Advanced Materials Research
Vol. 1086
Vol. 1086
Advanced Materials Research
Vol. 1085
Vol. 1085
Advanced Materials Research
Vol. 1084
Vol. 1084
Advanced Materials Research
Vol. 1083
Vol. 1083
Advanced Materials Research
Vol. 1082
Vol. 1082
Advanced Materials Research
Vol. 1081
Vol. 1081
Advanced Materials Research
Vols. 1079-1080
Vols. 1079-1080
Advanced Materials Research
Vol. 1078
Vol. 1078
Advanced Materials Research
Vol. 1077
Vol. 1077
Advanced Materials Research
Vols. 1073-1076
Vols. 1073-1076
Advanced Materials Research
Vols. 1070-1072
Vols. 1070-1072
Advanced Materials Research
Vols. 1065-1069
Vols. 1065-1069
Advanced Materials Research
Vol. 1064
Vol. 1064
Advanced Materials Research Vols. 1079-1080
Paper Title Page
Abstract: This study is to provide an integrated method and algorithm for knowledge structure analysis and cognition diagnosis. Most researchers of educational measurement analyzed testing data from paper-pencil test by classical test theory (CTT) or interviewed with students in order to acquire students’ knowledge structures. Moreover, it is considered that knowledge structures are important for instruction. Information of knowledge structures is useful because it will be helpful for cognition diagnosis so that remedial instruction becomes feasible.
686
Abstract: In order to work on research on analysis the relationship of invasive alarm, establish a net-safe frame integrated technology of privacy processing. The mining algorithms of K- Frequent Patterns is improved in research on quantity of invasive alarm, a generalization measure method has been proposed which focus on effectiveness ,by improving the algorithms, bring out associative algorithms of frequent invasion sequence with privacy-processing integrated, privacy-processing of invasive alarm data has been achieved effectively. Experiment shows that the association rules which get from improved algorithms are available, and the improved algorithms have the ability to protect the sensitive information. A conclusion has been made from the results: After privacy-processing, the frequent invasion sequence algorithms have preferable validity, scalability and mining performance.
690
Abstract: To balance passengers belong to the same community which has multi subway stations, this essay locating feeder bus stations with IP(integer programming), considering departure interval of subway, solving TSP(travelling salesman problem) with MPGA(multi-population genetic algorithm).
694
Abstract: Coal mine underground information management is a large-scale and complicated management process. The applications of modern management means of professional, industrialization, mechanization and informationization have provided sufficient basis of science and technology to the horizontal underground information management level. This paper has introduced the BS/model system to change the present situation of the existing enterprise staff information management which is not perfect. In this paper, the background and the significance in the coal mine management in ultra wide band wireless communication technology based on information management, put forward the purpose and the main content of the mode, function framework with underground staff information management information system and each module, finally the relevant discussion information system application has been made.
702
Abstract: This paper discusses theuncertain portfolio selection problem when security returns are hard to be wellreflected by historical data. The security returns are regarded as uncertainvariables. A target semi-absolute deviation risk measure is introduced. Basedon the concept of target semi-absolute deviation, a mean target semi-absolutedeviation model is proposed. In addition, thegravitation search algorithm is introduced to solvethe proposed model. Finally, a numerical example is given to illustratethe application of the proposed model.
707
Abstract: Multi-objective path planning is a path planning problem when there are more than one objective function to be optimized at the same time. This paper is based on traditional A* algorithm.To improve the algorithm A* and find out the shortest path in the different environments,we choose different weights and do global path planning by using improved evaluation function.We use the minimum binary heap in a linked list structure to manage the OPEN table,and the search efficiency has been improved.We compile the simulation program of path planning in the VC environment,then compare the operation time and generated paths by transforming the coordinates of the initial node and the goal node.Research shows that, the algorithm can improve the efficiency of the path planning efficiently.
711
Abstract: With the development of neuroscience, brain computer interface (BCI), as the emerging technology to liberate our brain, is receiving increasing attention from society, but its ethical issues are rarely mentioned. This article introduces the brain-computer interface and its significance,analysis the focus point which may lead to ethics controversy, explore the core issues of ethics and code of ethics to be followed.
716
Abstract: For the issue of the optimal chemical control method in agricultural pests, impulsive differential equations theory is applied to establish and analyze both the pest management model of spraying pesticides and the corps effectiveness model; for -periodic solution models, in order to make the residual pesticide dosage in crops and the dosage of spraying minimum, control pest number under the economic damage threshold, optimal control theory is employed to determine the optimal pesticide dosage and spraying interval. So, a best method about controlling agricultural pests via pesticide is given. Finally, Numerical Simulation is used to explain the implement of this method.
720
Abstract: Recently, Wireless Sensor Network has drawn wide attention on collecting and communicating data for Smart Distribution Grid (SDG). In order to establish a routing system satisfying the latency and reliability requirements of smart distribution grid, a novel routing algorithm with layered cooperative processing and QoS Guarantee Control function is presented in this study. By researching link reliability and path delay estimation method, optimized latency and link quality routing decision method, and on-demand and priority-based buffer queue execution method, the end-to-end data transmission performance of WSN for SDG communication are optimized. The simulation results indicate that our routing protocol can provide QoS for SDG according to their requirements.
724
Abstract: Data fusion technology is widely used in data processing due to its characteristic of less transfer data. However, with the continuous application of wireless sensor networks, it raises higher demands for information integrity and privacy, data fusion faces new challenges. The paper focuses on issues related to the integration of wireless sensor network security data, analyzes its attack types of surface degrees and the need for security protection.
730