Filters
Large-Scale Shopping Mall Architectural Design Based on Intelligent BIM Technology

Article | 2022 | Security and Communication Networks2022

In this paper, limit analysis method and limit analysis finite element method are used to study the stability of large-scale shopping mall building structure. Moreover, this paper combines data analysis to verify the algorithm analysis process of this paper and uses statistical methods to verify that the algorithm proposed in this paper is applicable to the architectural design of large shopping malls. Furthermore, this work uses BIM and finite element technologies to test the usefulness of this strategy by simulating the shopping mall design process. The experimental research shows that the large-scale shopping mall architectural d . . .esign model proposed in this paper, which is based on intelligent BIM technology, has a good large-scale shopping mall architectural design effect as well as a large-scale shopping mall architectural structure analysis effect More less

Application of Virtual Reality Technology in Visual Optimization of Product Appearance Design

Article | 2022 | Security and Communication Networks2022

Virtual reality technology is used in this research to perform an in-depth investigation and the analysis of visual optimization of product appearance design, as well as to adapt evolving technology to practical design. The breadth of virtual display technology may be further investigated, and software abilities can be enhanced by studying the virtual display of intelligent goods. The performance indicators of the product may be exhibited in an all-around manner via the virtual display, giving customers an intuitive experience and thereby stimulating consumers' desire to purchase. To achieve the research objectives of this paper, we . . . first researched the professional positions of designers, operators, and product planners in related industries, and used the survey analysis method to compile valid data from the research results. And we conducted research and analysis on consumers of different age levels to derive different functional requirements of wearable products for different age levels, and compare and analyze the advantages and shortcomings of various types of smart wearable products in terms of their product presentation. The method refers to the product appearance design, making the product's functional attributes, user emotions, and other factors as the starting point, and taking the visual effect of color as the center of the design scheme conception, the designer first conceives the visual effect of color to meet the requirements of function and structure, constructs a three-dimensional form that echoes it, and then explores the comprehensive effect of color and form, and further considers and designs the color, material, and so on from the perspective of users, product function, and structure. Then, we explore the comprehensive effect of color and form, and further think and design color and form from the perspective of users, product function, structure, and material, and finally get the color and form matching and reasonable product appearance. This design method can break through the limitation of filling colors with shapes and design a new, individual, and emotional product image More less

Internet of Things Application of Intelligent and Innovative Learning Strategies in the Higher English Education System

Article | 2022 | Security and Communication Networks2022

In order to improve the effect of higher English teaching, this paper builds a higher English education system based on Internet of Things technology. The optimization aim of this study is to provide an online DRX parameter optimization technique that is compatible with the RRC protocol architecture. This work employs algorithms based on reinforcement learning to accomplish parameter optimization and dynamic control by selecting optimal DRX parameters and dynamically configuring them via decision-making processes. Furthermore, this article enhances the Internet of Things algorithm and applies it to the higher English education syste . . .m that this study constructs. Furthermore, this study combines the real demands to develop the functional structure module of the higher English education system, constructs the higher English education system based on the Internet of Things system, and tests the performance of the system constructed in this paper. Finally, the system structure performance verification is carried out through mathematical statistics. The research results show that the system constructed in this paper has a good teaching effect More less

Harr-NMF Feature Extraction for Multilevel Educational Technology Teaching Big Data System

Article | 2022 | Security and Communication Networks2022

An essential role in improving educational informatization and encouraging new approaches to education is played by educational technology, a specialist field that supports both theorising and doing in this area. When it comes to learning educational technology, students must have excellent professional knowledge and abilities, as well as a thorough understanding of data. Harr-NMF feature extraction for educational technology teaching large data systems is the focus of this project. With the help of big data technology, the construction of a teaching resource sharing system provides useful solutions for the storage and sharing of cu . . .rrent and future massive teaching resources, enables fast and accurate analysis and retrieval of massive teaching resources and data, improves the security and scalability of the system while maintaining system stability, and promotes education teaching informatization to a new level. The system can be used to analyze and retrieve data quickly and accurately. By mapping different types of Harr-NMF features into a gradient matrix using grayscale projection, pattern classification is performed through the simplified gradient matrix as features. The algorithm complexity of feature extraction is eventually reduced to a great extent by the fast advantage of feature extraction by this algorithm. The Harr-NMF algorithm and the similarity relation matrix are used to obtain the optimal parameter values and the corresponding affiliation matrix and class centers, thus providing effective initial values for Harr-NMF, which effectively solves the problems of slow convergence and easy to fall into local minima of the Harr-NMF algorithm. The algorithm of this paper is compared with several improved algorithms of Harr-NMF in terms of convergence, recognition rate, and other performance to verify the feasibility and effectiveness of this paper. With a combination of qualitative and quantitative approaches, the data literacy of teaching educational technology is dissected and constructed to enhance its data literacy and improve the quality of education technology discipline personnel training More less

Image Recognition about Stability of Soft Surrounding Rock in Tunnel Based on ILBP Algorithm

Article | 2022 | Security and Communication Networks2022

With China's fast expansion of urban traffic and railway engineering, a great number of subway and railway lines have been erected in subterranean tunnels in recent years. When the tunnel is in the process of construction, it will encounter the weak fracture zone, and the surrounding rock of this part of the tunnel is often poor stability and deformation is difficult to control, which will lead to the smooth progress of the project, delay and other problems. Therefore, to facilitate the timely treatment of tunnel soft surrounding rock, the study of image recognition of its stability is particularly important. Based on this, an impro . . .ved local binary mode algorithm (ILBP) is proposed in this paper. By adjusting the weight of binary polynomial in local binary mode (LBP) operator, the target of ILBP is to extract the characteristics of weak surrounding rock of tunnel at a specific location, hoping to provide reference for the follow-up study of tunnel engineering More less

Our obligations and policy regarding cookies are subject to the TR Law on the Protection of Personal Data No. 6698.
OK

creativecommons
Bu site altında yer alan tüm kaynaklar Creative Commons Alıntı-GayriTicari-Türetilemez 4.0 Uluslararası Lisansı ile lisanslanmıştır.
Platforms