Advanced Materials Research Vol. 717

Paper Title Page

Abstract: The TACCT (Traduction Automatique Contrôlée Centre Tesnière) system architecture draws its strength from two main areas governed by microsystemic theory due to Sylviane Cardey: controlled language and contrastive linguistics. In this approach where the French and Arabic languages are brought close together by using a comparison of the two linguistic systems and control of the respective languages, the most appropriate approach seems to be unquestionably the microsystemic one. This is because the microsystemic approach is able to address the particular needs of each language considered by the system. The microsystemic approach decomposes the whole system into dynamic subsystems, unknown at first, their boundaries being dependent on the architecture of the machine translation system. The resulting fragmentary nature of the microsystems is aimed at apprehending the whole language with a detailed analysis of each of its constituent components and at the same time formalizing the nature of interactions between them. The syntactic-semantic model adopted for Machine Translation in the TACCT system is therefore the result of this new two-faceted approach based on both the study of divergences and convergences between French and Arabic conducted on a large bilingual safety corpus and also on an intra-and inter-language control-oriented analysis. Because of this we distinguish in our research between different types of control: static control and dynamic control.
772
Abstract: Information technology and education have been working hand in hand. Advancement in computer technology has altogether opened up limitless educational innovation. With the rise of popularity of social networking sites (SNS) such as Facebook, educators have been eager to test the usefulness and effectiveness of SNS in the teaching and learning process. This paper summarizes the findings of a case study with the use of a social networking software; Mahara. Participants are 46 students of a technical vocational university in Taiwan. Students are grouped together and assigned a certain task to accomplish with the use of Mahara. Enabling the collaborative functions of SNS to accomplish the task, students are later surveyed with regards to their learning styles, perceived collaborative learning and constructivist internet-based learning environment (CILES) preferences. Result shows that the participants’ collaboration is highly significant to their CILES preferences. While, there seems to be no significant effects of learning style towards the participants’ CILES preferences. Recommendations are given to further the improvement of SNS use in education.
778
Abstract: This paper summarizes the problems by analyzing the problems which emerge from the application of the multimedia teaching in martial arts training and by collecting accurate data. The summarized results highlight the importance of the multimedia teaching in martial arts training, and emphasize the necessity of application. In the end, several trial suggestions and related points for attention are put forward during applications of the multimedia teaching in martial arts training.
784
Abstract: Erasure codes received extensive attention in the cloud storage system because of its effective on saving storage space,However, due to the high recovery-overhead of erasure code, its application has been limited in these storage systems.For these problems,in this paper,we presents A multi-server Erasure code algorithm based on the degree of restriction to reduce the recovery-overhead from the restriction of date and parity's degree,and enhance the system performance to a certain extent ,ensure the reliability of the data of the cloud storage environment.
789
Abstract: The vulnerabilities in todays design and fabrication process have raised the possibility of malicious circuit modification as known as Trojans in a design to impact the functionality or transmit key information to the adversary. In this article the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.
794
Abstract: In this paper, we present an improved version of CAMSHIFT algorithm applying on surveillance videos. A 2D, hue and brightness, histogram is used to describe the color feature of the target. In this way, videos with poor quality or achromatic points can be characterized better. The flooding process and contribution evaluation are executed to obtain a precise target histogram which reflects true color information and enhances discrimination ability. The proposed method is compared with existing methods and shows steady and satisfactory results.
797
Abstract: Heuristic clustering method based on local information is introduced, and then the label propagation method based on local information is summarized, and the problem of the iterative process and using a random strategy to select a node belongs to the cluster structure are analyzed. Label propagation algorithm base on the similarity of node attributes is improved. At last, the experiments are used to help to discover the efficient and availability of the algorithm, and put the algorithm into preliminary application.
803
Abstract: Rumor is one of the principal factors to affect public sentiment. With the development of Internet, the group of the micro-bloggers continuously grows. The special propagation mode of micro-blogging brings challenge to the rumor management. This article summarizes the features of information dissemination of micro-blogging and has a review on the traditional rumor propagation models. Furthermore, the process of rumor propagation on the micro-blogging platform is deeply analyzed, the micro-bloggers in the process of rumor propagation are classified and the rumor propagation model on the micro-blogging platform is initially studied and established. The study of this article lays a foundation for further study on rumor management on the micro-blogging platform.
808
Abstract: The characteristic database is the development direction of the construction of the digital resources of the library of higher vocational college. In this paper, through the analysis of status quo of Tianjin higher vocational college libraries, And through the practice of characteristic database construction in Tianjin Vocational Institute library. And provide reference for other higher vocational college library.
812
Abstract: We propose an easy method for data collection and central data warehouse design. This method can be used with or without other software development frameworks.We explain thoroughly those aspects that influenced the methodology building.The methodology is defined by four steps, which can be aligned with various iterative development frameworks. We describe here the alignment of our methodology with the RUP(rational unified process) framework.
816

Showing 141 to 150 of 168 Paper Titles