Applied Mechanics and Materials
Vol. 187
Vol. 187
Applied Mechanics and Materials
Vol. 186
Vol. 186
Applied Mechanics and Materials
Vols. 184-185
Vols. 184-185
Applied Mechanics and Materials
Vols. 182-183
Vols. 182-183
Applied Mechanics and Materials
Vols. 178-181
Vols. 178-181
Applied Mechanics and Materials
Vols. 174-177
Vols. 174-177
Applied Mechanics and Materials
Vols. 170-173
Vols. 170-173
Applied Mechanics and Materials
Vols. 166-169
Vols. 166-169
Applied Mechanics and Materials
Vol. 165
Vol. 165
Applied Mechanics and Materials
Vol. 164
Vol. 164
Applied Mechanics and Materials
Vol. 163
Vol. 163
Applied Mechanics and Materials
Vol. 162
Vol. 162
Applied Mechanics and Materials
Vol. 161
Vol. 161
Applied Mechanics and Materials Vols. 170-173
Paper Title Page
Abstract: TBM is a modern machine used in the underground engineering. This machine excavates tunnel with the cutters arranged on its cutter head. The research of the cutter-rock interaction is an important work in improving the machine's behaviour. A simulation of the interaction is presented in this paper. The effects of the rake angle, blade angle and cutting depth on cutter force and crack number in rock are discussed, which provide a complement to the cutter-rock interaction research.
3385
Abstract: Regional sharing in electronic medical records (EMR) system are the main problems that the system must face in the development. This paper comprehensive analyzes the existing secure sharing program of EMR, and based on it this paper proposes the program that uses the Trusted Computing technology to ensure the secure sharing of EMR. For ordinary computer can not build trusted computing platform, the embedded trusted system based on the USB interface is used to build trusted computing platform, and based on it this paper proposes the EMR secure sharing scheme based on the embedded trusted system.
3390
Abstract: RFID anti-collision method based on particle swarm optimization and support vector machine is presented in the paper. Support vector machine is a new detection technology,which is applied to RFID anti-collision detection. Particle swarm optimization algorithm is applied to choose the appropriate parameters of support vector machine. Particle swarm optimization algorithm can make the particle move toward the optimal resolution based on the history best experiences of each particle and global best position in swarm.The proposed RFID anti-collision structure is mainly composed of protocol processing module, interface module, RFID anti-collision method and serial-parallel conversion.The testing results show that RFID collision detection accuracy of particle swarm optimization and support vector machine than that of traditional support vector machine and BP neural network.
3398
Abstract: A coupling modeling method with ANSYS/FLAC3D is put forward aiming at the technical difficulties and deficiencies in pre-processing for complex geologic body and structural engineering with FLAC3D. The coupling procedure is that, firstly, the three-dimension geometry model is built with ANSYS and the model meshes are divided. And secondly, the element and node data of the completed model built in ANSYS are exported. Based on the corresponding relationship of element and node between ANSYS and FLAC3D, the exported data above is transformed by using the interface program in FORTRAN, then the information is imported into FLAC3D. Thus the three-dimension FLAC3D model for complex engineering is generated coupling with ANSYS. With coupling method, the complex three-dimension model of arch dam-foundation system in large-scale hydroelectric project is built, and the results verify the feasibility and effectiveness of the proposed method.
3402
Abstract: The leak of coal gas and natural gas sometimes cause explosive accidents, which is great threat to people’s lives and property. In order to avoid similar disasters, we have designed a small portable alarm circuit which uses gas sensors as the main component to monitor the methane concentration. Different from former alarming devices, the design uses a SCM to sample three same sensor circuits. Once the density is exceeded, the SCM immediately drives the following alarm device to alarm, which can make up for the shortcoming of a single sensor.
3406
Abstract: Downbursts have led to large number of transmission tower failures in the world, so more and more wind engineers are very interested in such strong wind load. Currently the main numerical simulation method of downburst wind load for structural analysis is based on the horizontal divergent wind speed profile of downburst. There have been several available types of empirical wind speed profiles in which some parameters still need to be artificially determined. So, this is a semi-empirical-analytical method which can not be linked with actual downbursts. Some academics have also used CFD numerical method to simulate downburst wind speed profile of high precision grid. But the initial conditions of these CFD simulations were all assumed ideally. In this paper, the wind speed profiles of an actual downburst are simulated by CFD method based on the initial speed of downdraft entrance provided by cloud model. The simulated wind speed profile decays more slowly than an empirical wind speed profile. This conclusion could be of significance for structural engineers to consider downburst wind load reasonably in the structural wind resistant design.
3411
Abstract: The deployable structure of the ring truss have advantage properties, which can be used as an effective supporting structure of deployable antenna. The deployable experiment of ring truss antenna showed that there was asynchronous phenomenon at the course of the deployment. Dynamics theory including constraint equations and considering friction factor are built firstly. Then simulation is studied systematically for the deployment process of ring truss deployable antenna. At last, the conclusions are obtained that the friction insulted in tensile forces of the cable drive decrease and the asynchronous phenomenon in the process of the deployment. It will give some help to the design and manufacture of the ring truss antenna.
3415
Abstract: This study presented Computational Fluid Dynamic (CFD) analysis of the effect of co-firing coal blended with biomass, which is saw dust here. This complex problem which is because of its turbulent on the chemical reactions has been simulated in this paper for the purpose to decline the large amount of cost of doing experiment. The CFD analysis includes the prediction of vectors of the gas phase and DPM burnout result alike. What’s more, the reduction of CO2 by coal blended with different proportions of biomass has been presented because of low content of char in biomass. The mathematical models consist of models for turbulence flow(RNG K-EPSILON MODEL);non-premixed model with two mixture fractions/PDF model; and radiation (P-1 radiation model). The coal is from An Qin in China, and then respectively blended with 5% and 10% saw dust for co-combustion.
3419
Abstract: Sensor nodes may be deployed in hostile environments, and the sensed data is sent to the destination along the routing path, if a forwarding node in the routing path is compromised by the adversary, the data can not arrive at the destination. There are many studies on detection of malicious or compromised node, and remove the compromised nodes form the routing path, but, efficient, reliable, and secure broadcast are the major problems of the schemes. In this paper, we propose a novel secure data transport scheme for wireless sensor networks. The proposed scheme divide the secure data into n shares pair using Asmuth-Bloom threshold secret sharing scheme, and forwarded the n shares pair along the multi-path to the base station, the base station only receives k distinct shares pair from the n shares pair, he can obtain the secure data. The proposed protocol can resist selective forwarding attack, false data injection attack, replay attack, and even if there are compromised nodes in some routing paths, the base station can still get the correct secure data without removing the compromised nodes from the routing paths.
3425
Abstract: As the living quality of the citizens gradually improved, traveling becomes an important recreational activity. The internet speedily provides information related to tour sites. However, web pages generally present merely words and pictures that are not impressive enough to the viewers. Spatial concepts, distance calculation, and tools for vacation planning are also often not provided by the websites. This study combines the usage of 3dSpace, GoogleMap, ER Model, Windows Mobile, SuperPad. It gathers the tour-sites related information of HsinChu city; such as local restaurants, famous attractions, and high rating hotels in the area. The study develops search interface integrated with the Google Map Engine. After selecting of category and input of specific key words, the related information of specific location and 360° satellite image could be shown on browser. The route calculation trips between local attractions is provided on this project. This investigation combines the GPS function to the smart phone, helping the users to arrive at their destination correctly within the minimum time.
3431