Applied Mechanics and Materials
Vols. 212-213
Vols. 212-213
Applied Mechanics and Materials
Vols. 209-211
Vols. 209-211
Applied Mechanics and Materials
Vols. 204-208
Vols. 204-208
Applied Mechanics and Materials
Vol. 203
Vol. 203
Applied Mechanics and Materials
Vols. 201-202
Vols. 201-202
Applied Mechanics and Materials
Vol. 200
Vol. 200
Applied Mechanics and Materials
Vols. 198-199
Vols. 198-199
Applied Mechanics and Materials
Vol. 197
Vol. 197
Applied Mechanics and Materials
Vols. 195-196
Vols. 195-196
Applied Mechanics and Materials
Vols. 193-194
Vols. 193-194
Applied Mechanics and Materials
Vol. 192
Vol. 192
Applied Mechanics and Materials
Vols. 190-191
Vols. 190-191
Applied Mechanics and Materials
Vol. 189
Vol. 189
Applied Mechanics and Materials Vols. 198-199
Paper Title Page
Abstract: Cloud computing is one of the hottest topics of IT research and industry because of its easy usage and flexible payment. At present, many researchers and projects focus on improving the efficiency and performance of cloud computing. Few researchers have recognized the importance the evaluation of cloud computing and started to investigate the evaluation methods. This paper first surveys research papers and technology reports about cloud computing evaluation. Then the characteristics and influential factors of cloud computing are analyzed. Some important unsolved issues of cloud computing evaluation are proposed. Finally, this paper gives some advice and points out future open problems of evaluation.
396
Abstract: For a graph G(V,E),then is called k-adjacent strong edge coloring of G, is abbreviated k-ASEC, if a k-ASEC of G satisfies then f is called k-equitable adjacent strong edge coloring of G, is called k-EASC for short, and is called the equitable adjacent strong edge chromatic number of G. In this paper, we have proved the equitable adjacent strong edge chromatic number of graph K(n,m) , with n≥ 2,n≡0(mod 2), m≥ 1.
402
Abstract: This paper expounds the basic thought of highway maintain information system,analyzes the advantage of application of WebGIS technology to highway maintaint information system.Base on ArcGis,the system can integrate highway’s graphics,attribute,text and image into the database and complete visible managemen.So it can effectually improve the highway maintenance efficienc and sustain for the decision.
407
Abstract: A rain fading mitigation technique, called Adaptive Coding and Modulation (ACM), is supported by the DVB-S2 standard. But the number of Coding and Modulation Schemes is over dimensioned. It is shown that by a careful selection of the ACM schemes, with one fourth of the total number of schemes, it is possible to get performance close to the optimum, but with a much lower terminal complexity.
411
Abstract: This paper first introduces the definition of cloud security, then analyzes security research status, finally puts forward to three-layer security solutions in Cloud Computing.
415
Abstract: Neighbourhood Preserving Embedding (NPE) is a novel subspace learning algorithm, which aims at preserving the local neighbourhood structure on the data manifold and is a linear approximation to Locally Linear Embedding (LLE). However, in typical image recognition in 1D vectors space, where the number of data samples is smaller than the dimension of data space, suffering from the singularity problem of matrix, NPE algorithm cannot be implemented directly. In this paper, we investigate NPE directly on image matrix for image recognition. The proposed two-dimensional neighbourhood preserving embedding (2DNPE) and bilateral two-dimensional neighbourhood preserving embedding (B2DNPE) algorithms are all based directly on 2D image matrices rather than on 1D vectors as NPE does, thus the problem of singularity confronted in 1D case is overcome. 2DNPE performs compression only in row direction, while B2DNPE performs compression both in row and in column direction. The relation of them to 2DLPP (B2DLPP) are also presented. The proposed algorithms are evaluated on ORL face database and handwritten digits database.
420
Abstract: Paper, bar-code labels common in the market is unable to meet the needs of efficiency and information visualization on modern society. When identifying or checking the information of the device, the traditional method of recording information is too cumbersome. It will result in unnecessary waste and cannot guarantee the correct rate. To use RFID to record and query device information, it will significantly improve system efficiency and accuracy. Information management system based on RFID equipment consist of three parts, including electronic tags, mobile handsets, fixed background management system. Vendors of background management system can write information to the tag for uniform coding.
426
Abstract: As the current personalized recommendation methods of Internet bookstore are limited too much in function, this paper proposes a kind of Internet bookstore data mining method based on “Strategic”, which can provide personalized recommendations that they really want. It helps us to get the weight attribute of type of book by using AHP, the weight attributes spoken on behalf of its owner, and we add it in association rules. The experimental results indicate that the Internet bookstore recommendation method is feasible.
431
Abstract: This paper first analyzes the security issues that are hidden in the public Cloud Computing environments, then puts forward to the corresponding solutions of various security issues, and lastly summarizes the importance of choosing suitable cloud service for enterprises.
435
Abstract: For low effectiveness and passiveness of current monitoring of domestic web-servers, this paper presents a design of web-server monitoring system based on ACE framework, which combines with government’s website approve , and gives a detailed statement of the design of the network transmission sub-system and the choice of non-blocking I/O model based on ACE framework.
439