Applied Mechanics and Materials
Vols. 275-277
Vols. 275-277
Applied Mechanics and Materials
Vol. 274
Vol. 274
Applied Mechanics and Materials
Vol. 273
Vol. 273
Applied Mechanics and Materials
Vols. 271-272
Vols. 271-272
Applied Mechanics and Materials
Vols. 268-270
Vols. 268-270
Applied Mechanics and Materials
Vol. 267
Vol. 267
Applied Mechanics and Materials
Vols. 263-266
Vols. 263-266
Applied Mechanics and Materials
Vol. 262
Vol. 262
Applied Mechanics and Materials
Vols. 260-261
Vols. 260-261
Applied Mechanics and Materials
Vols. 256-259
Vols. 256-259
Applied Mechanics and Materials
Vols. 253-255
Vols. 253-255
Applied Mechanics and Materials
Vol. 252
Vol. 252
Applied Mechanics and Materials
Vol. 251
Vol. 251
Applied Mechanics and Materials Vols. 263-266
Paper Title Page
Abstract: By applying the Matlab software ,the Lohmann Ⅲ and Burch encoding method are used to achieve the Fourier transform hologram respectively. The computer simulation reconstruction of the hologram is achieved. The characteristic of the Lohmann Ⅲ and Burch encoding method are discussed.
1568
Abstract: This paper explains “five senses and six feelings” theory in traditional culture, also shows useful thoughts of practice of interaction design and methods to integrate Chinese traditional culture spirits into it, which provides useful reference for designers.
1574
Abstract: Uncertain relational data management has been investigated for a few years, but few works on uncertain XML. The natural structures with high flexibility make XML more appropriate for representing uncertain information. Based on the semantic of possible world and probabilistic models with independent distribution and mutual exclusive distribution nodes, the problem of how to generate instance from a probabilistic XML and calculate its probability was studied, which is one of the key problems of uncertain XML management. Moreover, an algorithm for a generating XML document from a probabilistic XML and calculating its probability are also proposed, which has linear time complexity. Finally, experiment results are made to show up the correct and efficiency of the algorithm.
1578
Abstract: Access control is an important infrastructure of an information system. Role-Based Access Control (RBAC) model is the main-stream access control model. When deploying a RBAC model, there is an administration iteration problem which needs the information engineers to define the administrator structure before running the RBAC model, which make the deploying process redundancy and complex, make the running process rigid, and result in decrease of control capability of RBAC model. We present a top-down method. In this method, we define the administration authority as the source of management authority and set up the right and liability mechanism of RBAC. By this method, the administrator structure will be defined and expanded by administrators according to application requirements, and the right and liability mechanism can make sure these administrators should perform their management authorities responsibly and legally. Our method can solve the administration iteration problem and improve the flexibility of RBAC model.
1584
Abstract: To solve resource-tagging inefficiency and low-precision retrieval in special field, an analysis method of tag semantic relevancy based on controlled database was proposed. The characteristic of special field and building method for controlled database were discussed. Domain ontology correlation calculation method was used to get semantic correlation. The tag semantic similarity calculation method was developed for semantic similarity, and normalization was used to increase the similarity accuracy. With semantic correlation and similarity as parameters, the semantic relevancy in special field can be obtained. This method was used successfully in the special field of actual projects, improved resource-tagging and retrieval efficiency.
1588
Abstract: Cloned code might exacerbate a system maintenance problem, so it is important to remove duplicate code to improve system performance. In web development, script code can often be duplicated as a unit of a script function. Previous research for detecting similar script functions forecasted candidates of similar script functions based on the name of the function and classified the detected candidates into four similarity levels by comparing factors contained within the script functions. There are two key issues that need to be considered to detect similar script functions when using that method. One was that a pair of similar script functions needs to have the same name to be detected. The other was that some modifications particularly such as adding or removing calling statements were not identified after detecting. Adding or removing calling statements might prevent identification for duplicate script function. In this paper, we propose a novel approach to detect similar script functions that can determine the similarity of a script function by evaluating the structural similarity of function code and the calling structure. The evaluation for detecting the structural similarity of code and the calling structure is performed based on a similarity metric, FSIM, which we have defined. We showed the usefulness of FSIM by applying it to three open source projects.
1593
Abstract: Role-Based Access Control (RBAC) model is the main-stream access control model. When addressing large-scale and distributed application, the highest Security Administrator(SA) of RBAC model always try to transfer his management authority to his inferior SAs to decrease his workload. However, How to ensure that these inferior SAs perform their management authorities legally is a big problem. Although there are a technology framework of administrative RBAC model, named ARBAC97, the supervise mechanism and audit mechanism on the utilization of transferred authorities is incomplete in RBAC model. In this research, an audit-integrated ARBAC (au-ARBAC) model is presented. In the au-ARBAC model, a right and liability mechanism has been set up, an audit role is defined and auditing permission is assigned to this role. At the same time, we put forwards two types basic audit business: routine audit and accident audit. As to accident audit, a decision process for division of responsibility is designed to clarify the responsibility of wrongdoer SAs. The Au-ARBAC model can help to improve the Consciousness of authorization responsibility and to perform their management authorities responsibly and legally.
1600
Abstract: The triangulation of convex hull has the characteristics of point-set and polygon triangulation. According to some relative definitions, this paper proposed a triangulation of convex hull based on a monotonic chain. This method is better than Delaunay algorithm and is more efficient than other convex polygon algorithms. It is a good algorithm.
1605
Abstract: The Vehicle Routing Problem (VRP) is an important problem occurring in many distribution systems, which is also defined as a family of different versions such as the Capacitated Vehicle Routing Problem (CVRP) and the Vehicle Routing Problem with Time Windows (VRPTW). The Ant Colony Optimization (ACO) is a metaheuristic for combinatorial optimization problems. Given the ACO inadequacy, the vehicle routing optimization model is improved and the transfer of the algorithm in corresponding rules and the trajectory updated regulations is reset in this paper, which is called the Improved Ant Colony Optimization (I-ACO). Compared to the calculated results with genetic algorithm (GA) and particle swarm optimization (PSO), the correctness of the model and algorithm is verified. Experimental results show that the I-ACO can quickly and effectively obtain the optimal solution of VRFTW.
1609
Abstract: It is an efficient way to represent three-dimensional objects by octree.The traditional structure of pointer -based octree representation has several shortcomings,such as requiring large memory,missing relationship between two nodes,etc.Based on analyzing the space Iayout and the configuration of octree,this paper presents an improved octree for 3D representation.From the experimental results for 3D reconstruction of medical images,we can see the proposed method is superior to the traditional method in terms of the storing structure and visiting way,etc.
1614