Advanced Materials Research Vols. 765-767

Paper Title Page

Abstract: Data mining is the techniques of finding the potential law from the data by machine learning and statistical learning .This paper focuses on a number of problems existed in the currents ports training, discusses the application principle of the data mining technology in sports training, and applies the critical neural networks for forecasting the performances of the athletes .Experimental data show that prediction of athletic performance by the use of neural network has very good approximation ability. It shows a broad application space of the use of data mining technology.
1518
Abstract: In this paper, we proposed a new method for hiding and extracting information in printed chinese documents. This new method embeds information into chinese documents by varying the typefaces of chinese words. In addition, an information extracting method based on missing feature concepts is proposed to handle the partial occlusion, generated by printing and scanning operations. The new improved approach has been evaluated on numerous printed documents and demonstrated improved performance over other systems.
1524
Abstract: The intelligent information retrieval model discussed in this paper is constructed by multi-agent. Currently, BDI cognitive theory is accepted widely by the scholars of this field, but the related researches mainly focus on the theoretical derivation and presentation of symbols, lack of model facing practical application. In this article, a dynamic rule-based reasoning model is proposed. The model based on BDI theory is an expression of agent intelligence. The basic logical reasoning of the BDI theory is extended in this article. The author not only introduces several functions to study the dynamic changes of agents mental state, but also give a detailed description of how to use the theory of production rules to express BDI-based reasoning. This article also studies and designs the agent communication mechanism in MAS. Finally, the intelligent information retrieval system is designed and implemented with the idea of AOP.
1529
Abstract: This paper puts forward a model combined cloud computing and P2P, and then achieves chord resource search algorithm in the model. Because chord algorithm one hand, does not consider the problem of node heterogeneity, on the other hand, its routing table has large redundant information. So chord algorithm is improved from the two areas, and last MRC-chord is proposed. The algorithm first defines that the nodes of the same geographical form a ring, and in each ring, the node with strongest overall performance is selected to be super cloud node, all of the super cloud nodes form the master ring , then improves routing table. Experimental results show that: the improved algorithm can reduce average routing hops and average network delay effectively, so improves the efficiency of resource search.
1533
Abstract: The finite automata theory extended and then the timing parallel automata theory is got and applied in the software process modeling. The establishment of group software process model is on the basis of timing parallel automata which realize the activity planning, resource allocation and progress control of process. The process model has been checked rationality and the rationality definition and check rules have been given. The process modeling method in this paper is intuitive, easy to understand and could describe the dynamic change of process, and also present the concurrent activity and provide the effective support to parallel work and cooperative work.
1537
Abstract: With the advances in information systems and the Internet, universities have developed various e-learning platforms and blended courses that enable students to learn in a variety of ways. For system users, the acceptance and adoption of the system affects their learning processes and results. This research applied the United Theory of Acceptance and Use of Technology (UTAUT), proposed and validated by Venkatesh et al (2003), to explore factors that affect the acceptance of Moodle Reader, a system that supports English language learning. The results show that the constructs, performance expectancy and social influence have significant effects on behavioral intention, and facilitating conditions has a direct effect on user behavior and system usage. However, effort expectancy does not have an obvious effect on behavioral intention. Users intentions are dominant factors that consequently lead to gains in information systems performance. Furthermore, researchers classified students into different groups by gender, age and English learning experiences to study how individual differences affect adoption of the system. Multi-group analysis with PLS was used to examine the groups, and the results suggest that individual differences have no direct effect.
1541
Abstract: According to the current status of maintenance training, a framework of desktop virtual maintenance training platform was proposed on the basis of the NGRAIN ,making full use of advanced CAD technology and virtual reality technology. At last take the dump trucks as example, which proved that equipment virtual maintenance training can largely improve the cost-effectiveness of the maintenance training. The platform is a portable, economical solution for maintenance training, which not only can meet the needs of the training mission, but also provide a reference for the other virtual maintenance training system. In the future, the platform will have a very important practical significance and broad application prospects.
1546
Abstract: Cloud computing has attracted much interest recently from both industry and academic. More and more Internet applications are moving to the cloud environment. This paper proposes an aspect oriented method to model and analyze self-recovery of cloud application according to its characteristics. Petri nets are used as the formal description language for cloud application, and use it to describe its basic elements, such as, cloud module, resource service, physical machine, virtual machine, etc. Aspect oriented programming method is used to extract self-recovery process as the core and crosscutting concerns. On this basis, the self-recovery approach is presented, the related theories and tools of Petri nets are used to verify the correctness of proposed method. Experiments show that the proposed solutions have better performance in supporting the self-healing Web service composition.
1550
Abstract: The social welfare information management system based on three-tier model and the client-server framework is built, which in close connection with social welfare archives information. At the same time, the amount of data, namely the underlying architecture code design, system architecture design, and resolve client desktop three levels to form. The social welfare system has the formation of the window, which informs retrieval of data management applications for comprehensive
1556
Abstract: With the development of digital campus construction, the campus network size has been rapid growth, but there are also many network security problems. The honeypot technology is introduced and based on the development of net technology, combined with the campus network security problem, the honeypot technology applied to the campus network in Guangxi Agricultural-vocational Technique College is put forward, which can make the security of campus network unobstructed
1560

Showing 331 to 340 of 717 Paper Titles