Applied Mechanics and Materials Vols. 268-270

Paper Title Page

Abstract: For the problem of trust chain of Trusted Computing Group (TCG), which only measures static integrity to the system resources, we extend the TCG chain to the software application layer and propose to extract return addresses of functions in call stacks dynamically for obtaining system call short sequences as software behavior and By monitoring softare behavior based on SVM,we realize software trusted dynamic measurement.
1869
Abstract: To prevent three dimension applications developed using jMonkey Engine from being pirated, a robust software watermarking algorithm was proposed. A watermark based on an initial sequence of scene-graph-traversal was embedded into the software by a numbering system. Since the initial sequence was a very important clue for extracting the embedded watermark, it should be only known by the owner. Furthermore, the algorithm for embedding and extracting the watermark was discussed. Analysis shows that the new method is more robust. And it enjoys the advantage that the size of scene graph does not be changed.
1873
Abstract: Software reliability assessment plays an important role in the software reliability engineering, but the traditional software assessment method mostly focuses on evaluation by use of failure data which is gained only after testing or usage in the late phase of the software life cycle. Thus people hope to get every stage’s information about the software’s reliability which is taken as the reference or accordance to guide the software’s design, analysis and testing and so on. The correlative factors of various products, processes and resources in the whole software life cycle have a very important effect on software reliability and, uncertainty exists in the software reliability evaluation to some extent. Fuzzy evaluation has a strong applicability for solving the fuzzy problem and an approach for software reliability qualitative evaluation based on fuzzy evaluation was proposed in this paper. Firstly the rationale and process of this method were described in detail, then a case study was implemented. The experimental results showed that the approach was feasible and effective.
1877
Abstract: In this paper, the southwest forest area of China is chosen for the study area. This paper uses the first and second channel of MODIS L1B data which is been preprocessed as scaling, geometry correction and so on, for computing NDVI. The pretreatments are aimed at removing the effects from atmosphere, sensor and so on. Then we build NDVI time series for years based on MVC arithmetic. After that we build polynomial forest growth predicting model and Gauss-Newton forest growth predicting model for predicting the forest growth of study area. Meanwhile, this paper experiments the two models with real data for predicting the forest growth of the study area. The result shows that using MODIS-NDVI time series and mathematical method to build predicting models of forest growth is feasible.
1882
Abstract: A local radial point interpolation method is employed to the simulation of the time dependent Schrödinger equation with arbitrary potential function. Local weak form of the time dependent Schrödinger equation is obtained and radial point interpolation shape functions are applied in the space discretization. Computations are carried out for an example of time dependent Schrödinger equation having analytical solutions. Numerical results agreed with analytical solutions very well.
1888
Abstract: In view of roadway complex spatial relationships, the lack of visual expression in the mine water prevention and control work, this paper gives the water irruption flooding spread generation algorithm. Based on building tree topology from water inrush starting point extension and simulating of water down to spread and water level to rise, the algorithm generates flooding route and establishes water inrush 3D simulation system. It provides scientific basis for developing disaster relief route optimization and emergency rescue decision-making.
1894
Abstract: In China, more and more enterprises have noticed the importance of informationization, and they performed as main body in informationization of manufacturing industry. Problems of information service system for manufacturing industry include government failure, market failure, mixed function of government and enterprise, authentication system and technology standard scarcity, and professional expert scarcity and low capacity. So the mission of information service system building in manufacturing industry include to establish technology service standard system, regulation and institution, establish networking and collaborating resource allocation system, set up market entry certification system, establish industry association, build human resource training system, and mix Chinese culture and western culture.
1898
Abstract: Perceived work environment in coal mine is part of the intelligent management of modern mine. Based on the existing backbone network, combined with the Internet of Things technologies, the architecture and functionality of the downhole monitoring system are presented. Hardware design of sensors and the principle of downhole location are analyzed. Describe the system features of anti-interference, higher warning level, high work efficiency. For receiving the data of downhole environment and location of workers, managers can carry out intelligent management and decision-making in emergency rescue and production decisions.
1902
Abstract: Electrical impedance tomography (EIT) imaging is a new kind of imaging technology that has developed in recent years. This technology has many advantages such as noninvasive, small volume and so on, but there are also many shortcomings such as imaging quality is not high, in order to improve the image quality, image processing methods is used in this paper. Significant different with the traditional method, empirical mode decomposition method does not require any prior basis function. It is an adaptive time-frequency analysis method. The two-dimensional empirical mode decomposition algorithm is adopted to process EIT images in this paper, and the compactly supported radial basis function interpolation algorithm is used for the post-processing of three organic glass rod EIT imaging. The image is decomposed into six IMFs in the experiment, some IMFs contain useful information, and the rest of them contains a lot of noise. The experimental results show that this method can significantly improve the EIT image quality.
1906
Abstract: In three-dimensional wireless sensor networks, a topology with higher node degrees usually has many routes that consume less energy, but it increases the traffic load of the whole network. Therefore, the trade-off is between the node degree and the energy efficiency. In view of this question, this paper presents the definition and property of 3D r-neighbourhood graph, and uses the graph to balance the node degree and the energy efficiency of the whole network. This algorithm named NGTC, and it can adjust the structure of the networks to be a perfect state. Finally, the simulation results prove the advantage of this algorithm.
1910

Showing 381 to 390 of 428 Paper Titles