Advanced Materials Research Vols. 989-994

Paper Title Page

Abstract: Retracted paper: The refinement of gigabit switches is an unproven challenge. In fact, few biologists would disagree with the refinement of lambda calculus, which embodies the intuitive principles of networking. We explore a novel framework for the synthesis of the producer-consumer problem (TACKY), which we use to show that the foremost cooperative algorithm for the synthesis of operating systems by Sun et al. is Turing complete.
2093
Abstract: In order to satisfy the calculation requirements of nuclear power plant operating in different conditions, the integration and combination of reactor core computation modules have been proposed. By writing logical language instructions, and then read by interpreter, the engineering designers can make grammatical analysis, lexical analysis, semantic analysis and information extraction. In Linux system environment, the interpreter can fulfill computational tasks based on the actual operating parameters of nuclear power plant. The comparison results indicate that the calculated results obtained by the interpreter language are correct. Therefore, it also demonstrates that the interpreter language is valid.
2097
Abstract: Process mining allows for the automated discovery of process models from event logs. These models provide insights and enable various types of model-based analysis. Now many scholars have made a great contribution on predicting the completion time of running instances and a lot of algorithms have been proposed, but they mostly ignored concept drift which means the influence of the external factors. In order to improve the accuracy of the prediction, we take the concept drift into account. We do cluster analysis on the annotated transition system. Experiments show that our algorithm has a considerable degree of improvement over the previous.
2101
Abstract: SBN(Series Bayesian Network) model and constructing algorithm of BN are introduced, and advantages and disadvantages of constructing SBN with MEBN(multi-entity Bayesian networks) are pointed out. Aiming at the demands of constructing SBN, expression of Markov MFrag (MEBN Fragment) within MEBN system is clarified, and probability mapping pseudo MFrags are added, then SBN constructing algorithm based on Markov extended MEBN system is studied and the constructing procedures are illuminated by an example.
2106
Abstract: Mobile Cloud Computing utilizes cloud computing in the mobile internet. It takes the advantage of portability of mobile devices, and uses cloud computing to make up mobile devices' shortcomings, i.e., the capabilities of computation and storage. With the advent of cloud computing, more and more IT companies establish their own cloud computing platforms by using Hadoop, which gradually makes Hadoop a distributed cloud computing platform. By considering important attributes of mobile devices, e.g., low computation workload, high concurrency, and high real-time demand, we propose in this paper a local scheduling algorithm which is based on Hadoop mobile cloud computing, and we analyze the influence of response time and throughput on the system utility.
2111
Abstract: The 21st century is an information age. Now information technology is playing a more and more important role in the reform and development of our country’s education. At present cloud computing and ubiquitous learning are the two hotly-discussed topics in our educational field. The excellent opening and sharing functions of cloud computing lay a good foundation for the development of ubiquitous English learning. This paper defines cloud computing and ubiquitous learning, and researches the ubiquitous English learning based on cloud computing.
2115
Abstract: In order to overcome the defects and limitations of the application of HMM in voice recognition, neural network is introduced into voice recognition. Also the model theory of the neural network and its characteristics are also considered in the paper’s study which mainly focuses on the application of neural network in voice recognition. Based on studies of BP neural network, the paper establishes the voice recognition model and algorithm for the recognition of isolated words under MATLAB environment, and elaborates on the specific process of realization and the results of the simulation experiment.
2119
Abstract: Although the parallelization KNN algorithm improves the classification efficiency of the algorithm, the calculation of the parallel algorithms increases with the increasing of the training sample data scale, affecting the classification efficiency of the algorithm. Aiming at this shortage, this paper will improve the original parallelization KNN algorithm in the MapReduce model, adding the text pretreatment process to improve the classification efficiency of the algorithm.
2123
Abstract: The issue on finding an effective evaluation method on software structural stability is rarely touched upon in software security research. An assessment method of software microstructural stability was developed by Khalil in 2002. A new evaluation method on software structural stability is proposed in this paper, which is based on Motifs according to the theory of complex networks. Average shortest path length comparison and clustering coefficient with degree distribution are used in the method, in which the key evaluation indexes are used to analyze software structural stability. The comparison experiments have been done between the proposed method and Khalil’s method. 10 real software systems of different sizes and types are selected in the experiments to verify the proposed evaluation method. The result shows that the proposed method is correct and effective.
2128
Abstract: This paper studies the locating method for character 2D barcode. In this kind of character 2d barcode, the solid circle is designed as the position detection patterns. The locating method for character 2D barcode is different with the traditional method for DM barcode. In this paper, according to the geometric characteristics of the solid circle, connected region regarded as suspected solid circle can be filtered through the cross method rapidly. Then the edge of connected area is detected through the shape angle and the solid circle can be found through the circularity values. Experiment results show that this method can locate the character 2D barcode rapidly and effectively.
2135

Showing 481 to 490 of 1293 Paper Titles