Applied Mechanics and Materials
Vol. 658
Vol. 658
Applied Mechanics and Materials
Vol. 657
Vol. 657
Applied Mechanics and Materials
Vol. 656
Vol. 656
Applied Mechanics and Materials
Vol. 655
Vol. 655
Applied Mechanics and Materials
Vol. 654
Vol. 654
Applied Mechanics and Materials
Vols. 651-653
Vols. 651-653
Applied Mechanics and Materials
Vols. 644-650
Vols. 644-650
Applied Mechanics and Materials
Vol. 643
Vol. 643
Applied Mechanics and Materials
Vols. 641-642
Vols. 641-642
Applied Mechanics and Materials
Vols. 638-640
Vols. 638-640
Applied Mechanics and Materials
Vols. 635-637
Vols. 635-637
Applied Mechanics and Materials
Vols. 633-634
Vols. 633-634
Applied Mechanics and Materials
Vols. 631-632
Vols. 631-632
Applied Mechanics and Materials Vols. 644-650
Paper Title Page
Abstract: B-spline curve parameters were estimated by the least squares. The influences of the scanning angle to point cloud density was discussed. In the case of scanning distance and horizontal being sure, the smaller the vertical scanning angle, the larger point cloud density, it can reflect the characteristics of the surface cross-section more accurately. The factors affecting the accuracy of the surface reconstruction were discussed. The surface fitting order has a greater degree of influence on the accuracy of surface reconstruction. When the surface order was 4 and the number of control points was 75, the surface-point cloud deviation was 0.188mm by the segmented fitting.
1674
Abstract: Classification in large scale documents is a research hot spot. Language style can be used to classify the large scale documents. And language cadence can be used to scribe language style. Then the method based on language cadence to quantity language style is proposed here. Three different tests in the same corpus, the language important feature, cadence can classify different style documents effetely.
1678
Abstract: In order to control and monitor downhole equipment, it is needed to inject cable into coiled tubing. Being directly against the drawback of the traditional injecting method, a new method of adding pressurized water has been put forward. By using Workbench software, this paper researched the regular pattern that water flow’s pressureaffects cable in coiled tubing after it has various deformations in both entrance and main part of coiled tubing, taking 25mm diameter coiled tubing with 3mm diameter cable as an example. It also simulated the effects of water flow toward cable in coiled tubing as well as how the different diverging distances of entrance for injection affects the speed of cable during injection, taking 50.8mm diameter coiled tubing with 5.6 mm diameter cable as an example. It determined the optimal position of cable entrance and provided the theoretic foundation for the possibility and practical manipulation of the new method for injecting cable into coiled tubing.
1682
Abstract: A five-point non-stationary interpolating scheme is proposed in this paper. The limit curve of the scheme is C1. The scheme can reproduce all original function curves spanned by exactly. Comparison experiments are also given to better demonstrate it.
1689
Abstract: Cloud computing is one of the newest popular technologies in the era of big data, and the problem of database security under the circumstance cloudy computing is one of the key problems of restricting the development and application of cloudy computing. This paper introduces the concept and features of cloudy computing firstly, and then the defect of cloudy database is analyzed, in the end we put forward to several security policies to solve those current problems.
1694
Abstract: AIS can be understood as a large wireless LANs, network transmission and ship-related data. First of all, to resolve AIS reporting format, using the C++ language programming. Enables extraction based on AIS vessel traffic data, establishment of water transport databases and applications in the field of marine research. In view of the vagueness of boundaries in the field of ships, the introduction of fuzzy set theory, put forward the concept of avoidance. Extends the range of application of AIS, enriches the marine research in the field of content.
1698
Abstract: Beacause internet data has a massive, diverse, heterogeneous, dynamic features, using traditional databases to analyze these data, data storage and processing efficiencies already can not meet the requirements. Utilizing leading-edge distributed computing technology to solve traditional data mining scenarios in lack of data mining of massive data improved data mining algorithm of lot OK Hadoop distributed computing platform, which later on other data mining algorithms using Hadoop to reference while using rich data mining algorithms can be found there is more value in your data.
1702
Abstract: Copy technique is one of the key technologies to ensure data safe and reliable on cloud storage. It is believed that research of copy technique plays an important role in the development and promotion of cloud storage. In this paper, the open source HDFS is used as a platform to analyze the features of copy management and the current problems on cloud storage. Considering the user variability on cloud storage, a dynamic copy redundancy strategy is given, which is based on file popularity. In this strategy, we calculate the current file popularity, which depends on different weights given by different access frequency
1706
Abstract: The Digital Video Server (DVS) isspecial equipment used to compress, store and process video and audio data, while MPEG2 is one of the most popular formats.Based on the characteristics of DVS and MPEG2File,the author has proposed aselective encryption algorithm based on Location File, given the encryption renderings by experimentation and analyzed its compression ratio, storage space, quantity of encrypted data, time of encryption and security and other functions in the paper.
1710
Abstract: Retracted paper: Recent advances in semantic algorithms and pervasive communication are based entirely on the assumption that DHTs and hierarchical databases are not in conflict with write-back caches. Here, we argue the emulation of the partition table that would allow for further study into information retrieval systems. Our focus in this paper is not on whether the famous embedded algorithm for the study of e-business by Harris et al. is NP-complete, but rather on motivating an application for Byzantine fault tolerance (Mesophryon).
1714