Applied Mechanics and Materials Vols. 536-537

Paper Title Page

Abstract: With the promotion of 3G networks and upcoming 4G network, mobile phone users in constant rise. The volume of data they produce will soar every day. A variety of data appear results in the database have rapid increasing. Some application system in access to these heterogeneous, huge databases is bound to access difficulties, the problem of low efficiency of access. Query optimization technology is proposed in this paper, based on data partitioning, by reducing the database size to solve the problem of memory and huge amounts of data access problems. From the experiment test, the method can effectively improve the efficiency of huge amounts of data access, can get satisfactory results.
512
Abstract: The Web has become a huge information resources distributed information space, contains a huge amount of various types of Web documents.Search engine, it is difficult to meet different user requirements for the elaboration of the retrieval results.To noise method, this paper proposes a text first to find out the noise page information, then according to the rules of human interaction way to generate a denoising, finally find and remove the noise, the experiments has been proved this method to be effective on improving the accuracy of classification.
516
Abstract: Usually, non trivial network visiting behaviors implied in network visiting log can be treated as the frequent itemsets or association rules if data in networking log file are transformed into transaction and technologies on association rule can be used to mine those frequent itemsets which are focused by user or some application. To mine non trivial behaviors of network visiting effectively, an attention based frequent itemsets mining method is proposed in this paper. In our proposed method, properties of users focusing is described as attention set and the early selection model of attention as information filter is referenced in the design of our method. Experimental results show that our proposed method is faster than apriori algorithm on the mining of frequent itemsets which is focused by our attention.
520
Abstract: In order to help driver to know the fuel efficiency of his car, the application software for information management of car oil consumption was developed based on the Android phones. The oil information filling up the car and the gas station information are inputted by the driver using the software each time. Then the fuel consumption information could be counted automatically. The statistic results could be shown as table, chart or curve respectively. The calculation method of car oil consumption is proposed based on the amount of oil left. It is more accurate and effective than traditional method which is based on oil lamp.
524
Abstract: This paper studies the key technologies and algorithms for open government data platform, presents data visualization of multi dimension report based on data mining, model, showing relationships based on semantic analysis based on the data analysis of large data, and based on the open platform construction of Qingdao City Hall data, will have a theoretical and technical reference results the research and construction.
529
Abstract: 10G Ethernet technology has been widely used in modern high speed communication system. As a result, program design for high-speed data capture on 10G Ethernet, as the first and important step in network monitor and analysis system, has become a challenging task. This paper proposed a high-speed data capture method based on WinCap and shared memory pool technology and has features of high speed, low packet loss rate, high efficiency and good portability. The system test and data analysis proved that the proposed method in this paper can effectively capture the data at speed of 6Gbps and stably keep the packet loss rate under 0.03%.
536
Abstract: This paper presents a heterogeneous sensor networks to improve query processing mechanism. Analysis of the advantages and disadvantages of centralized query processing algorithm is proposed based on the spatial distance distributed query processing algorithm based on semantic similarity and distributed query processing algorithms for query execution processes described. Use simulation to choose better coverage and semantic similarity by half, and centralized query processing algorithm, based on the spatial distance distributed algorithms, distributed algorithms and performance-based semantic distributed hybrid algorithm were compared.
540
Abstract: we analyzed the fruits and the existing problems of the management of government information resources in China and abroad, studied the management system model of government information resources based on the model theory and the analysis method of the value chain, innovated and optimized the key technologies and standards concerning the links such as collection (acquisition), integration (warehousing), presentation (organization), sharing (exchange) and utilization (analysis) of information. We combined the fruits of theoretical research with the planning and construction of the sharing and management platform of government information resources and the government data opening platform of Qingdao and to realize highly integrated management in the whole process of sharing and utilization of government information resources. The fruits of research and construction will play an important role of reference in terms of theory and technology.
545
Abstract: According to the characteristics and the application background of the intelligent home, designs the multi function control system of a family. The system uses Freescale i.MX51 processor Carle company ARM Cortex series A8 as MCU, the embedded Linux as the software development platform, and design a friendly user interface based Qt technology, realizes the ARM plate of each function module and server interaction. System with digital video intercom, messaging, appliance control, security alarm, home entertainment and other functions.
554
Abstract: In recent years, integrated circuits subject to hardware Trojans attack in the design and manufacturing process, the security of chip and hardware security was threatened. Some detection methods of have been proposed, the most common of those methods is based on side-channel signal analysis, however, since the effect of process noise, considering only the unilateral information that is difficult to effectively distinguish the noise and Trojans circuit. In this paper, the method still based on side-channel signal, but it is a combination of power and delay which was called the power-delay product (PDP). The idea proposed is verified by the benchmark circuit iscas85, the experimental results show that this method can effectively improve detection probability.
558

Showing 101 to 110 of 348 Paper Titles