Advanced Materials Research Vols. 791-793

Paper Title Page

Abstract: A icon can be located by its coordinates in the window by the windows coordinates system.A icon has its own coordinate system too.These two different coordinate systems must communicate properly and on time. Some important problem are discussed in the paper. They are about moving icon efficiently,exactly.Some people have noticed that moving icons on desktop under window XP is not efficient and exact. In the GUI environment,icons and pictures are frequently used and they represent many things,such as files,folders etc.In fact theses icons are associated with system resources.Controlling these resources efficiently is controlling the systems rescources efficiently in reality.This phenomenon mentioned previously is caused by some defaults in the development of Windows XP itself. Unenabling to smally move an icon on Windows XP screen efficiently and the icons bounce after releasing mouse are analyzed and studied in the paper. In VB 6.0 development environment the methods and skills of solving this problem are given, so icons dragging can be controlled efficiently and accurately. This idea is very useful and valuable generally for solving similar problems in Windows XP.
1699
Abstract: this paper proposes a new using concept of BIM building information model. This paper uses the BIM information technology model in the process of architectural model drawing and does the secondary development of BIM software. This paper achieves the interactive use of data combined with MIDAS software and REVIT software successfully and uses language recognition software to establish the interface program. Finally, it achieves the building of complex architectural structure model through modeling examples, which provides a reliable theoretical basis for the building of information modeling technology.
1704
Abstract: With the rapid growth of Internet penetration, it is the disclosure problems of network information that frequently appears .At the same time, the problem of Internet safety has been attached great importance to by the countries. Thus, it is of great significance to build an Internet safety supervision mechanism. Based on white box testing technology and black box testing technology theory of network security detection, this paper proposes a WEB interface detection algorithm based on Internet resources and sets up a safety assessment model for computer security and supervision mechanism. In addition, this paper also designs the algorithm experiment by taking the data detection which considers WEB as the connector for example. Through the algorithm experiment, the following conclusions are obtained: Network interface has a higher recognition rate for E-BPM-BM algorithm which has different types and different characteristics. Among them, registered network interface owns the highest recognition rate which is up to 98.46%. When the network test node matrixa0 is 9, its matching rate reaches the maximum, namely 0.97 9.
1710
Abstract: This paper first investigates the similarity level between the same family and closer languages (such as Altai family languages) and then examines a transformation between their entries and texts. Cosine similarity measure and dynamic programming (DP) algorithm are used to calculate the similarity and transformation between the source and target languages using a multilingual parallel data set and a function word dictionary. Test data set includes 7,854 paralleled sentences of Chinese, Uyghur, Kazakh and Mongolian various writing systems. Experimental results show that the similarity level of the languages from the same language branch is higher than that between different language branches. And a transformation test focused on the Mongolian language branch showed accuracy of 86.7% for NM to TM and 91.1% for NM to TODO.
1716
Abstract: Topic Map, which described as The GPS of information universe, traditionally focused on building knowledge structure and associating them with information resources. In online-education environment, it has been used to address the issues about people disoriented in huge amounts of learning resources, to support learners browse the semantic relationship between knowledge topics and find the learning content effectively and instructors externalize their implicit knowledge both on conceptual and information level. However, as the explosion of knowledge information, people are suffering the disorientation of knowledge topics. Specially, learners are puzzled about what knowledge are valuable and need to learn, and knowledge providers dont know how to update outdated knowledge hierarchy or develop new knowledge product for changing requirements. To address this problem, we extend Topic map by adding a top level, named knowledge requirement level (KRL). This level KRL can be used to guide learners to concentrate on the required knowledge topics, and drive knowledge providers to redevelop or refactor outdated knowledge hierarchy. In order to obtaining social knowledge topic requirement for KRL, we have developed an information extraction tool, named WIE, to extract knowledge requirement information from job-list Webpages for supporting users extract data for different piece of a given structure-fixed Webpages.
1721
Abstract: To overcome disadvantages of traditional worst-case execution time (WCET) analysis approaches, this paper proposes a new WCET analysis approach based on AOE networks for ARM programs. By assigning the execution times of program segments to weights of directed edges, we reformulated the analysis of the WCET of the program as finding the longest path in a weighted directed graph. An algorithm implemented in this paper is used to search the longest path in the weighted directed graph and gives the WCET estimate finally. Experimental results have shown the analysis approach proposed in this paper is an effective way to obtain the safe and tight WCET estimate for ARM programs.
1726
Abstract: With the rise of android, an increasing number of vehicle manufacturers prefer to use android as the operating system of vehicle terminal. However, Android so far is mainly designed for phone operating system while vehicle terminal operating system demands higher reliability and real-time performance. In this paper, we propose a method to improve the management of processes based on Android process management. Processes adapting vehicle information interface will be classified as vehicle processes and priority of those will be upgraded by our dynamic weight management so that real-time performance and reliability in vehicle terminal is achieved.
1730
Abstract: With the continuous improvement of information technology, multimedia-based instruction is becoming more and more popular in Sino college English classes. However, some problems still exist in college English reading classes. On the basis of the constructivism theory and the learner autonomy theory, some suggestions are put forward to enhance the efficiency of college English reading classes in China.
1735
Abstract: In the last few years, cloud computing has grown from a business concept to one of the fastest growing IT industry. It is a fundamental change and represents a movement towards the intensive, large scale specialized calculation model. But as more information and organizations are moved to the cloud, more concerns about security emerge. This paper discusses security issues, requirements and challenges, and provides a Cloud Computing security framework and an ESI assessment model.
1739
Abstract: Data gateway, completing data collection, storage, forwarding, protocol conversion and other functions, plays an important role in energy management system. Using hierarchical and modular design method, we design and implement a smart data gateway for energy management in this paper. However, it can be flexibly applied to other IoT applications by adding the hardware module and the corresponding driver because we design the smart data gateway, aiming at IoT application.
1743

Showing 391 to 400 of 509 Paper Titles