm which can complete the specific network contents search in public policy formulation. The experiment illustrates the application of the algorithm can optimize the contents search in public policy formulation and effectively increase the efficiency of searching some specific contents in the public policy formulation.
2311
Abstract: The network information in cloud computing environment is in the format of massive data with high dimension features. In order to increase the accuracy of massive data automatic classification, this paper proposes a relevant massive data classification algorithm. This algorithm first transfers the features of the massive data in the cloud computing environment into one multi-objective optimization problem. In the specific mining area, the algorithm associatively classifies the massive data information and the selective standard is the high accuracy. The simulation and experiment test the performance of the algorithm which shows the algorithm can effectively classify the features of the massive data in the cloud computing. The algorithm can increase the accuracy and efficiency of the automatic classification which is an effective method for massive data.
2315
Abstract: Interfered by a variety of emergencies, it is difficult for the parameters in traditional robustness testing model for 4G networks to change adaptively. This paper proposes a quantified robustness detection model associated with fuzzy theory for 4G network. On basis of new measures for robustness of 4G networks, accordance with efficiency of 4G networks and size of connectivity diagram in small areas, the paper computes the associated robustness of nodes in the region and completes robustness tests. Simulation results show that: the topology has important implications on robustness of 4G networks; in different interference environment, this method can preferably express robustness changes in 4G network topology.
2320
Abstract: Multimedia teaching is the main body of the modern education, multimedia technology should be correctly understand and properly with modern information technology integration, which can be efficient applied to education, and it is one of the hot problems in the present education. This paper firstly analyses the multimedia teaching body structure and its development trend, on the basis of this, we put forward the construction of multimedia teaching model based on modern digital cellular communication, and we detail analysis of multicast technology. Under the background of CDIO engineering education model, we carry out teaching empirical analysis, to provide the theory of new research direction and the path of practice for the contemporary multimedia.
2324
Abstract: According to the visibility of regional culture in city architectural planning and design, combining with the visual system of metabolic network in the chemical reactions of biological, a digital oriented model is presented, and the regional culture of city construction planning is as the visual target. The general topology information can adjust some concrete parameters, to improve the quality of the visual layout. In addition, because metabolic networks have the scale-free network characteristics, we is according to the scale-free characteristic of metabolic networks in the visual effect, we propose an optimization system for hub node, making the more prominent visual effect of the regional culture.
2329
Abstract: Under the background of information era, we use WEB2.0, which has rich feedback system of users, to analyze the diversification of information transfer mode. It will make the performance results of the system more intelligent and systematization. Therefore, we use the manifestation of architecture planning art as an example, in the WEB2.0 environment, presents a multi hot spot mining algorithm, to analyze the diversification and individuation. We use the established transferring model to do data modeling. Then extracting and evaluating the content of text. The experimental results show that the data hot mining algorithm based on diversification can use the feedback information of users effectively, adapting to the WEB2.0 environment. Therefore, in the spreading development of internet information today, based on the internet resources, this paper presents a new algorithm to analyze diversification and individuation manifestation of architecture planning art. It provides a technical innovation and theoretical reference.
2334
Abstract: With the expansion of a variety of power networks, communication networks and computer network and in order to meet the needs of network users, network services must be promoted by the use of dynamic network environment. But, the workload of the server is very large. According to P2P space vector theory and space vector quaternion theory, this paper studies the network communication networks clustered mode and establishes quaternion model of P2P space vector. At last, this paper treats the index of communications network cluster as the experimental model and establishes quaternion-node network of communication network. It also stimulates quaternion model of P2P space vector and gets the server function achievement result of two-node in P2P spatial pattern which provide a theoretical reference for the innovation of communication and computer network servers.
2339
Abstract: With the popularization of internet, cyber language is used more and more frequently. The network language has formed a unique system of computer language library. So studying of computer language has great significance to the development of the network language. Language library capacity cant be unlimited expansion. To enhance the computer language network function we must use correlation algorithm to simplify the computer language. In this paper, an improved method based on the network language new is proposed. We apply the neural network speech recognition model with multi hierarchy recognition technology to computer language, and put forward TEI model of computer network language identification. We use the VB program to call on the MATLAB software, successfully simplify the complex recognition process of the network language. At the same time, computer network language also has certain reference value for English language learning. It can help learners to avoid the negative effects of network language on the English language.
2345
Abstract: Cloud computing is the most anticipated revolution in the computer field. It has the ability to distribute the resource dynamically. According to the needs of the client service, with the lowest cost to solve the computer information processing, it creates hope for the computer technology innovation. But cloud computing has certain vulnerabilities for privacy in the network environment. Because the resource is allocated dynamically, privacy information is easy to be stolen. This paper improves MB-Tree model, gives the ability of protecting customer privacy information dynamically, and establishes the mathematical model and algorithm of dynamic MB-Tree. In order to verify the algorithm, finally we verify the algorithm of MB-Tree model, in which dynamic protection effect of privacy information with different time is up to 98%, protection effect of different data is up to 96%. The privacy information of cloud computing is got better protecting effect.
2350

Showing 511 to 520 of 1031 Paper Titles