Applied Mechanics and Materials Vols. 644-650

Paper Title Page

Abstract: There are different methods and techniques for representing ontology domain, and each domain is bound with one suitable language that can support the ideology and methods based on the way we choose to represent them, which also depends upon the nature of the data we intends to use. So as we move on, the big question is that “how can we represent data based on events’ entities or multimedia data using object ontology, for what extends does the two common ontology languages OWL and RDF/RDF's support multimedia data ” and how do we infer the media ontology. Those questions are reasonable and acceptable. In this paper, we introduce the basic principles to construct and express media data using ontology techniques, we also examine the capability of OWL in standardizing the rules and restriction based on the media ontology data and finally, we introduces a reasoning module as a solution for the OWL model to support multimedia data during the query and inferencing of media ontology
1759
Abstract: The dispersion process of hydrogen leaking from the exhaust pipe of rocket tank is analyzed with numerical simulations in order to assess hazards and associated risks of a leakage accident in the present study. The temporal and spatial evolution of the hydrogen concentration at the different tank pressures is predicted numerically. The results show that when the tank pressure is 0.35MPa, the farthest dispersion distance of flammable region in the horizontal direction is 156m within 15s of leakage, simultaneously, the vertical distance upward is 80m and the vertical distance downward is 51m. Additionally, due to the assumption that the tank pressure is constant, the leakage rate is constant and extremely high, buoyancy can’t impel completely hydrogen clouds to diffusion upward. The present numerical results can be useful to analyze safety issues in the aerospace field.
1764
Abstract: Water resources specific cloud computing platform (WRSCCP) is a solution to unify and formalize the developing process of water resources software, which will be helpful for improving developing efficiency and bring significant change to the uncontrolled developing pattern. However, compared with traditional platform, the cloud computing platform has its own security risk, for which the traditional security solutions are not adaptable. In this paper we analyze the security risk of WRSCCP and propose a security system to adapt to the characteristics of the water resources industry.
1769
Abstract: The seabed terrain navigation is an important part of underwater navigation system. With the aid of the seafloor topography, the underwater navigation system can greatly reduce the positioning error, and improve the navigation accuracy. However, the traditional TERCOM algorithm is not perfect, especially when the terrain entropy is relatively high. This paper will adopt the way of dynamic elevation sequence to avoid inaccurate positioning reasonably, at the same time it can improve the positioning performance of the algorithm.
1774
Abstract: In order to solve the problem that how to prevent forgery and vicarious inventory in logistics products, we put forward to providing digital identity for each logistics products, using 3D computer vision technology in the process of logistics, and checking the logistics product anti-counterfeiting identity. According to the requirement of anti fake mark logistics products by security logistics information management system, we put forward the local matching algorithm based on adaptive weight, distinguish the logo image edge, eliminate the brightness difference caused by the result of the image matching and improve the disparity map 3D computer vision, so as to help the system accurate recognition of anti fake label image logistics products. Simulation results show that, the algorithm of logistics product security and vicarious inventory knowledge management system based on digital identity, can effectively identify the logistics of packaging products, without any misreading of the situation in a variety of external conditions can proves the validity and accuracy of the algorithm.
1778
Abstract: In this paper, a novel PolSAR land cover classification method is proposed based on spectral clustering (SC) and immune clonal selection principle. SC is employed to reduce dimension in the polarimetric feature space. However, it is susceptible to local optimum and sensitive to the initial partition. To address this issue, immune clonal clustering (ICC) is used due to its capability of global searching. The proposed method combines the complementary advantage of spectral clustering and immune clonal clustering. Experimental results demonstrate that the proposed method is more stable and efficient compared with the other methods.
1783
Abstract: With the rapid development of network, the security problem of network becomes an issue which has been paid more and more attentions to. Among so many methods of intrusion prevention, data mining is a very effective one. The FP-growth algorithm is the most widely used algorithm for mining frequent item-sets, which is also an algorithm for mining association rules without candidate set. However, the FP-growth algorithm needs large memory when mining large database,and its running speed is slow. In order to overcome these problems, based on the FP-growth algorithm, this paper proposed an optimized algorithm. This paper compared the new algorithm with the previous one based on intrusion prevention model for campus network by experiments. Based on Experiments, we can draw the conclusion that, mining association rules by using the improved FP-growth algorithm can effectively detect the users’ behavior pattern, historical pattern and the current model to calculate the similarity of users, and provides the possibility to accurately judge the user behavior.
1787
Abstract: While providing signal transmission services for stv channels (satellite television channels), catv operators in the area of broadcast and television in China raised a controversial issue about the standard of charging channel operators landing fee. To address the problem, this passage suggests a proposal about charging landing fee according to the seat value, which assessing each channel’s seat value based on the data of the audiences and the pagerank algorithm as the index. The result shows that our proposal improved the audience rating of channel while bringing a greater economic benefit to catv operators compared with the traditional standard of charging fixed landing fee.
1791
Abstract: Wrinkles make cloth simulation results more realistic. However, generating wrinkles with physically based methods usually requires a computationally expensive simulation, while geometric methods such as deforming the 3D mesh based on predefined curves need time-consuming manual design. In this paper, we extract 2D wrinkle curves from pictures of clothing and project the curves onto a 3D clothing model. Two schemes for projecting 2D curves to the 3D model are presented in the paper, including the brute force method and the acceleration method. The brute force method has excellent projection results and the acceleration method enhances the efficiency of projection process significantly. A quad tree for the 3D model is built up in the acceleration method to improve the efficiency of projection process.
1796
Abstract: . Resource scheduling is the core technology to provide efficient and reliable services in cloud computing, and it is the basis of cloud computing to implement quick deploy and rapid response and save money. This article firstly introduces the research status of the resource scheduling in cloud computing including resource scheduling policies, replica technology and metadata management. Next we analyze the issues of Hadoop platform in resource scheduling including high latency, small files I/O, single point of failure and hot data. On the basis of these, the effective resource scheduling and management mechanisms are given including dynamic replica management, metadata management and horizontal scalability.
1801

Showing 391 to 400 of 1441 Paper Titles