Advanced Materials Research Vols. 926-930

Paper Title Page

Abstract: This paper adopts the Radial Basis Function (RBF) Neural Networks to conduct a spatial prediction on the mercury pollution situation of the Jiapigou gold mine area, locate the primary pollution sources, delineate the pollution area according to the mercury concentration data of 27 soil samples from this area, and draws the mercury concentration isoline with the gridded data. Compared with the methods in the past such as classical statistics and BP Neural Networks to analyse the soil pollution, this method presents advantages such as the quantification of the result, the explicitness of the pollution area, and the ability to explain the blind area of the samples.
2771
Abstract: The second-order Lobatto IIIA-IIIB symplectic partitioned RungeKutta (SPRK) method, combining with the first-order Mur absorbing boundary condition, is developed for the simulation of ground penetrating radar wave propagation in layered pavement structure. For 2-dimetional case, a significant advantage of this method is that only two functions need to be calculated at each time step. The total-field/scattered-field technique is used for plane wave excitation. Numerical examples are presented to verify the accuracy and efficiency of the proposed algorithm. The results illustrate that the reflected signal calculated by the SPRK method is in good agreement with that obtained using the finite difference time domain (FDTD) scheme, but the CPU time consumed by proposed algorithm is reduce about 20% of the FDTD scheme. In addition, an actual field test is conducted to evaluate the further performance of the SPRK method. It is found that the simulated waveform fits well with the measured signal in many aspects, especially in the peak amplitude and time delay.
2777
Abstract: In this paper, we present an approach to characterize and model microblog traffic in cellular data network. In contrast to previous methods, our approach is based on the cloud computing platform and the cluster system, including the Hadoop Distributed File System (HDFS) and the parallel processing software framework MapReduce. Whats more, we focus on the contrast of Sina and Tencent microblogs. We analyze the features of microblog traffic in four aspects of increasing details, which are (i) traffic diurnal pattern, (ii) modeling the traffic distribution, (iii) user distribution, (iv) diversity usage of microblogs. This approach of analyzing microblog traffic comprehensively is probably the most important contribution of this paper. Furthermore, our approach has two important features. First, the massive mobile subscriber data we used in our experiments was collected from a commercial Internet Service Provider (ISP) covering an entire province in Southern China. Therefore, it ensures the results indicate the true characteristics of microblog traffic in network. Second, we investigate that the microblog traffic fits with the power law distribution. We demonstrate the electiveness of our approach on three real datasets. Our results are important for cellular network operators to learn user behavior and optimize the future microblog application designs.
2781
Abstract: Data mining is a multidisciplinary field of the 20th century gradually, this paper based on data mining modeling, algorithms, applications and software tools were reviewed, the definition of data mining, the scope and characteristics of the data sets and data mining various practical situations; summarizes the data mining in the practical application of the basic steps and processes; data mining tasks in a variety of applications and modeling issues were discussed; cited the current field of data mining is mainly popular algorithms, and algorithm design issues to consider briefly analyzed; overview of the current data mining algorithm in a number of areas; more comprehensive description of the current performance and data mining software tools developer circumstances; Finally, the development of data mining prospects and direction prospected.
2786
Abstract: Multi-Agent System for task allocation problem, the introduction of game theory for dynamic task allocation modeling Multi-Agent Systems,Multi-Agent System proposed dynamic task allocation algorithm based on game theory.Experimental results show that the lower complexity of dynamic task allocation algorithm based on game theory in this article, the smaller amount of calculation,better robustness,task allocation scheme to obtain higher quality,with higher distribution
2790
Abstract: Based on the analyses of the recent routing research productions of the cognitive radio networks, this paper identifies five critical challenges on the routing research of CRN: neighbor discovery, deafness problem, neighbor disappearance, routing problem and cross2layer design, then some topics about common control channel ,path delay and the technical metrics are discussed from the view of research method, which must be considered on the routing research of CRN. After that,we summarize and analyze the scenario design patterns of routing research from four aspects: medium, channel, node and network; study and discuss the main research productions from the views of optimization scheme and routing topology algorithm/ protocol in detail at the end of this paper.
2795
Abstract: First analyzing the present of data integration, rising existing the issue, and then introducing the related technologies simplify, finally a model of Multi-data Integration Based on Lotus Domino is proposed, which can implement data integration well with cooperative work. The scheme avoids the shortcomings of the current data integration which use the features of CSCW platform of lotus domino. Practice shows that the model is feasibility and efficiency dealing with sharing problem distributed and heterogeneous data.
2799
Abstract: This paper probes into the properties common virus in computer lab, such as damage effect, communication mechanism and self-protection mechanism, and carries out the important referring materials for Systemic antivirus program of lab based on Restore & Protect Technology.
2803
Abstract: In order to spread across different locations, sharing of computer resources, and ease of use of idle CPU or storage space Resources, there is the concept of grid and grid computing. Data - intensive scientific and engineering applications ( such as seismic data Numerical Simulation of physics, computational mechanics, weather forecast ) needed in a wide area, quick and safe transmission in distributed computing environments Huge amounts of data. So how in a grid environment efficient, reliable, and secure transfer massive files are in the grid computing A study on the key issue. Design and realization of dynamic task assignment algorithm and Performance experiment of the system.
2807
Abstract: Cloud computing has offered a brand-new perspective to scalable, distributed computing, which allows significant reduction in IT costs and increase in capabilities. At the same time, however, due to the openness of accessible information relying on trust between cloud providers and customers, the problem of data security has been amplified under the cloud model. This paper investigates the security problem and some of the key challenges of implementing security solutions.
2811

Showing 651 to 660 of 1117 Paper Titles