Advanced Materials Research Vol. 1046

Paper Title Page

Abstract: With the development of database technology as well as the widespread application of Database management system, our capabilities of both generating and collecting data have been increasing rapidly. In addition, popular use of the World Wide Web as a global information system has flooded us with a tremendous amount of data and information. This explosive growth in stored or transient data has generated an urgent need for new techniques and automated tools that can intelligently assist us in transforming the vast amounts of data into useful information and knowledge. The Data Mining technology brought forward. Data mining, also popularly referred to knowledge discovery from data (KDD), is the automated or convenient extraction of patterns representing knowledge implicitly stored or captured in large databases, data warehouses, the Web, other massive information repositories, or data streams. Data mining is a multidisciplinary field, drawing work from areas including database technology, machine learning, statistics, pattern recognition, information retrieval, neural networks, knowledge-based systems, artificial intelligence, high-performance computing, and data visualization. Database and Information Technology in the Decision Tree of is very important for the military. The Data Mining had been applied and studied in these years, and it has been applied in many domains successfully, such as business, finance and medical treatment. However, little is applied in communication construction scheme.
461
Abstract: With the development of virtual reality system, it provides powerful methods support to the research of forensic science. In this paper we first research the mainstream virtual engine and choose the UDK (Unreal Development Kit) for simulation, which is fully functional and easy to be used. Then, the prototype system of three-dimensional reconstruction for crime scene was established. The flow of virtual reality simulation, scene management, texture and the motion simulation of virtual human were discussed. Finally, we find a solution for the problem of scene investigation and reconstruction, which can promote the development of criminal technology, observe the crime scene from Multi-angle and improve the efficiency and the accuracy of judgment.
465
Abstract: To solve the problem of massive PLM product data analysis, a PLM product data analysis system based on OpenStack cloud platform was proposed.It includes a data analysis method of structured products based on data warehouse and a data analysis method of non-structured products based on Hadoop. By means of the former method, firstly product data was filtered, tranformed and loaded into the warehouse, then the required data cube was extracted, lastly the structured product data was analyzed with the analysis tools of data warehouse. By means of the latter method, the product data firstly was loaded into the distributed file system,and the non-structured massive PLM product data was analyzed by the data mining algorithm,which was programmed by JAVA language based on MapReduce. By applying the methods mentioned above to massive PLM product data analysis, it shows that these methods hava a higher efficiency.
469
Abstract: It is presented the knowledge engineering based design process for tricone bits and the principles of intelligent design systems. Based on Teamcenter, using NX system development software, taking full advantage of the existing design standard, design data, and materials such as design experiences, design criteria, tricone bit models accumulated by industry companies, a knowledge driven intelligent design system for tricone bits has been developed. It is a way of effectively reusing industrial product development knowledge, enhancing effectiveness and quality of product design, and achieving product full life cycle management.
477
Abstract: With the development of information technology web-based teaching and learning have become an indispensable part in distance education. However due to the lack of face-to-face communication between teachers and students in web environment distance education in practical operation has inevitably encountered some difficulties one of which is the failure of web-based synchronous interaction. For example, individual learning hasn’t yet been realized in online synchronous discussion. Students have different cognitive styles which play a decisive role on their learning habits and learning behavior. To actualize the individual learning in web-based synchronous discussion, the research has tested cognitive styles of subjects by graphic test, observed performances of the three cognitive styles in web-based synchronous interaction, and analyzed the impact of different cognitive styles on web-based synchronous interaction in terms of cognitive styles and participation, and cognitive styles and interaction quality.
481
Abstract: Aiming at the PLM component library system, this paper studied the characteristic and requirement of the development of the PLM component. The main goal of this research include: deploying PLM component library using open source project OpenStack and KVM; studying the component communication method under heterogeneous environments on the basis of distributing framework model Remote Method Invocation (RMI); designing PLM soft component’s facet and interface; putting forward the steps of developing the distributed PLM component based on EJB technology (include Session Bean, Entity Bean, Message Bean); issuing distributed PLM component that is packed into Web service in order to achieve the mapping between PLM soft component and Web service by using J2EE Web service component; developing a PLM component library management system based on SOA framework.
485
Abstract: This paper introduces a smart home system with new user experience. The system uses the mobile smart terminal to recognize the smart appliance based on the real-time image of the smart appliance captured by the terminal, then the terminal generates a user-interface (UI) for the user to control the smart appliance recognized. Using this system, user no longer needs to search the smart appliance that he wants to control in the complicated menu, instead, he just use the camera to capture the image of the appliance, then he will gets the controlling UI of the appliance; it means that as long as you can see the appliance, then you can control it, and that is the “Visible-and-Controllable” effect.
492
Abstract: In the course of improving autonomous interpretation abilities, different methods will be used. At the same time, different channels will also been taken into consideration for improving autonomous interpretation abilities. Automation of communication is one of the channels, which plays an important role in this course with the development of information technology. In the paper, the author has collected some information about automation of communication and at the same time, the author also investigated the scientific channels for learners’ using automation of communucation in different ways. After the investigation and interview of the author, some scientific results will be found after detail analysis of the author. At the same time, some shortcomings of the application of automation of communication can also be found. Some effective improving measures will be put forward to overcome the shortcoming for reform.
496
Abstract: The parallel, sharing and high speed distributed system has become the mainstream of current system architecture, the characteristics of uncentralized management makes more and more people take flexible operations. However, as the nodes in the system are not bound by a central server and resource sharing is a node’s voluntary behavior, the traditional centralized mechanism is not suitable for large-scale distributed system. Aiming at this problem, this paper proposes an improved dynamic trust model for distributed system (IDTrust) to quantify and evaluate the credible degree between nodes. The analysis and simulation results show that the effectiveness of contain malicious nodes and the security aspects of IDTrust are superior to those of current typical methods.
500
Abstract: In the paper, a new scheduling algorithm, priority bitmap and hash table (PBHT) algorithm, is put forward. The important parts of the scheduling algorithm, priority bitmap scheduling algorithm and hash tables are analyzed, and the workflow and time complexity of the scheduling algorithm are described in detail. Series of experiments are designed and completed. The feasibility, rationality, completeness and the scheduling algorithm are verified by the experimental results.
504

Showing 101 to 110 of 123 Paper Titles