Applied Mechanics and Materials Vol. 197

Paper Title Page

Abstract: Taking minimum compliance of the whole structure as the objective, the mathematical optimization model of multi-loading cases topology optimization is constructed by using the weight compromise programming method to coordinate the multiple objective functions. The optimal topology of the work flat is obtained using Hyperworks/Optistruct software and geometric model is reconstructed. The static analysis of original and reconstructed structural models of the work flat show that the optimized structure can not only decrease the weight, but also improve the stiffness and reduce the stress. The work flat will be more safe and reliable than before.
614
Abstract: The reverse engineering general with coordinate measuring machine or 3D scanner realize the parts digital,and the measuring equipment is very expensive which limit the reverse engineering application. To solve this problem, this paper uses the higher precision walking mechanism of numerical control machine, adds the special online probe to compose a digital measuring equipment ;it uses the CAD sketch model to drive, which researches the basic representation method of the path information,the distribution form of the measuring point in the different characteristic element,the distinction between the measuring point,the attribution rules and the derived form of the path information of the measuring point. It also includes the development of dedicated reverse soft and the automatic generation of the measuring program reverser path. This method provide a new low cost reverse engineering means which decrease measured data and simplify the reverse engineering.
619
Abstract: The use of smart device is very increasing at recent. PC and Internet was main computing environment in existing but devices such as smart-phone and Tablet are dashing recently. But, serious security problem will happen because anyone is not providing security service for smart device. We wish to propose system that offers confidentiality, integrity service in smart device using AES-256 and MD-5. And after pass through certification process about device and user, wish to propose system that apply PEKS technology so that can simplify certification formality about service. AESSUHEA may offer various security services that confidentiality and integrity. And it support certification service easily and conveniently to smart device.
624
Abstract: A modified multi-phase-field model for regenerating a homogeneous polycrystalline microstructure was presented. An extra term was introduced to the original formula by Steinbach et al. by assuming that the stability of every grain constituting the microstructure depends on the grain size distribution. The effect of the term on the obtained microstructure was then verified by numerical simulations, and it was found that a homogeneous microstructure having nearly the same shape and size was generated. The influence of the parameter was also investigated, and it revealed that the parameter was dominative on the grain size at the steady state.
628
Abstract: This paper deals with representation of scientific references’ data and visual analysis of this data using web based scientific reference management software. The Reference application, is a web based reference management software, that enables easy administration and management of authors and scientific references. Similar web based reference management systems additionally support advanced tools for data visualization and exploration but the downside of this solutions is that they require installation of additional plugins due to the fact that visualization within the web browsers requires advanced graphics capabilities thus limiting the usability of these applications. The Reference application on the other hand introduces a solution for data visualization and exploration that relies on extensive usage of the latest HTML5 web standard featuring support for rich graphic intensive web applications hence forcing maximum usability and compatibility with the modern web browsers. This paper describes the visualization tool within Reference application, its implementation and functionalities.
633
Abstract: For explicating the underlying linking mechanism between IT investment and firm performance, this paper develops a framework to examine the influence factors of IT payoff efficiency. From a process-oriented perspective, the study measured the IT investment efficiency using continuous data from 485 Chinese enterprises in 2006-2008. The result shows that only 11.03% of total samples are effective based on data envelopment analysis(DEA). So it suggests that a majority of firms can achieve differential performance over competitors by improving the organization’s capacity to absorb IT. And then some main factors that affect technical efficiency were identified using classification and regression trees(CART) method. The results indicate the influence factors including enterprises’ scale, strategic IT planning and density of trade’s fund. The interaction of information system application and training density positive influences IT investment efficiency. Possibility for future research can keep on in these areas.
638
Abstract: In this paper the application spectrum of wireless ad hoc network is a typical battle field monitoring system for the public safety purpose and military sector where the sensor network simulator architecture is used to provide support for sensing capabilities in network nodes for different mobility conditions. Rayleigh and Rician fading (K=3) model is used for the effect of channel fading in the network scenario. The channel fading incurs extra network overhead in the PHY, MAC and Network layer. A comprehensive study on the performance of ad hoc network routing protocols under realistic network scenarios with the effect of channel fading models is presented.
643
Abstract: Internet of things applications using RFID sensors are a challenging task due to the limited capacity of batteries. Thus, energy efficient updating and maintenance have become more critical design with RFID sensor network. This paper is dedicated to combine energy harvesting and maintenance, sensor network, and resource discovery to develop a rechargeable sensor energy maintenance scheme. To deal with key sensor nodes and low energy path maintenance, the proposed approach consists of the following:(1)key point energy maintenance for RFID sensor through multi-path similarity analysis;(2)path energy maintenance for RFID sink through energy resource discovery. Use case application and simulation results show that the proposed methods reduce key sensor nodes energy maintenance time and energy maintenance path length for sensor nodes energy updating and maintenance.
649
Abstract: The construction industry has characterized the fragmentation features including the multiple construction phases and multidisciplinary participants. The advances of BIM concepts and technologies give the construction industry a powerful potential to improve the coordination and collaboration for the whole building lifecycle. This paper reports an on-going project that aims to develop a BIM and Mobile Computing supported collaborative system and discusses the key challenges for the implementation of BIM and Mobile Computing in the construction industry. This paper concludes with future development and validation of the system.
656
Abstract: Currently many new business models of tourism are emerging, which makes modern e-Tourism system more sophisticated and larger than before. However, most existing e-Tourism infrastructures have become very reluctant to meet these new rapidly increasing requirements because of lack in computing and storage flexibility. So this paper presents a promising open e-Tourism framework based on cloud computing which is able to provide elastic utilities and capabilities through virtualization of computing and storage resource. The system architecture and crucial design issues are discussed in the paper.
661

Showing 111 to 120 of 149 Paper Titles