Applied Mechanics and Materials
Vol. 658
Vol. 658
Applied Mechanics and Materials
Vol. 657
Vol. 657
Applied Mechanics and Materials
Vol. 656
Vol. 656
Applied Mechanics and Materials
Vol. 655
Vol. 655
Applied Mechanics and Materials
Vol. 654
Vol. 654
Applied Mechanics and Materials
Vols. 651-653
Vols. 651-653
Applied Mechanics and Materials
Vols. 644-650
Vols. 644-650
Applied Mechanics and Materials
Vol. 643
Vol. 643
Applied Mechanics and Materials
Vols. 641-642
Vols. 641-642
Applied Mechanics and Materials
Vols. 638-640
Vols. 638-640
Applied Mechanics and Materials
Vols. 635-637
Vols. 635-637
Applied Mechanics and Materials
Vols. 633-634
Vols. 633-634
Applied Mechanics and Materials
Vols. 631-632
Vols. 631-632
Applied Mechanics and Materials Vols. 644-650
Paper Title Page
Abstract: Taking repetitive property into consideration can help the analyst to capture more useful information. However, most of the existing algorithms of repetitive sequence mining are used for DNA or genome, and there are very few researches to mine such patterns from sequence database. So in this paper, we (1) propose a method to clearly determine the times that a sequence appears in a data sequence; (2) propose a method to ensure the support range of repetitive sequence still within [0,100%] so as to let users set up minimum support threshold in a traditional way; and (3) propose an algorithm, RptGSP, to efficiently mine such repetitive patterns in sequence database by improving the classic algorithm GSP. Experimental results show that RptGSP is very efficient.
2097
Abstract: In order to improve the security performance of the information stored in Quick Response (QR) code, this paper introduces an improved RC4 algorithm which can be used in the encryption of QR code. We add the self-error detection stage into fault induction attack resistence and combine Chaos with enhanced pseudo-randomness in the stage of PRGA. The experimental results show that the new method proposed in this paper has several advantages in security and reliability.
2101
Abstract: XOR algorithm can be used to improve the recovery effects of visual cryptography scheme. In this paper, we present a multi-secret visual cryptography scheme by using the matrices of the (k, k)-VCS. We can reveal multiple secret images perfectly by the XOR algorithm and shifting operation on the shares. The visual qualities of recovered images are ideal without any pixel expansion.
2108
Abstract: With the development of science and technology and the popularity of intelligence, government departments, schools, enterprises and institutions are all conducting the intelligent upgrade for archives to replace the complex manual labor. However, there are still many problems to be solved during the process of the construction. This paper mainly introduces how to retrieve files from the data pool more quickly by applying the self-adaptive ACA retrieval algorithm[1,2]. At the same time, it will briefly introduce the principle of the SHA_1 encrypted data as well as the process of how this system realizes the wireless searching and positioning.
2112
Abstract: Wireless sensor network coverage control is studied under conditions to ensure quality of service, in order to maximize network coverage, covering the use and application of the algorithm optimization strategy, contribute to the effective control of the network node energy and improve the perceived quality of service network lifetime extension of time. This paper presents an improved genetic algorithm to optimize the network effective coverage of the target, achieved through the coverage control algorithm crossover and mutation operation and a detailed analysis of the impact of sensing radius of coverage performance. Simulation results show that the algorithm is effective coverage reaches more than 85%, can effectively achieve wireless sensor network coverage optimization.
2116
Abstract: At present there are many data mining methods. This paper studies the application of rough set method in data mining, mainly on the application of attribute reduction algorithm based on rough set in the data mining rules extraction stage. Rough set in data mining is often used for reduction of knowledge, and thus for the rule extraction. Attribute reduction is one of the core research contents of rough set theory. In this paper, the traditional attribute reduction algorithm based on rough sets is studied and improved, and for large data sets of data mining, a new attribute reduction algorithm is proposed.
2120
Abstract: With the rapid development of Internet, the Internet has become the important resources of information transmission and share. The characteristics of Web data are semi-structured, heterogeneous and mass, making traditional data mining technology indirectly applied to Web data sources. Web data mining refers to extracting a potential, useful model from the Web documents or Web activities. Because of the structural and expansibility of XML, research on XML combined with Web data mining has also became popular.
2124
Abstract: The new formulas for similarity measures between Vague sets will be used as pattern recognition method based on similarity measures in water quality evaluation. The application example shows that this method is not only convenient in calculation, but also practical in results.
2128
Abstract: Because urban tail transit becomes the preferred way to travel for more travelers, the passenger flow of rail transit is increasing fast. Due to the increased passenger, the congestion on platform reduces the comfort and puts passengers in danger. This article analyses the model of island platform short-time arrivals based on the probability theory and historical statistics. The calculation method is studied and the Feasibility and algorithm is testified by setting numerical examples.
2133
Abstract: A new kind of human-imitate shooting platform is needed, so that the automation and standardization of small arm experiment could be realized. And the main part of shooting platform design is the modeling of human-gun interaction system. The main object of this paper is modeling human-gun interaction system by testing the model of the system. Firstly, the testing scheme is promoted for testing interaction between gun and human shoulder, and high quality test data is collected. Then, the model parameter of human-gun system is calculated by the method of model parameter identification. 3D model of human-gun system is built. At last, the dynamic simulation is made by ADAMS. And human-gun model built by experiment method is verified.
2137