Applied Mechanics and Materials
Vol. 656
Vol. 656
Applied Mechanics and Materials
Vol. 655
Vol. 655
Applied Mechanics and Materials
Vol. 654
Vol. 654
Applied Mechanics and Materials
Vols. 651-653
Vols. 651-653
Applied Mechanics and Materials
Vols. 644-650
Vols. 644-650
Applied Mechanics and Materials
Vol. 643
Vol. 643
Applied Mechanics and Materials
Vols. 641-642
Vols. 641-642
Applied Mechanics and Materials
Vols. 638-640
Vols. 638-640
Applied Mechanics and Materials
Vols. 635-637
Vols. 635-637
Applied Mechanics and Materials
Vols. 633-634
Vols. 633-634
Applied Mechanics and Materials
Vols. 631-632
Vols. 631-632
Applied Mechanics and Materials
Vol. 630
Vol. 630
Applied Mechanics and Materials
Vol. 629
Vol. 629
Applied Mechanics and Materials Vols. 641-642
Paper Title Page
Abstract: While the single AUV is sometimes unable to meet the complex and difficult tasks demand, the advantages of the multiple autonomous underwater vehicles (MAUV) system was proposed. Several MAUV formation methods were studied and master-slave collaborative formation method was focused. The law and algorithm of master-slave formation control was designed and analyzed. Representative formations for different tasks were proposed and the advantages and disadvantages were discussed.
1264
Abstract: The paper take the distribution radius and carry capacity as constraint conditions, the author uses two-stage K-means algorithm to cluster community service shops, and determines the distribution region of distribution centers, and constructs a suitable model for distribution center’s locating. Basing on the clustering result, the incompatible two kinds items, i.e. fresh items and the items shopped online, are united in a model to be solved. Since bottom-up approach is used to build distribution network step by step, a multi-objective programming is converted into two relatively independent single goal programming, so the network’s optimization result is of good controllability, and the algorithm’s complexity is greatly reduced. Finally, take 100 communities fresh items as examples to implement algorithm.
1271
Abstract: In order to reach and test the surface defects on industrial parts, based on Machine Vision this paper put forward a defective parts detection method. The method of median filter was adopted to eliminate the noise of image. The Ostu-method was used for the segmenting threshold. Pixel level and level edge detection were used to complete the precise components defects detection. Experiments show that this scheme is feasible, and can achieve high accuracy and shorter testing time.
1275
Abstract: According to the requirements and characteristics of mobile Internet content security audit, designed and implemented the mobile Internet content security audit system. The system captured and processed data through a data acquisition proxy server for mobile user network access, and then set keywords by matching rules, finally carried out the content audit through the single mode and multi pattern matching algorithm.
1280
Abstract: The distributed recommendation engine consists of three layers of data storage layer, Produce recommended layer and application layer, the data storage layer is mainly stored user preferences data, these data are recommended on the basis of upper recommendation engines. Produce recommend layer producing part recommend the key lies in the recommendation engine of the algorithm, the algorithm adopts the Mahout as recommendation framework, and implement custom recommendation algorithm, including the recommendation algorithm based on user similarity, based on the recommendations from the project similarity algorithm and based on the recommendations of the Slope One algorithm after receiving recommended the client's request, the Servlet will produce a recommended by pushing engine first get data model, according to the similarity between data model computing project, and generate the recommended ID. The application layer is mainly based on B/S architecture to implement, can be very easily expanded to mobile platforms.
1284
Abstract: Deep neural network as a part of deep learning algorithm is a state-of-the-art approach to find higher level representations of input data which has been introduced to many practical and challenging learning problems successfully. The primary goal of deep learning is to use large data to help solving a given task on machine learning. We propose an methodology for image de-noising project defined by this model and conduct training a large image database to get the experimental output. The result shows the robustness and efficient our our algorithm.
1287
Abstract: In order to promote mutual benefit of service provider and requestor under the cloud computing environment, a new method to obtain maximum utility during cloud service leasing progress was proposed. Cloud service providers decide to tender or not according to their actual conditions and tender bid, and at the same time, it’s evaluation and other service providers’ recommends are considered during the bid evaluation by the service management center, the maximum utility will be computed among the servers provider and server requestor to determine which services bid. It showed great effectiveness of this method through a large number of simulation experiments.
1291
Abstract: Ad hoc is a new kind of wireless, jump, and no center distributed control network, it does not need network infrastructure, strong self-organizing, robustness and so on. Routing protocol is an important part of Ad hoc, good routing protocol is the first problem of establishing Ad hoc three kinds of routing protocol (DSDV, DSR, ZRP) is introduced in the paper, in the experiments, we use OPNET network software to simulate the above three routing protocol, Finally analysis the grouping deliver rate, routing overheads, business, the time delay, etc., concluded results.
1295
Abstract: Based on the analysis of cloud computing safety, this paper focused on the data security problems in the cloud computing, and put forward a key management framework for cloud computing. The framework for the various cloud computing applications, Can achieve a unified, standard key management, while the framework has simple and scalable features. This paper finally introduced the basic working principle and application of the framework.
1299
Abstract: Based on the accuracy and integrity quality evaluation indexes of ADS-B navigation data, this paper foucses on the analytical modeling of ADS-B navigation data source under the global positioning system (GPS) and Compass system. The factors related to accuracy and integrity of ADS-B are derived and simulated, which include the position estimated uncertainty (EPU) and horizontal position integrity containing radius (RC). It is the first to give the quality index levels of the ADS-B horizontal data source in Tianjin under GPS and Compass. The simulation results show that ADS-B navigation data availability under Compass not only meet the lowest requirements recommended by the civil aviation administration of China (CAAC), but also is better than under Compass. The results derived from this paper provide the theoretic support for the implementation of ADS-B in Tianjin Binhai international airport and other areas of China. At the same time, Compass being navigation source increases reliability and security for ADS-B implementation of our country.
1303