Applied Mechanics and Materials
Vols. 143-144
Vols. 143-144
Applied Mechanics and Materials
Vol. 142
Vol. 142
Applied Mechanics and Materials
Vol. 141
Vol. 141
Applied Mechanics and Materials
Vol. 140
Vol. 140
Applied Mechanics and Materials
Vols. 138-139
Vols. 138-139
Applied Mechanics and Materials
Vol. 137
Vol. 137
Applied Mechanics and Materials
Vols. 135-136
Vols. 135-136
Applied Mechanics and Materials
Vols. 130-134
Vols. 130-134
Applied Mechanics and Materials
Vols. 128-129
Vols. 128-129
Applied Mechanics and Materials
Vol. 127
Vol. 127
Applied Mechanics and Materials
Vols. 121-126
Vols. 121-126
Applied Mechanics and Materials
Vol. 120
Vol. 120
Applied Mechanics and Materials
Vols. 117-119
Vols. 117-119
Applied Mechanics and Materials Vols. 135-136
Paper Title Page
Abstract: This paper proposes a novel clustering algorithm with the steady initial center based on the PAM algorithm. As the PAM algorithm arbitrarily chooses the initial centers, this new algorithm improves the location of the initial center, which makes the initial choice much closer to the data distribution. It also overcomes the blindness of generating initial central points. The experimental results show that this algorithm is effective which performs better in classification efficiency and quality, and it also decreases the number of iterations.
244
Abstract: Numeric scheme and numeric result was in this paper. First, We proposes a kind of explicit - implicit difference scheme to solve the initial and boundary value questions of the third order term of KDV equation here,and so we can solve the problem that the additional boundary values must be given first for present difference schemes when we try to realize the calculation by then., second, numeric experiment results was given ay the end of this article.
253
Abstract: After studying the advantages and disadvantages of existing wearable lower limb rehabilitation training robot product performance, by establishing human movement control model and the quadratic approximation formula, we designed a kind of control high-precision of lower limb rehabilitation training robots. The robot can simulate the normal actions as sitting, standing and walking for patients to take rehabilitation training. The structure of it is simple and reliable. And it is easily to be manufactured. The robot provides an ideal device for lower limb rehabilitation training
256
Abstract: This paper introduced the structure of Extended-Range Electric Vehicles as well as its characteristics. Principle researches have been offered on the parameters matching of the power-train and main components. Operating modes and control strategies were discussed, especially the two control strategies of charge sustaining mode which is shown as load following strategy and engine optimal strategy, and the effects of both control strategies are simulated and analyzed. The results indicate that the load following strategy can obviously extend battery’s lifespan, but the engine optimal strategy can reduce fuel consumption and emission effectively.
261
Abstract: There are lots of factors effect on weak gel flooding.This paper based on the conceptual model by changing the model parameters and using orthogonal design to analyze the effects of different factors on weak gel flooding. The descending order of influence is slug size, flooding time, oil-water viscosity ratio, permeability range, concentration of polymer, slug combination and polymer-cross linker ratio.
268
Abstract: As market competition intensifies, Price competition as the most common and effective way of market competition among operators is quite active. Used game theory, analysis price game and inter-enterprise competition by Bertrand model, and illustrated the importance of product differentiation and build the core competitiveness by case.
274
Abstract: M2M communications are capturing the attention of many stakeholders from application developers to mobile operators. Recent initiatives of the GSMA and of mobile operators show their interest in finding new sources of revenue through the adoption of wireless connectivity in a wide range of devices. This paper discusses the current and emerging value chain in the M2M industry. In addition, critical industry and value chain trends are presented, along with roles of MNOs in the evolving M2M industry.
279
Abstract: Unlike some earlier proxy re-encryption schemes, the LV08 scheme specifies a validity-checking process to guarantee that the received ciphertext is well-formed. In this paper, we clarify that the received message is well-formed is the premise to decryption in all encryption schemes. The underlying mechanism to keep the communicated message well-formed in encryption schemes is another topic. We will simplify the LV08 scheme and show its security level is the same as that of the AFGH05 scheme.
284
Abstract: In this paper, we analyze two ID-based authenticated key exchange (AKE) protocols in the eCK model. One is a two-party AKE protocol between members of distinct domains proposed by Xia et al. in 2009. The other is a dynamic group AKE protocol proposed by Xie et al. in 2010. The results of analysis show that both of them are insecure in the eCK model.
289
Abstract: By analyzing the oilfield wireless monitoring system, the paper puts forward an oilfield monitoring system framework based on ZigBee wireless sensor networks on basic of studying ZigBee standard communication protocol. Software and hardware of data acquisition and transmission are designed in this system. The fast network and wireless transmission are realized.
294