Information Technology for Manufacturing Systems

Volumes 20-23

doi: 10.4028/www.scientific.net/AMM.20-23

Paper Title Page

Authors: Hua Xiao Liu, Ying Jin
Abstract: Model Carrying Code(MCC) provides a way to safe execution of untrusted code by taking both mobile code producer and consumers into consideration, where it checks mobile code security by comparing security related program behavior model with security policies. In this paper an enumeration based algorithm to checking security related behavior with respect to security policy has been given, where security behavior has been modeled as extended context free grammar and the security policy has been specified as extended FSA. Solutions to dealing with loops and recursions have been introduced. A program has been developed for implementing the algorithm, and several experiments have been done. It has been indicated that our algorithm can effectively check small scale security behavior models on the basis of simple security policies.
808
Authors: Xue Qing Ji
Abstract: From several basic frameworks wireless network system, a new type of system framework was designed. Its conformation of optics system and achievement by module were described particularly through using Fresnel lens system. This system’s link could be transformed between directed LOS link and non-directed LOS link, which made the system communicate at a high-speed when there were no barriers between the emitter and receiver and keep a good convexity when barriers appeared. At last what should be noted for the analogue simulation was brought up.
814
Authors: Ke Fan Xie, Qian Wu, Yun Chen
Abstract: Developing modern logistics is a vital road for realizing successful manufacturing enterprises. This paper analyzes three principles of process reengineering of manufacturing logistics: economy principle, agility principle, and synergy principle. Afterwards, the paper takes Dongfeng Automotive Fasteners Limited Corporation(DAFLC, a son company of Dongfeng Automobile Co. Ltd) as a case to analyze the routes of the process reengineering of manufacturing logistics. Based on the three principles, the process reengineering of the purchasing process, distribution process, and storage process of DAFLC achieves distinctive effect.
820
Authors: Shan Shan Zhang, Chang An Zhu, Jing Shu Wang, Li Ting Sun
Abstract: Based on data from internet, investigation was conducted to verify the relationship between the ratio of fake parts and the number of automobile holdings. A complete information game was modeled to reveal the impact of piracy on product life cycle of automobile parts. Numerical analysis showed that automobile manufacturers, threatened by piracy, may get maximum profits by appropriate regenerating key parts.
826
Authors: Ou Yang Yi
Abstract: This video image of static background frame and deduction, the pixel, pixels for sports change monitoring and static pixels. By combining the feature of deformation of human body positioning movement of template, the human body pose detection algorithm put in spatio-temporal detection to human pose recognition using feature matching, accelerate matching speed probability. This method in the testing result is superior to other pose recognition algorithm, and also has the ability to quickly identify.
833
Authors: Wen Huan Chien, Li Chen, Chih Chiang Wei, Hsun Hsin Hsu, Tai Sheng Wang
Abstract: This paper proposes a back-propagated network (BPN) and applies it to estimate the slump flow of high-performance concrete (HPC). HPC is a highly complex material whose behavior is difficult to model, especially slump flow. Slump flow estimation is a function of the content of all concrete ingredients, including cement, fly ash, blast furnace slag, water, superplasticizer, and coarse and fine aggregate. BPN is a well-known method, used to automatically discover the complex relationships among nonlinear systems. The results show that BPN predicts the slump flow of HPC with satisfyied estimating errors.
838
Authors: Fan Wang, Guo Zhen Tan, Chao Deng
Abstract: Accurate traffic flow forecasting is crucial to the development of intelligent transportation systems and advanced traveler information systems. Since Support Vector Machine (SVM)have better generalization performance and can guarantee global minima for given training data, it is believed that SVR is an effective method in traffic flow forecasting. But with the sharp increment of traffic data, traditional serial SVM can not meet the real-time requirements of traffic flow forecasting. Parallel processing has been proved to be a good method to reduce training time. In this paper, we adopt a parallel sequential minimal optimization (Parallel SMO) method to train SVM in multiple processors. Our experimental and analytical results demonstrate this model can reduce training time, enhance speed-up ratio and efficiency and better satisfy the real-time demands of traffic flow forecasting.
843
Authors: Yuan Quan Shi, Tao Li, Wen Chen, Rui Rui Zhang
Abstract: To effectively prevent large-scale network security attacks, a novel Predication Approach for Network Security Situation inspired by Immunity (PANSSI) is proposed. In this predication approach, the concepts and formal definitions of antigen and antibody in the network security situation predication domain are given; meanwhile, the mathematical models of some antibody evolution operators being related to PANSSI are exhibited. By analyzing time series and computing the affinity between antigen and antibody in artificial immune system, network security situation predication model is established, and then the future situation of network security attacks is predicted by it. Experimental results prove that PANSSI can forecast the future network security situation real-timely and correctly, and provides a novel approach for network security situation predication.
849
Authors: Chun Mei Zong, Hong Bin Wang, Xue Juan Du
Abstract: The paper first displays the feature of food, then points out the significance of putting into practice the Customer Relationship Management and supply chain administration in selling management, thereby draws out data mining. Finally, the paper describes the application of data mining in food.
856
Authors: Xiao Hua Zou
Abstract: It is proposed to get the fundamental theory of intelligent information processing with combining natural language understanding and computational intelligence. Considering applied fields on intelligent classification, indexing, retrieval, abstract and machine translation, natural language understanding can provide theoretical framework and computational intelligence will give technical realization.
861

Showing 141 to 150 of 263 Paper Titles