Papers by Keyword: Network

Paper TitlePage

Authors: Ke Jun Zhang, Wu Xu
Abstract: Due to fast development of information technology, the form of human war is changing from mechanization war to information war. Fire control system should be built from the platform-centric warfare into the network-centric warfare. With the widely use of big fire control, information war in future will greatly improve overall combat ability. This paper introduces the composition and principle of big fire control and its influence on operation efficiency of weapon system. From characteristics of operation war, the status and function of big fire control in future war are analyzed.
Authors: Ying Jun Jin, Tie Jun Wang
Abstract: The objective of the work is to numerically study the meso-scale deformation of amorphous glassy polymer. A molecular polymerization algorithm is employed to generate three-dimensional (3D) random networks of polymer, in which the micro-parameters and meso-structures, such as entanglement point, sliding point, etc. are considered. Then, 3D unit cell model and finite element method are used to calculate the stress and deformation relations of polymer. The evolution of meso-structure of glassy polymer with deformation is obtained simultaneously. Further, variation of the orientation of polymer chain with deformation was quantitatively studied.
Authors: Guo Hua Xu, Kun Yu, Xiong Shen
Abstract: In order to boost the reliability of a floating TUV system, the research represents the central control system to be a Depth-setting TUV control system based RS-485 network. The paper will show the three aspect technology of this RS-485 network. According to the characteristics of the RS-485 network, the control architecture, the hardware structure and the communication protocol of this distribution system will be illustrated in the passage. Then, the passage will published the material object of the floating TUV. Given the experiment method and conclusion, it proves the distributed system is more stability, reliable, fast in response than ever in the last part.
Authors: Lu Hai Mei
Abstract: In order to promote the development and application of family intelligent network technology, in this paper, a design of intelligent family network based on distributed control system is introduced. The network communication and control structure of systems makes use of a distributed control system, the gateway makes use of construction of embedded systems, remote control design makes use of browser/server to achieve. The programming provides stronger advancement, creation, flexibility and reliability with great research significance and application value.
Authors: Guo Gang Li, Tao Feng, Guo Qiang Li, Hua Wang
Abstract: The traditional semantic network retrieval has the following two urgent problems to be solved . The first problem is that the two concepts on the surface look very relevant, but vocabulary used to describe the two concepts has no contact, and in fact ,the two concepts are very poorly correlated. The second problem is that the two concepts on the surface do not seem related, but many words used to describe the two concepts have the same or related aspects, and the two concepts actually have great correlation. We call the two kinds of phenomena misjudge of the relationship between the two concepts. The retrieval mechanism studied in this paper aims to synthesize direct relations and internal relations between concepts, and to establish a higher intelligent double semantic network retrieval of concept network and sememe network.
Authors: Peng Wang, Yan Lv, Yu Tan
Abstract: According to advantages and disadvantages of the traditional data center network structure ,this paper propose a new data center network structure base on BCube and DCell. The new structure is mainly improved based on the scalability, fault tolerance, the throughput
Authors: Zheng Dong Li, Qiang Guo, Yin Xu He, Ke Tu, Yi Wei
Abstract: Gas monitor system based on wireless sensor network technology and ZigBee overtakes the limitation of traditional system that the situation in mine is unknown in time. With this system, the security manager can real-time monitor the gas density of multi-location .Compared with traditional system, this system is portable and extensible and it also has advantage of physical size and power consumption. This paper describes both the whole system architecture and the structure of single node. The results show that the system is safe, stable and guarantee the security of miners.
Authors: Fu Li Xie, Guang Quan Cheng
Abstract: With the development of network science, the link prediction problem has attracted more and more attention. Among which, link prediction methods based on similarity has been most widely studied. Previous methods depicting similarity of nodes mainly consider their common neighbors. But in this paper, from the view of network environment of nodes, which is to analysis the links around the pair of nodes, derive nodes similarity through that of links, a new way to solve the link prediction problem is provided. This paper establishes a link prediction model based on similarity between links, presents the LE index. Finally, the LE index is tested on five real datasets, and compared with existing similarity-based link prediction methods, the experimental results show that LE index can achieve good prediction accuracy, especially outperforms the other methods in the Yeast network.
Authors: Wen Bo Zhen
Abstract: This paper puts forward a network anti-interference method based on multi-state hidden layers' distribution with iterations. It first calculates the distribution characteristics of multi-state data, and analyzes the law of network data; secondly, statistically analyzes the distribution of multi-state hidden layers, introduces constant iterations and update, and extracts system noise characteristics; then separates noise and network data, so as to implement anti-interference; finally carries out experiments with a set of test data in the actual network, and the results show that under strong interference, network anti-interference method based on multi-state hidden layers' distribution with iterations effectively reduces the network error rate, basically does not affect the normal communication, and has a good application value.
Authors: Zu Qiang Meng, Shi Mo Shen, Qiu Lian Chen
Abstract: Text clustering is one of the most popular topic detection techniques. However, the existing text clustering approaches require that each document has to be partitioned to one and only one cluster. This is not reasonable in some cases for there exist some documents which should not used to constitute topics. This paper firstly models a text document set as a network and designs a method for decomposing such a network, and then proposes a truly original text clustering algorithm for topic detection, called a network decomposition-based text clustering algorithm for topic detection (NDTCATD). The proposed algorithm ensures that meaningless documents can not be used to constitute topics. Experimental results show that NDTCATD is much better than bisecting k-means algorithm in terms of overall similarity and average cluster similarity. Therefore the proposed algorithm is reasonable and effective and is especially suitable for topic detection.
Showing 1 to 10 of 233 Paper Titles