Advanced Materials Research Vols. 542-543

Paper Title Page

Abstract: The spin-polarized generalized gradient approximation to the density functional theory is used to determine the geometries, stability, electronic structures, and magnetic properties of the Gd8O12 cluster. Our work reveals that the ground state configuration of the Gd8O12 cluster is a hexahedral cage structure with Ci symmetry. The electronic and magnetic properties imply that the formations of the ionic bonds between the adjacent Gd and O atoms result in the high stability of the Gd8O12 cluster, which is due to the charge transfers between the Gd 5d, 6s electrons to O 2p orbital. It is also confirmed by the electron densities of HOMO-LUMO states. In addition, the analysis of the magnetic properties implies the total magnetic moments are mostly dominated by the Gd 4f orbital.
1418
Abstract: In view of the teaching problems and difficulties of machinery manufacturing equipment design, the automatic generation technology of structural net and speed diagram was proposed. The conceptions and characteristics of structural formula, structural net and speed diagram were discussed. The expected targets of the automatic generation technology were put forward. The technical principles of automatically generating structural net and speed diagram were respectively analyzed. Based on these, the automatic generation software of structural net and speed diagram was designed and developed. The development environment and implementation methods of the software were proposed. It is proved that the software can play an important role in improving the teaching effect and quality.
1422
Abstract: As we know that absolute immunity from flood damage is not physically possible. However, with proper planning and continuous effort we can certainly look forward to an appreciable diminution of distress with an accelerated implementation of flood management measures. It is commonly accepted that the measures to mitigate flood losses need to be given the most efforts wherein Flooding Information System (FIS) is the primary measure of flood mitigation. Nowadays, the web-based Geographic Information System (GIS) is so popular and quite easy to combine with other field instruments for becoming another format of information system, such as FIS in this study even though it is still not quite popular and familiar yet. The use of FIS can be viewed mainly as a physical method of protection from floods and it first needs to effectively measure the flood influence in which flooded area and height may be the most desired measures for each of typhoon-induced flood events. Furthermore, the geographic modeling tools are then added to estimate the scale of we face from typhoon-induced flooding from a computational perspective. The flood scale in terms of geographic volumes thru initial field flooding area and height may be the major contribution to make protection measures in advance. Field instruments include various flood mark recording devices. A number of new-designed stream gauges were installed in the low-lying plains to experience floods for recording their flood heights as a measure of flooded areas. As for real-time information, we set up the electronic stream gauges of the stilling well, which measured the height of a float in a hole dug alongside a stream channel. In addition, we also used other types of stream gauge include the pressure transducer, which inferred the depth of water in a stilling well by measuring the pressure of the column of water inside. The gage height values, taken at regular intervals, were recorded and transmitted electronically to the dedicated databases. Unfortunately, the verification did not show a satisfactory result as expected. However, as a general conclusion, with the right and sufficient field instruments, the FIS may provide accurately real-time flooding information to give protection or evacuation in advance provided that internal geographic data inside the system set up well at the first place.
1426
Abstract: A visualization algorithm was presented for the optimization of geometrical shape matching in the wheel-rail contact system. The algorithm of the subsection cubic spline interpolation was adopted to fit the wheel-rail profiles curves, and curve boundary was got by the finite difference method; furthermore, the wheel-rail contact positions were figured out by computing the roll angles of wheelset iteratively with the dichotomy. Based on MATLAB and Visual C++, the wheel-rail contact geometrical parameters were calculated and visualized, the simulation results show the algorithm has the strong robustness.
1430
Abstract: Aiming at the problem that rendering 3D Julia sets on CPU is slowly, a method of rendering 3D Julia sets on GPU is presented in this paper. After introducing the advantages of GPU and the operations of quaternion, the generating process of 3D Julia sets is discussed in detail. Ray tracing volume rendering algorithm is applied to obtain high quality 3D Julia sets, and escaping time algorithm is used to generate the discreet data of Julia sets, of which normal is estimated according to the original of ray and accelerated by using unbounding sphere algorithm, and the graphics examples are given to illustrate this algorithm. Finally, the factors of affecting rendering speed and refined effect are summarized. The results show that the speed of 3D Julia sets rendering on GPU is much faster than CPU, and the interactivity of rendering process is also enhanced.
1434
Abstract: Kernel is a key component of the support vector machines (SVMs) and other kernel methods. Based on the data distributions of classes in the feature space, this paper proposed a model selection criterion to evaluate the goodness of a kernel in multiclass classification scenario. This criterion is computationally efficient and is differentiable with respect to the kernel parameters. Compared with the k-fold cross validation technique which is often regarded as a benchmark, this criterion is found to yield about the same performance with much less computational overhead.
1438
Abstract: With the extensive number of documents that firms must process and with the extensive amounts of information available on the Internet, an automated intelligent method is needed to sort through all available documents or sites. It would be beneficial to start with grouping similar documents or sites together based on similarities. Classifying documents and sorting them into categories could be beneficial since in most cases, no one user would be interested in all the different categories of documents at the same time. Classifying a large number of documents would also make it easier to locate a specific document. In this paper, neural network computing based text mining (TM) and its application will be discussed.
1443
Abstract: The dynamic encryption algorithm is based on the idea of carrying on encryption to the information using dynamic algorithm; it is one kind of algorithm which can produce the stochastic algorithm. The key length of dynamic encryption algorithm is random, is suitable to carry on the encryption to the random length plaintext, and the encryption speed is quick, the intensity is high, and therefore there is the broad application prospect. This article given one kind of dynamic encryption algorithm models based on the ergodic matrix and proves the algorithm security according to the analysis on massive empirical datum.
1447
Abstract: The dynamic encryption algorithm is based on the idea of carrying on encryption to the information using dynamic algorithm; it is one kind of algorithm which can produce the stochastic algorithm. The algorithm, may guarantee that the algorithm transforms dynamically using each time, like this caused that the security of the cryptogram system is relied on protection to cryptogram and also carry on the protection to the encryption algorithm. The key length of dynamic encryption algorithm is random, is suitable to carry on the encryption to the random length plaintext, and the encryption speed is quick, the intensity is high, and therefore there is the broad application prospect. This article given one kind of dynamic encryption algorithm models based on the ergodic matrix as well as the concrete realization method, and proves the algorithm security according to the analysis on massive empirical datum.
1451
Abstract: Different clustering methods featuring varied principles needed being comparatively opted. Clustering effect estimation coefficient was adopted to highway transportation research, and the best one out of clustering methods was evaluated as well as chose after comparing their findings. True as empirical analyses prove, this method is simple yet feasible, and its results are in accordance with the real conditions as well.
1455

Showing 291 to 300 of 303 Paper Titles