Applied Mechanics and Materials Vols. 644-650

Paper Title Page

Abstract: Internet technology with the computer technology as the carrier is the extension and expansion of human brain function, and the results of the development of society informatization. The application of Internet technology is the need of the development of times in teaching management. Firstly, we analyze the advantages of the integration of modern information technology with English teaching. According to the characteristics of the fusion of the two, we construct the English multimedia network teaching platform based on the information and Internet technology. Then we analyze the key technology of the audio interaction based on this platform, and data envelopment analysis model has been used to make analysis of English audio. In order to verify the scientificity of English audio test based on this platform, we construct the simulation model by using LABVIEW, and the simulation results show that this platform can accurately reflect the comparing effects of the entire audio , which has strong practicability.
1849
Abstract: This paper considers an ideal reservoir landslide with a single slide surface and explores the mechanism of the landslides subject to water level fluctuation by using three-dimensional discrete element software 3DEC. The results show that: the deformation and failure process of reservoir landslide can be generally divided into two phases, i.e., shear-cut failure of leading edge and tension-shear failure of the trailing edge. This study serves as a good starting point for investigating the deformation and failure mechanisms and the safety of practical landslides induced by different water levels.
1854
Abstract: With the rapid development of 3D scanners, graphic accelerated hardware and modeling tools, the use of 3D model databases throughout the Internet is growing, and this trend should continue. Thus, there is an urgent demand for effective 3D model retrieval methods and systems. In this paper, a novel rotation invariant and effective 3D object retrieval approach called electronic descriptor is presented, which is a combined shape distribution by considering the randomly selected points on 3D surface as electrons. Experimental results show that the proposed method is superior to other shape distribution based methods.
1858
Abstract: With the application of the network technology in publishing, the publishing logistics has entered a new phase of globalization, networking, digital. Because there is no uniform standard information in the format code, copyright protection, etc ,it leads to the difficulties in information exchange, information sharing, etc. in the field of digital publishing logistics. In this paper, based on the current results of the digitized standard, it proposes the basis factors of the digital publishing logistics standards . The data - the degree of important of the factors influencing the development of standardization-can be got by using fuzzy hierarchy comprehensive evaluation to evaluate the factors. Under the guidance of the data, the most important standard can be determined to build in the process of the digital publishing logistics which are the basis data theories.
1862
Abstract: First of all, the characteristics of obstacles in military vehicle equipment running simulation were described, and three generating methods, that is, extracting from digital vector map, manual drawing and dynamic generating during simulation, were expatiated. According to the demands, the data structure of obstacles was designed. Afterwards, the spatial overlay analysis of the moving route and the obstacles set, appending and deleting obstacles, and breaking a new path in obstacles were researched respectively.
1867
Abstract: Next generation Internet network mobility management is an urgent and challenging research area. With the development of wireless technology, mobile network research gets more and more attention. NEMO protocol is presented based on mobile IPv6, it not only ensures the continuity of communication when subnet move, but also makes the mobility transparently for the subnet. NEMO technology application can more adapt to the development requirements of the next generation mobile communication network. This paper first introduced the NEMO technology and the existing NEMO routing optimization scheme. Then analyzed and compared the performance of each schemes in the data path and package message overhead.
1871
Abstract: XML has become the standard form of data exchange, more and more data in this form for storage, implying a lot of knowledge in these data information, the need for data mining processing. For XML data mining method at present, most of the need is to pass the XML data into relational data pretreatment process, using the traditional method for processing, data mining process is complex and the effect is not ideal. Therefore, there is an urgent need some effective methods for XML data mining directly.
1875
Abstract: With the development of the society, the study of folk craft and protection still appears imminent. We not only should attach importance to and protection of folk art, and to look for more advanced and effective means of protection. On the protection and development of national folk craft, directly involved in the sustainable development of national culture. Using the digital technology can realize the collection and protection of the folk craft. In this paper, under the background of digital folk craft as the research object, the digital protection of folk craft key technology and related application problem discussed in this paper, aimed at to protect, inherit and carry forward the near extinction of folk cultural heritage to provide the reference.
1879
Abstract: In order to study the organizational characteristics of ship traffic flow when congestion and evacuation happens, we have described the generation process of Build-wave and Evanescent-wave, established a computational model of extent and duration of the congestion based on traffic wave theory and conducted a case study. Quantitative research on the efficiency of navigable inland ships in safe condition has also been done in this paper.
1883
Abstract: Cloud computing has a nature of dynamic, virtualization and opening since it made. All kinds of large-scale cloud security incidents makes frequent cloud environment safety has been questioned. In order to ensure the security of cloud environments, intrusion prevention technologies trusted computing ideas proposed by combining intrusion prevention framework model based on trusted computing environment under a cloud. The model departure from the principle of intrusion prevention, access to behavioral characteristics, and then gradually normalize these features determine the weight of each feature heavy user node's credibility after the draw. Then it use a variety of cloud cluster server engine to detect defense and integrated decision analysis and cluster analysis to make timely cloud fast, and change the traditional intrusion prevention for their own business, to detect the status of the defense lag for cloud users with the maximum safe limit intrusion prevention services, but also to ensure that the cloud can withstand attacks, so the cloud and cloud users bidirectional safety effects.
1887

Showing 411 to 420 of 1441 Paper Titles