Applied Mechanics and Materials
Vol. 612
Vol. 612
Applied Mechanics and Materials
Vol. 611
Vol. 611
Applied Mechanics and Materials
Vol. 610
Vol. 610
Applied Mechanics and Materials
Vols. 608-609
Vols. 608-609
Applied Mechanics and Materials
Vol. 607
Vol. 607
Applied Mechanics and Materials
Vol. 606
Vol. 606
Applied Mechanics and Materials
Vols. 602-605
Vols. 602-605
Applied Mechanics and Materials
Vols. 599-601
Vols. 599-601
Applied Mechanics and Materials
Vol. 598
Vol. 598
Applied Mechanics and Materials
Vol. 597
Vol. 597
Applied Mechanics and Materials
Vol. 596
Vol. 596
Applied Mechanics and Materials
Vol. 595
Vol. 595
Applied Mechanics and Materials
Vols. 592-594
Vols. 592-594
Applied Mechanics and Materials Vols. 602-605
Paper Title Page
Abstract: HTML is utilized widely in web information description and exhibition. Although new technologies continue appearing during the HTML history, the basic structure and principal of HTML remains the same and HTML is still an important part for tasks such as web development and even dynamic page exhibition. We currently have mainly two types of parsers for HTML, SAX and DOM. The problem is that, the former is driven by parsing events but can only access the nodes sequentially with a slow speed, and the latter should load the whole document into memory and will consume a lot of space. In order to solve such problem, we proposed an automatic batch extraction method for specific content of HTML based on tag locations. The extraction process can be divided to two main steps, the first step is locating the start and end positions of HTML tags, the second step is finding the desired content based on the location of tags and corresponding attribute information. The first step is the core of the whole process. An example of extraction of specific content of a search result page verifies the proposed algorithm. The proposed algorithm can be further used for advanced tasks such as data mining and knowledge base establishment.
3826
Abstract: In recent years, the 3D display technology is not only a kind of show of technology, but also is integrated use implementation of relevant various technologies. 3D display technology itself has a lot of kinds of implementation way, which including 3D volumetric scanning, holographic imaging and integrated imaging; these 3D display technologies have their own characteristics. Combining with 3D display the related key technologies and development trend, this article analyzed the integration development prospects and the content of specific development of 3D display and the related technology.
3831
Abstract: A new algorithm DSMFP-Miner was proposed. When the data stream reach continuously, a maximal frequent pattern tree called MFP-Tree is adopted to maintain the transactions in data screams dynamically. Transactions in the same Transaction-sensitive sliding window are set to own the same “importance”. Besides, the support of the transactions in old window is decayed to reduce their influence to mining results, and infrequent patterns and overdue patterns are deleted periodically. In the mining process, the algorithm put an enumeration tree with each node of MFP-Tree as root as the search space, and use the "depth-first" search strategy to mining the maximal frequent patterns with this node as a suffix.
3835
Abstract: This paper aims to discuss about the method of HP3 interface program with hardware by Virtual instrument-labview. This paper studies the characteristic and advantages of labview, analyzes the HP3(Handyprobe difference USB oscilloscope) hardware interface way and discuss the connection on hardware labview. The actual interface connection method is given in the end.
3839
Abstract: Now that the endless spam messages have sevely affected people on their works and daliy lives. The omission and even the help of the serrvice providrs (SP) in this regard make it extremely necessary to distinguish and sort the spam messages through filtering the messages on user’s mobile phone. The paper expatiated on a “self-study spam messages distinguishing and soring system’ developed onARM9 platform. By adding a spam box to SMS software of cellphome besidrs all os its normal functions, the system incessantly adjusts the weight of the featues though incremental learning method so as to achieve the highly accurate discrimination on whether a message received is the spam one or not, and futher decides to sort the message to the message box or the spam box, Test result on ARM9 platform shows, our technology can be applied completely to the mobile phones with just general performance.
3843
Abstract: Java applications have proliferated rapidly in recent years, and the security issue in the source code seems to bring a great threat which cannot be ignored. SQL injection and cross-site scripting vulnerabilities, path traversal, and so on are common Java security vulnerabilities. These vulnerabilities are usually caused by improper handling of user input and we call them input validation vulnerabilities [1].In this paper, we propose a Java source code analysis method based on the taint tracking. By means of vulnerability pattern match, we keep track of the introduction of tainted data and its propagation in different contexts, leading to comprehensive and accurate test results. Actually, we have applied this method to some of the open-source Java projects. Compared to other similar software, our technique presents good feasibility and superiority.
3846
Abstract: According to the experimental analysis, this work found out the defect of the formula for similarity measure between current Vague values, and redefined the similarity measure between Vague values. Therefore, a new formula subject to the new definition was put forward according to data mining and uncertainty of Vague value.
3850
Abstract: Based on the derived bi-dimensional Bedrosian’s principles and the original multicomponents, we provide the combined bi-dimensional Bedrosian’s principle so that the monocomponents in multicomponents can be separated in the case that the existent methods fail. The proposed method can solve the problems caused by the cross-angle and amplitude ratio and frequency ratio and so on between these components that BEMD fails to solve. Experiments support the proposed methods.
3854
Abstract: OpenGL can correctly simulate real photogrammetric imaging by setting reasonable parameters. It’s an important tool to achieve the simulation of real three-dimensional object or scene imaging to two-dimensional CCD (Charge-coupled Device) plane. However, the images are lack of reliability verify. To solve this problem, we propose a method that can verify OpenGL simulated images on the basis of analyzing OpenGL image-forming principle. Firstly, the checkerboard images of different positions are taken by real camera and intrinsic and external parameters are calibrated. Subsequently, we use OpenGL to produce the same intrinsic and external parameters of checkerboard image by setting correct parameters. Finally, the simulated and real images’ matching point pair RMSE value is calculated based on Harris operator. By comparison, the validity and reliability of OpenGL simulated images are verified by some numerical simulation.
3859
Abstract: TT&C Resource distribution of SGS mission is a complex combinatorial optimization question. We set up data structure and a SGS model, the model can describe relation between space mission and TT&C resource, it can be solved with genetic algorithms and single mission decomposition method.
3863