Advanced Materials Research Vols. 926-930

Paper Title Page

Abstract: Automatic Dependent Surveillance Broadcast (ADS-B) is a recommended advanced surveillance technology in Future Air Navigation Systems by ICAO. ADS-B is the technology that can provide the surveillance capabilities based on GNSS and ground-air data link. Because the frequency and the coding mechanism are in public, it is easy to be disturbed and deceived. The essay analyzed some traditional methods to check ADS-B information, and introduced a new checking method based on Direction-finder Antenna that fused radio character and Kalman Filter algorithm together . It can identify the false ADS-B message efficiently.
1861
Abstract: This Marine mobile ad-hoc network (MMANET) is a dynamic wireless network, and the random mobility of ship nodes and limited radio transmission range are the main challenges in the design of the robust routing algorithm. Dynamic Source Routing (DSR) and Ad hoc On-Demand Vector Routing (AODV) are typical on-demand protocols, but if there are some nodes moving with random fast velocity and limited transmission range in communication network, the network will be under an unstable link state and this situation may lead to large delay and packet loss. In this paper, a new scheme named Dynamic Link Self-healing mechanism on the basis of Mobility Quantization AODV (DLMQ-AODV) is proposed to solve the problem. Mobility quantization of node is resulting from relative velocity and distance, through computation of weighting, dimensionless etc. We take advantage of mobility quantization to establish dynamic link self-healing mechanism in order to improve the routing performance. The simulation results show that DLMQ-AODV has a better performance in comparison to DSR and AODV.
1865
Abstract: WINEPI algorithm is kind of data mining technology that is widely used in alarm association rules mining. Based on the classic WINEPI algorithm, we apply event window instead of time window to improve the exploration result, meanwhile we use FP-Growth algorithm framework instead of Apriori algorithm framework , thus improving efficiency. Based on the alarm time attribute we find interesting alarm association rules further. Experiments show that compared with the classic WINEPI algorithm our improved approach have advantages in reducing the mining error rate and gaining more interesting alarm association rules.
1870
Abstract: At present, most of research on node importance evaluation is concentrated on static un-weighted network. For weighted networks, this paper presented a new evalution method of node importance based on load flow in the node-weighted network, and it was based on the contribution of the nodes for the whole network in the view of microscopic and macroscopic. The most important node was the one which was determined by the outputing load, inputing load and crossing load between the different nodes. The improved evaluation method could help exactly to find some critical nodes which ware sensitive to the efficiency of networks. Final, example verifies its efficiency and feasibility.
1874
Abstract: Nowadays gesture interaction of mobile device changed human-machine interactive mode significantly, integration of multiple sensors made great change on human-machine interactive mode of mobile device. According to the idiomatic gestures, 3D sensing interactive mode was used in software of mobile device, which brought more convenient and faster interactive experience to users.
1878
Abstract: Augmented reality can create a learning environment to learners, combining the actual condition of let them around to see the real environment at the same time, also can see a computer, virtual information generated by mobile phones as the implementation of the augmented reality application platform, due to the mobility, portability, and human-computer interaction and so on, has strong advantage, and therefore more mobile learning application prospect, this paper discusses the structure of augmented reality based on mobile phone key technology and main function features, on the basis of to augmented reality based on mobile phone and its application in mobile learning has a deeper understanding.
1882
Abstract: This paper presents a new algorithm for the detection of abnormal events in Wireless Sensor Networks (WSN). Abnormal events are sets of data points that correspond to interesting patterns in the underlying phenomenon that the network monitors. This algorithm is inspired from time-series data mining techniques and transforms a stream of sensor readings into an Extension Temporal Edge Operator (ETEO) of time series pattern representation, and then extracts the three eigenvalue of each sub-pattern, that is, patterns length, patterns slope and patterns mean to map time series to feature space, and finally uses local outlier factor to detect abnormal pattern in this feature space. Experiments on synthetic and real data show that the definition of pattern outlier is reasonable and this algorithm is efficient to detect outliers in WSN.
1886
Abstract: Building Information Modeling is another important computer application technology in the field of building after the CAD computer-aided design technology appearance. BIM modeling using information technology to greatly improve the degree of integration of information, which makes the quality and efficiency of the design and the whole items greatly improved. Its greatest value is reflected in the three-dimensional design technology and collaborative design, which bring huge benefits for the development of the interior design industry. Besides, it completely changed the traditional design patterns, letting the two-dimensional drawings into intuitive and accurate BIM model data. BIM technology new design pattern, design process and efficient design changes for the quality and construction of interior design provides a reasonable and scientific decision-making.
1890
Abstract: Recently the BIM concept that all professionals carry out collaborative work among domains and departments in the industry has attracted more and more attention by research scholars and engineers around the world. The core of the BIM technology is the information sharing and exchanging among the life cycle. In view of this key problem, this article introduces the situation of the BIM research and development in domestic and overseas, and indicates that there are several common problems existing in the BIM development, such as, the information of multiple projects cannot be stored in a centralized database; the information is lost or incorrect when importing and exporting IFC model files with popular BIM software; the application software based on BIM technology is quite few, etc. The paper points out that the realization of BIM technology shall be based on the BIM database which is based on IFC standard. After that, this paper discusses how to build the BIM database based on IFC standard, the application interface of BIM database, the function of budgetary estimates and the transplantation of structural model conversion to BIM database. Then, a few examples are given to demonstrate the feasibility and reliability of the BIM database and corresponding applications developed in this research. As a result, it is concluded that the IFC based on BIM database is the foundation of developing building collaborative platform and digital city.
1894
Abstract: How to build a data warehouse and data mining is constantly worth exploring and optimization, not only technically, in commercial applications as well. This article discusses the introduction of new technologies and concepts, the traditional method of data warehouse technology has changed dramatically, based on data warehouse applications are a new development. Each enterprise data warehouse based on the characteristics of different companies, you can use a very flexible method of selection and design selection, implementation. According to some relatively new technical features, talk about data warehousing and data mining architecture.
1898

Showing 431 to 440 of 1117 Paper Titles