Applied Mechanics and Materials
Vol. 252
Vol. 252
Applied Mechanics and Materials
Vol. 251
Vol. 251
Applied Mechanics and Materials
Vols. 249-250
Vols. 249-250
Applied Mechanics and Materials
Vol. 248
Vol. 248
Applied Mechanics and Materials
Vols. 246-247
Vols. 246-247
Applied Mechanics and Materials
Vol. 245
Vol. 245
Applied Mechanics and Materials
Vols. 241-244
Vols. 241-244
Applied Mechanics and Materials
Vols. 239-240
Vols. 239-240
Applied Mechanics and Materials
Vol. 238
Vol. 238
Applied Mechanics and Materials
Vols. 236-237
Vols. 236-237
Applied Mechanics and Materials
Vol. 235
Vol. 235
Applied Mechanics and Materials
Vol. 234
Vol. 234
Applied Mechanics and Materials
Vol. 233
Vol. 233
Applied Mechanics and Materials Vols. 241-244
Paper Title Page
Abstract: By Introducing the Norm || .||and Two Parameters α ,λ, we Give a Multiple Hard|y-Hilbert Type Integral Ineλquality with a Best Possible Constant Factor.
2783
Abstract: This paper summarizes and classifies some common algorithms to calculate the gravitational potential around irregular non-spherical bodies after reading and collecting a given mass of literatures. Then we proceed to introduce analytical and numerical methods to compute the potential at external points for irregular bodies and special for homogeneous tri-axial ellipsoid. Analytical methods include spherical and ellipsoidal harmonics, Ivory’s approach, finite analytical formulations, numerical methods include polyhedron, mascons approach. The advantages, disadvantages and applications are compared.
2787
Abstract: After analyzing the functional requirements, a development model of the pager component based on characteristics of Facelets composite component is proposed. In the model, an auxiliary object and a managed bean are introduced to support the rendering of the pager component and the data table component respectively. Inheritance relationships between the managed bean and the auxiliary object reflect inner relationships between the pager component and the data table component, which can improve independence of the pager component and reduce the difficulty to develop. Finally, the implementation technology and the usage of the pager component are presented. Its effectiveness, applicability and ease of use are demonstrated by practical applications.
2792
Abstract: Designing large service systems out of reusable components has become increasingly popular. However the existing large-grained component in the enterprise service system are hard to satisfy the requirements of efficient reuse and development. For the strengths of configuration techniques, this paper proposes a optimal configuration methodology framework of multi-granularity components based on stable service chain. Firstly, the stable service chain is established to select heterogeneous service components, in which service system is decomposed into fictional Integrated Stable Points (ISP) according to stability and variability of business model; Then, Large-grained component is selected to be a stable service function, and small size components are combined to achieve variable services, based on which, the corresponding component sequences for each ISP are selected with the characteristic mapping strategy. Finally, this method was validated by the construction practice of product application service system in Sichuan Truck Manufacture Plant Co., Ltd.
2797
Abstract: This paper defined the hereditary property (or constant property) concerning graph operation, and discussed various forms of the hereditary property under the circumstance of Cartesian product graph operation. The main conclusions include: The non-planarity and Hamiltonicity of graph are hereditary concerning the Cartesian product, but planarity of graph is not, Euler characteristic and non-hamiltonicity of graph are not hereditary as well. Therefore, when we applied this principle into practice, we testified that Hamilton cycle does exist in hypercube.
2802
Abstract: This paper is about visualizing tree structured data. In particular, the emphasis is on visualizing the similarities and differences between pairs of trees. The impetus for the work comes from the field of bioinformatics, where biologists construct complex phylogenetic trees to represent the evolution of species or genes. The two main issues that arise when comparing these data is to know how to efficiently and effectively compare phylogenetic trees, and how to visually present the results of the comparison. The primary approach is to present a new framework for tree structure visualization techniques that will display pairs of trees “face to face” with leaf nodes aligned. The results show that a combination of automatic and manual rearrangement is often effective in rapidly generating an arrangement that facilitates tree comparison, even for quite large trees.
2807
Abstract: Storage for XML is a main research of Native XML database. Native XML Database has many different physical storage patterns, and their corresponding storage models are different. Based on defining the conceptions of Native XML Database, storage tactics and storage model, the paper describe the storage model based on object oriented database.
2812
Abstract: With the emergence and development of data applications such as database and data mining, how to protect data privacy and prevent disclosure of sensitive information has become one of the major challenges we are facing now. Privacy protection technologies need to protect data privacy without compromising data applications. The research results of privacy protection field are summarized, and the basic principles and features of various types of privacy protection technologies are described. After the in-depth analysis and comparison of existing technologies, this paper points out the future direction of the privacy protection technology.
2816
Abstract: The management of user permissions is one of the basic functions of a database system.Firstly,the common database system user access control methods and their characteristics are explored;Secondly,a general role permission management method based on menu items is proposed,then the design of the tables,the design and implementation of the menu item visiting class,and the design and implementation of a window using a tree-view to set role permissions were given;Finally,introduced the application of this method in database systems with an open computer-room management system.
2822
Abstract: In recent years, affected by increasing enrollment and decreasing source of students, civil universities faced much more serious tribulation on source problem than before. In civil universities, low register rate influences their current living situation directly. The most important issue to civil universities is how to orientate source of students exactly and how to publicize their enrolment advertisements. C4.5 algorithm in Data Mining can analyze current situation about source problem of civil universities, obtaining common feature of civil universities’ source and provides evidences for enrollment admissions.
2827