Advanced Materials Research Vols. 1030-1032

Paper Title Page

Abstract: In large-scale storage system, variety of calculations, transfer, and storage devices both in performance and in characteristics such as reliability, there are physical differences. While operational load data access for storage devices is also not uniform, there is a big difference in space and time. If all the data is stored in the high-performance equipment is unrealistic and unwise. Hierarchical storage concept effectively solves this problem. It is able to monitor the data access loads, and depending on the load and application requirements based on storage resources optimally configure properties [1]. Traditional classification policy is generally against file data, based on frequency of access to files, file IO heat index for classification. This paper embarks from the website user value concept, aiming at the disadvantages of traditional data classification strategy, puts forward the centralized data classification strategy based on user value.
1619
Abstract: In order to implement progressive mesh representation of 3D model, improve the computing method of collapse cost in mesh simplification. Firstly, obtains model data from smf data file, and rapidly establishes the 3D model in the memory, and redesigns weight computing method of Garland QEM algorithm. Using the square of the largest deviation of triangular plane normal adjacent to the vertex as the importance degree of vertex, and brings it into error metric formula, progressive mesh is generated by simplifying. The following experiment shows that the algorithm is succinct, and the generating speed of mesh and the contour information of model are well preserved.
1623
Abstract: The problem of local minimum cannot be avoided when it comes to nonlinear optimization in the learning algorithm of neural network parameters, and the larger the optimization space is, the more obvious the problem becomes. This paper proposes a new type of hybrid learning algorithm for three-layered feed-forward neural networks. This algorithm is based on three-layered feed-forward neural networks with output layer function, namely linear function, combining a quasi Newton algorithm with adaptive decoupled step and momentum (QNADSM) and iterative least square method to export. Simulation proves that this hybrid algorithm has strong self-adaptive capability, small calculation amount and fast convergence speed. It is an effective engineer practical algorithm.
1627
Abstract: This paper mainly focused on 0/1 knapsack problems based on the genetic algorithm (GA). According to characteristics of the individual independence in GA, a parallel segmentation method was presented using the OpenCL technology in resolving the 0/1 knapsack problems. Moreover, the local memory was partially optimized in the statistical operation of GA. Experiment results in comparing serial and parallel algorithm implementations showed that the parallel algorithm implementation was operative and the execution time of the parallel algorithm implementation increased linearly according to the increment of problem scale. By comparing the execution time of implementations on CPU and GPU under various individuals and iterations conditions, the effects on CPU and GPU of this method were also analyzed.
1633
Abstract: A 4kbps vocoder based on MELP is presented in this paper. It uses the parameter encoding and mixed excitation technology to ensure the quality of speech. Through adopting the scalar quantization of Line Spectrum Frequency (LSF), the algorithm reduces the storage and computational complexity. Meanwhile, 4kbps vocoder adds a new frame type-transition frame. The classifier can reduce the U/V decision errors and avoid excessive switching between voiced frame and unvoiced frame. A modified bit allocation table is introduced and the PESQ-MOS and coding time test shows that the synthetic speech quality has been improved and reached the quality of communication.
1638
Abstract: Aiming at selfish nodes in wireless sensor network (WSN) competition Shared channel unfair use of channel resources, for the purpose of selfish node Detection, puts forward an Improved Clustering Method (Improved Density-based Clustering Detection Method, ID-BCDM).With an average transmission delay, average throughput of node link sequence and collision probability of network performance characteristics, add the density function, improved K-means algorithm was carried out on the characteristics of sequence analysis and clustering. The simulation test results show that the ID-BCDM on three dimensional feature space has good clustering effect, also able to complete detection of single and multiple selfish node.
1642
Abstract: This paper presents an intrusion detection model based on shuffled frog leaping algorithm, the model search speed, high accuracy based on shuffled frog leaping algorithm, using the shuffled frog leaping algorithm generates a set of classification rules from the KDD99 data network audit data collection, quality and the use of objective function shuffled frog leaping algorithm to control the production rule, and then application of the rule of dynamically generated to rule based intrusion detection system, achieve the purpose of detection. The experimental results show that, this method of detection rules generation based on shuffled frog leaping algorithm, can significantly improve quality of generation rules, reduce the rules of intrusion detection system based on the false negative rate.
1646
Abstract: Under half a century isolation, mainland China and Taiwan have had some differences in their lives, customs, lifestyle and language because of the different political systems and historical factors, above which the difference of cross-strait computer terminology standardization differences between them is especially obvious. With the increase of all kinds of cross-strait exchanges, most of people become focus on promoting the standardization of computer terminology translation. This article puts forward specific measures to standardize computer terminology from the status quo of cross-strait computer terminology translation and the effects of the translation differences.
1650
Abstract: As is well known, the ocean plays a key role in global ecological environment. In this paper, we introduced the basic principle of monitoring oil spill by using SAR images. On the basis of that, we systematically analyzed the applicability of various methods for monitoring oil spill by using SAR images. The conclusion shows that the ANN method and the OTSU method have the advantages of timeliness and efficiency in oil spill monitoring, while the Markov Chain method cost more time due to its capability in reducing the effect of internal ocean wave.
1653
Abstract: With the global population of informatization and digitization, network technology is playing a very important role in people's lives. The role of wireless LAN applications is especially significant. People's daily lives and work are no longer confined to paper or wired connection, but gradually extend to the use of radio. Although it brought a lot of convenience to people's lives, wireless LAN security problems also frequently occurred. This paper mainly aims to analyze the security risk and at the same time offer some preventive measures.
1657

Showing 351 to 360 of 588 Paper Titles