Information Technology for Manufacturing Systems III

Volumes 6-7

doi: 10.4028/www.scientific.net/AEF.6-7

Paper Title Page

Authors: Yu Gao, Xiang Zhong Feng
Abstract: It is an important prerequisite to ensure the success of software development that designing a reasonable and suitable software development plan. In the past, when discussing the design of the software development plan, people focus limited to a specific development tasks, so the lack of universality. In order to guide design work of software development plan, starting from the perspective of software engineering, the main factor to be considered has been studied when designing software development plan. These factors are: the type and size of the software, the experience of use for reference to predecessors, difficulty level to obtain users' needs, development techniques and tools, situation of development team, development risks, the software development methods that can be chosen. This study results can improve the rationality and applicability of the software development plan.
3
Authors: Yu Gao, Xiang Zhong Feng
Abstract: In software engineering field, it is an important study topic that building more suitable and effective development method. Although there are many type of traditional development methods, and in past development activities they achieved great success, but they lack "flexibility". With the complexity and variability gradually increased in software development process, due to the lack of "flexibility", the ability of traditional development methods will be restricted. In order to enhance the ability of development method, concept of "flexibility" development method has been proposed, and some problems related to "flexibility" development method have been discussed. Such as that: some factors making the "flexibility" development method to appear, some technology related to "flexibility" development method, some strategy constructing "flexibility" development method, future development trends. Through these discussions, study work of software engineering theory is promoted.
9
Authors: De Ren Yang, Min Liu, Zhao Hua Gu
Abstract: The sequence diagram can be used to design object-oriented software; however, its modeling principles are lack of research. In this paper, its application in software design was studied, and its inherent linkage with object-oriented programming was discussed, and the interactive mechanism among its elements was explored. The modeling principles for it were proposed; and its application in Model Driven Architecture (MDA) software paradigm was analyzed; and finally the model represented with it, especially the transformation and traceability of models in MDA software paradigm were analyzed. This research is useful to optimize software modeling and to automate model transformation in MDA software paradigm.
15
Authors: Yu Feng Guo
Abstract: Power problem has been one of most restricting the development barriers of processor. With enhancing of computer performance, there must be large cache to hide memory latency. Large cache can be consisted on one chip based eDRAM which has high density. Unfortunately, eDRAM must be refreshed frequently to maintain data, which would increase cache power. The paper aims at refresh problem of eDRAM, and put forwards a data drivered refresh with multi-bit error-correcting power optimize method. The experimental results show that the method which we put forward can greatly reduce the refresh power of eDRAM.
20
Authors: Xu Hui Chen, Jia Chen, Ping Zhu
Abstract: Windows CE API interception technology can be used for monitoring various system services calls such as file systems, registry. API interception has a very important role on the Windows CE system software debugging and performance analysis. This paper introduces the main methods of the Windows CE API interception, discusses a number of key technologies involved, how to use these methods flexible, and gives a practical example.
26
Authors: Wen Hua Qian, Dan Xu, Kun Yue, Zheng Guan, Yuan Yuan Pu
Abstract: To provide with an effective technique for non-photorealistic rendering for computer generated images with artistic appearances from 2D images motivates our work in this paper. The methods proposed in this paper are inspired by the image deviation mapping constructed from a single texture background image. We establish our method for obtaining artistic appearances taking the deviation mapping as the underlying basis. Based on the simple linear filtering convolution operation, which is well suited of progressive coarsening of images and for detail extraction, and the image’s detail, such as edge and tone can be preserved in the final artistic appearance. This method has the exact computational complexity, and this technique is easily to implement and the rendering speed is fast.
32
Authors: Guo Yan Zhang
Abstract: Attribute-based encryption scheme is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Similar with identity-based encryption scheme, attribute-based schemes are also confronted with key escrow problem. Furthermore, the attributes belonging to a user usually are monitored by different authorities. This paper resolves the two problems by using a general attribute-based encryption scheme and K-Sibling intractable function families. In our construction, different attributes sets of a user are still certified by different authorities, but the partial private keys corresponding to the attributes are generated by a central authority. Simultineously, different authorities jointly generate the users’ secret value which cannot be obtained by the central authority. Compared with general multi-authourity attributed-based encryption scheme, our approach has more efficiency.
38
Authors: Cheng Wang, Qing Zhang, Jian Ping Gan
Abstract: In this paper, the problem of stability analysis of uncertain distributed time-delay systems is investigated. Systems with norm-bounded parameter uncertainties are considered. By taking suitable Lyapunov-Krasovskii functional and free weighting matrices, a delay-dependent sufficient condition is derived in terms of linear matrix inequality (LMI). The condition obtained in this paper can be tested numerically very efficiently using interior point algorithms.
45
Authors: Huan Bin Liu
Abstract: Recurrent event data is a kind of important incomplete data existed in survival analysis, biological medicine research, reliability life test and other practical problems. This paper presents an additive-accelerated mean regression model for multiple type recurrent events data, and gives the estimation methods of unknown parameter and non-parameter function. Specially, the asymptotic properties of parameters estimation are proved.
49

Showing 1 to 10 of 218 Paper Titles