Applied Mechanics and Materials
Vol. 598
Vol. 598
Applied Mechanics and Materials
Vol. 597
Vol. 597
Applied Mechanics and Materials
Vol. 596
Vol. 596
Applied Mechanics and Materials
Vol. 595
Vol. 595
Applied Mechanics and Materials
Vols. 592-594
Vols. 592-594
Applied Mechanics and Materials
Vol. 591
Vol. 591
Applied Mechanics and Materials
Vol. 590
Vol. 590
Applied Mechanics and Materials
Vols. 587-589
Vols. 587-589
Applied Mechanics and Materials
Vols. 584-586
Vols. 584-586
Applied Mechanics and Materials
Vols. 580-583
Vols. 580-583
Applied Mechanics and Materials
Vols. 578-579
Vols. 578-579
Applied Mechanics and Materials
Vol. 577
Vol. 577
Applied Mechanics and Materials
Vol. 576
Vol. 576
Applied Mechanics and Materials Vol. 590
Paper Title Page
Abstract: It's a major issue that how can find worthy information in big data. Because big datacan be used in company's success according how to take full advantage of big data analysis. Currently, search technologies aboutbeing stored distributed and duplicated data does not need to strong consistency. Therefore, nowadays we utilize variety of storage based on NoSQL for allowing loosens of strict consistency. MongoDB and Elastic Search have been focused of search and store unstructured data. But they have weak points. So, in this paper, we are going to propose new framework using term-based partitioning which can make up MongoDB and Elastic Search’s limitations.
698
Abstract: In this paper, an improved wolf colony algorithm (WCA), named as efficient adaptive wolf pack search (EAWPS) algorithm was proposed. EAWPS adopts population manager strategy, adaptive sharing factor and boundary condition to avoid falling into the local minimum and to significantly improve the efficiency of WCA. The efficacy of EAWPS is compared with the original WCA and the standard PSO on six benchmark functions, the experimental results demonstrate that the proposed algorithm has a superior performance in both speed and accuracy.
702
Abstract: 3G standards such as TD-SCDMA use multi-user detection (MUD) at the base station to combat multi address interference (MAI) and inter-symbol interference (ISI). We review Cholesky factorization and Schur algorithm for Zero Forcing Block Linear Equalization. We compare the solutions of different algorithm for ZF-BLE by computation, and analyze the complexity of those methods.
710
Abstract: It is important to take account into both the spectral domain and spatial domain information for hyperspectral image analysis. Thus, how to effectively integrate both spectral and spatial information confronts us. Motived by the least square form of PCA, we extend it to a low-rank matrix approximation form for multi-feature dimensionality redu-ction. In addition, we use the ensemble manifold regularize-ation techniques to capture the complementary information provided by spectral-spatial features of hyperspectral image. Experimental results on public hyperspectral data set demonstrate the effectiveness of our proposed method.
716
Abstract: In order to quickly grasp the actual situation of the current protocol reverse solution, commonly used terms first collection protocol reverse engineering field, to describe the protocol reverse engineering and the formal definition of the protocol reverse reference model; then summarizes the existing protocol reverse solution in the main analysis techniques and algorithms, and discusses the application fields of reverse technology protocol; finally describes between actual situation and the ideal current protocol reverse engineering of the gap, and points out the defects existing in the current scheme monk unsolved problems, explore new directions for future research.
722
Abstract: To improve recognizing rate and recognizing efficiency, the algorithm of double-threshold is adopted in the endpoint detection, Mel-frequency Spectral Coefficients is obtained as speech characteristic parameters, the SVM parameters, penalty factor and kernel function parameter, were optimized with genetic algorithm, then, an speech recognition model was established with GA-SVM method. The improved algorithm was simulated by matlab, the experiment shows that this algorithm can achieved good results in isolated word speech recognition.
727
Abstract: In order to compare the accuracy of SM Solver, ANSYS software to analyze structural internal force bars,we use SM Solver and ANSYS software modeling steel frame door respectively, and comparing the situation of internal forces of the same type frame for error analysis. The results show that SM Solver and ANSYS software have small error in shear analysis, but the gap is relatively large in moment analysis, and the error is reduced with the increase in the number of dividing cells.
732
Abstract: Before image feature detection and recognition, image enhancement can highlight the main people or things and their details from foreground, and also can suppress the useless information from background effectively. An algorithm model of adaptive image generalized fuzzy enhancement is established. For all aspects of the algorithm model, a variety of computing forms are put forward, and the evaluation standard of image quality is defined. The principle of algorithm is to achieve space transform between image gray space and generalized fuzzy space using generalized membership transform and its adverse transform. In the process of space transform, the contrast among successive region for space of generalized fuzzy membership grade is enhanced by generalized fuzzy enhancement function. Enhanced images are evaluated by quality standard, and the optimal values of adjustable parameters of membership grade transformation function and the fuzzy enhancement function are selected adaptively based on the optimal quality. Then, the enhanced image with best quality can be obtained. Experiments show that the extracted contour of enhanced image is structured, weak-edge-highlighting, and rich-detail.
736
Abstract: The Internet of Things (IOT) provides people with a more integrated and intelligent services. The applications based IOT is focus on the solution driving safety in the paper. The design of driving safety control system based on the IOT is proposed and the topology of the system is given. Meanwhile, the alcohol content testing modeling of human blood after drinking is established using the simple differential equations sets. Meanwhile, the model is established and the model solution is given. In the end, MATLAB fitting curves of alcohol content in the blood is proposed and the simulation results showed whether measures are taken after driving, such driving permitted. it shows deeply intelligent driving safety control system can provide mankind with the better services of personal security.
741
Abstract: Finger vein authentication is a novel biometrics technology for personal identification. In this paper, universality, collectability, acceptability, circumvention, uniqueness, permanency and performance of finger vein distribution pattern are analyzed. Thereinto, universality, collectability, acceptability and circumvention of finger vein pattern are described simply through the citation of relational literature, and uniqueness, permanency, performance of finger vein pattern are particularly studied by experimental means. The experimental result shows that there are favorable general performance for finger vein pattern in biometrics, finger vein can be applied effectively in personal identity authentication, finger vein identification technology have a well applying prospect and developmental potential.
746