Abstract: Model Carrying Code(MCC) provides a way to safe execution of untrusted code by
taking both mobile code producer and consumers into consideration, where it checks mobile code
security by comparing security related program behavior model with security policies. In this paper
an enumeration based algorithm to checking security related behavior with respect to security
policy has been given, where security behavior has been modeled as extended context free grammar
and the security policy has been specified as extended FSA. Solutions to dealing with loops and
recursions have been introduced. A program has been developed for implementing the algorithm,
and several experiments have been done. It has been indicated that our algorithm can effectively
check small scale security behavior models on the basis of simple security policies.
Abstract: From several basic frameworks wireless network system, a new type of system framework was designed. Its conformation of optics system and achievement by module were described particularly through using Fresnel lens system. This system’s link could be transformed between directed LOS link and non-directed LOS link, which made the system communicate at a high-speed when there were no barriers between the emitter and receiver and keep a good convexity when barriers appeared. At last what should be noted for the analogue simulation was brought up.
Abstract: Developing modern logistics is a vital road for realizing successful
manufacturing enterprises. This paper analyzes three principles of process
reengineering of manufacturing logistics: economy principle, agility principle, and
synergy principle. Afterwards, the paper takes Dongfeng Automotive Fasteners
Limited Corporation(DAFLC, a son company of Dongfeng Automobile Co. Ltd) as a
case to analyze the routes of the process reengineering of manufacturing logistics.
Based on the three principles, the process reengineering of the purchasing process,
distribution process, and storage process of DAFLC achieves distinctive effect.
Abstract: Based on data from internet, investigation was conducted to verify the relationship between the ratio of fake parts and the number of automobile holdings. A complete information game was modeled to reveal the impact of piracy on product life cycle of automobile parts. Numerical analysis showed that automobile manufacturers, threatened by piracy, may get maximum profits by appropriate regenerating key parts.
Abstract: This video image of static background frame and deduction, the pixel, pixels for sports change monitoring and static pixels. By combining the feature of deformation of human body positioning movement of template, the human body pose detection algorithm put in spatio-temporal detection to human pose recognition using feature matching, accelerate matching speed probability. This method in the testing result is superior to other pose recognition algorithm, and also has the ability to quickly identify.
Abstract: This paper proposes a back-propagated network (BPN) and applies it to estimate the slump flow of high-performance concrete (HPC). HPC is a highly complex material whose behavior is difficult to model, especially slump flow. Slump flow estimation is a function of the content of all concrete ingredients, including cement, fly ash, blast furnace slag, water, superplasticizer, and coarse and fine aggregate. BPN is a well-known method, used to automatically discover the complex relationships among nonlinear systems. The results show that BPN predicts the slump flow of HPC with satisfyied estimating errors.
Abstract: Accurate traffic flow forecasting is crucial to the development of intelligent transportation systems and advanced traveler information systems. Since Support Vector Machine (SVM)have better generalization performance and can guarantee global minima for given training data, it is believed that SVR is an effective method in traffic flow forecasting. But with the sharp increment of traffic data, traditional serial SVM can not meet the real-time requirements of traffic flow forecasting. Parallel processing has been proved to be a good method to reduce training time. In this paper, we adopt a parallel sequential minimal optimization (Parallel SMO) method to train SVM in multiple processors. Our experimental and analytical results demonstrate this model can reduce training time, enhance speed-up ratio and efficiency and better satisfy the real-time demands of traffic flow forecasting.
Abstract: To effectively prevent large-scale network security attacks, a novel Predication Approach
for Network Security Situation inspired by Immunity (PANSSI) is proposed. In this predication
approach, the concepts and formal definitions of antigen and antibody in the network security
situation predication domain are given; meanwhile, the mathematical models of some antibody
evolution operators being related to PANSSI are exhibited. By analyzing time series and computing
the affinity between antigen and antibody in artificial immune system, network security situation
predication model is established, and then the future situation of network security attacks is predicted
by it. Experimental results prove that PANSSI can forecast the future network security situation
real-timely and correctly, and provides a novel approach for network security situation predication.
Abstract: The paper first displays the feature of food, then points out the significance of putting
into practice the Customer Relationship Management and supply chain administration in selling
management, thereby draws out data mining. Finally, the paper describes the application of data
mining in food.
Abstract: It is proposed to get the fundamental theory of intelligent information processing with combining natural language understanding and computational intelligence. Considering applied fields on intelligent classification, indexing, retrieval, abstract and machine translation, natural language understanding can provide theoretical framework and computational intelligence will give technical realization.