Advanced Materials Research Vols. 268-270

Paper Title Page

Abstract: To improve the accuracy of query result of search engineer and satisfy personalized requirements of users, we proposed the method of building and updating user personalized model. This method based on certain information which mine from users’ behaviors and customs in using search engineer. Through mining information from users’ query customs, visit frequency and browse Web in using Chinese search engineer, we pick up characters of use and interest of users, and then build personalized interest model of users. This paper studies technique details of building and updating personalized model. Set up a personalized Chinese search engineer model.
1216
Abstract: A finite element model was developed for simulation of feed direction burr formation process in turning. Based on a series of stress and strain contours the progressive change of geometry at the edge of workpiece edge from simulation, a turning feed direction burr formation mechanism is proposed and divided into four stages: normal cutting stage, deformation of workpiece edge stage, continues cutting stage and final developed stage. The removal of the remaining part of allowance takes place close to the tool tip as the material has sufficient rigidity to allow cutting only in this area in final developed stage and secondary burr will be formed; primary burr will be formed in final developed stage if the remaining material has no rigidity to allow cutting continually in final developed stage. The burr size and burr shapes form simulation results are consistent with the experimental results. Finite element model generated here provided a numerical analysis method to solve the prediction of burr formation and physical insight into the fundamental burr formation mechanism.
1222
Abstract: For the aim of being able to reflect the randomness, fuzziness and the relevance between the two existed in the seepage property of earth rockfill dam, by assumption of normal cloud distribution of the seepage parameter, a new back-analysis method based on cloud neural network(CNN) is presented in this paper, which has being used in the nonlinear system simulation successfully. At last the method was applied to the back analysis of a dam’s seepage property, and the result shows that the application is feasible.
1228
Abstract: To improve the ability of the fuzzy edge detection and anti-noise performance, the paper proposes a new weighted direction fuzzy entropy image edge detection method. The proposed method converts the feature space of image gray to the fuzzy feature space, and then extracts the weighted information measure of the direction structural in the fuzzy entropy feature space. Finally, the proposed method determines the edge pixel by an adaptive threshold after non-maxima suppression. The experiment demonstrates that the proposed method can extract the image edges effectively by means of the fuzzy edge detection.
1234
Abstract: Edge is the basic feature of the image, and is easily damaged in the image processing. This paper proposed an edge-preserving method for image filtering. The scheme can improve the capability of protecting the edge information. The proposed method firstly defined two information measures that were based on fuzzy entropy and image gradient. Then the two information measures were fused by triangle-module operator to determine the image edges. At last, we used the modified filter to eliminate noise and retain the determined edge points. The experiment results, compared with AMAWM, can achieve better effects on PSNR and AG (Average Gradient), which illustrates that more edge information may be preserved after the filtering operation.
1239
Abstract: The mining spares management is an important part of mining enterprise information management. Starting from actual demands of mining enterprises and combining theories, this article develops mining spares management information system based on the BS framework. Major modules of the system includes functional modules such as basic data maintenance, spares inventory transaction processing, spares inventory transaction query and spares inventory information statistics and etc., so that the system basically realizes main functions of mining spares management and is able to give certain assistance to mining enterprises.
1245
Abstract: Four different network displaying methods of apparel are summarized. The paper discusses that costumers are more in favor of getting live and fashion clothing information under the influence of effect of apparel network displaying. They have got certain knowledge about fabrics, designing color, styling, price, virtual try-on. The paper indicated that capacity in digitalized fashion design and humanness service levels should be strengthened to meet demands of consumers in network information age. It also gives some examples of how to display dress in a dynamic designing process, and points the limitations and prospects of these techniques through analyzing the whole process. The use of appropriate displaying methods of apparel will help customers to enhance aesthetic enjoyments and create apparel online shopping’s happy experiences.
1249
Abstract: Application layer vulnerabilities represent a substantial portion of the security exposures of computer networks. In this paper, we explore the effectiveness of HTTP-session model to effectively describe web access behavior. HTTP-sessions are extracted from http requests as accessed by users. Based on the HTTP-session model and the analysis of web based attacks, we present an active anomaly detection framework to detect web based attacks. We demonstrate the effectiveness of the proposed methods via simulation studies using real-world web access requests. The result shows that our methods can effectively detect the application layer attacks.
1253
Abstract: The robustness and real-time performance are of the greatest significance for the navigation of the patrol robot in the transformer substation. To meet this demand, a navigation and position approach is presented in this paper based on color vision and RFID(Radio Frequency Identification) technology. In the presented system, the position information is provided by RFID tags and navigation is completed by the extraction of guidelines. Based on the deep analysis of the advantages and shortcoming of different color space, a new approach integrating the good real-time performance of grayscale image process and rich information in color images process is presented to improve the robustness and real-time performance of navigation. Fast Hough transform is selected and combined with least square method to detect the navigation line. Experimental results show that the presented method can meet the real-time and robust demand of the navigation of patrol robot.
1259
Abstract: This paper is designed to change the relative backwardness of China in terms of the low-carbon transition. By analyzing the specific situation of China and the features of Carbon Fund, we propose a new development mode that can be applied to China——the Carbon-Fund-Mode which can significantly facilitate the development of low-carbon economy by exerting Carbon Fund as the key species, giving full play to the capital platform, technology platform and information platform and forming the symbiosis network of low-carbon economy. At the end of the paper, suggestions have been made on how to develop a Carbon-Fund-Mode in China.
1265

Showing 231 to 240 of 414 Paper Titles