Applied Mechanics and Materials
Vol. 289
Vol. 289
Applied Mechanics and Materials
Vol. 288
Vol. 288
Applied Mechanics and Materials
Vols. 284-287
Vols. 284-287
Applied Mechanics and Materials
Vol. 283
Vol. 283
Applied Mechanics and Materials
Vol. 282
Vol. 282
Applied Mechanics and Materials
Vol. 281
Vol. 281
Applied Mechanics and Materials
Vols. 278-280
Vols. 278-280
Applied Mechanics and Materials
Vols. 275-277
Vols. 275-277
Applied Mechanics and Materials
Vol. 274
Vol. 274
Applied Mechanics and Materials
Vol. 273
Vol. 273
Applied Mechanics and Materials
Vols. 271-272
Vols. 271-272
Applied Mechanics and Materials
Vols. 268-270
Vols. 268-270
Applied Mechanics and Materials
Vol. 267
Vol. 267
Applied Mechanics and Materials Vols. 278-280
Paper Title Page
Abstract: In order to meet the market demand for carpet sampling, designed a NC control system by analyzing the working principle of Axminster loom, the upper computer program could extract, analyze and process the pixel information from image and to communicate with the lower system instantaneity via Ethernet and send the information of the picture to the lower system. The lower system combines with the Servo control and motion control program, making each part of the system move precisely and coordinately. The system can make carpet sample more efficiently with high quality. The result showed that this control system has practical application value.
1737
Abstract: In this paper, we study a stochastic recursive optimal control problem in which the system is governed by a forward-backward stochastic differential equation. Under mild assumptions, a classical stochastic verification theorem is derived.
1742
Abstract: It had not been explored which real-time magnitude can meet the requirement of the simulation object in computer simulation system. Taking time delay into consideration, the influence of time delay on the stability of the low-altitude and low-speed small Unmanned Aircraft Systems (UAS) flight control system had been analyzed and the real-time magnitude of the miniature hardware-in-loop (HIL) simulation system was determined. Then a miniature HIL simulation system of the UAS flight control system was designed to prove the real-time magnitude feasibility. The result shows the real-time magnitude by time delay analysis can meet the requirements of flight control system.
1746
Abstract: To simplify the wiring harness of automotive body control system, the functional requirements of automotive door locks, window lifters, rearview mirrors, trunk lock, and lights were analyzed, and an architecture of automotive body electronic control system was put forward based on CAN bus technology. The application layer protocol referring SAE J1939 protocol specification was defined. And the door lock system was modeled and simulated as an example by using CANoe. The simulation results show that the proposed architecture of automotive body electronic control system works well, and the reliability of automotive body control system can be improved and the automotive weight and cost can be reduced.
1754
Abstract: This paper reports about the design and modeling process of high performance servo-actuated mechanisms for automatic machines. Besides being a delicate and time consuming process, coupled simulations based on virtual prototyping finally offer the chance to integrate engineering methods proper of control system engineering and mechanical design. In particular, the main target of this work is to investigate how different virtual prototyping approaches, each having increasing level of detail, can contribute to the appropriate prediction of the expected machine performance. These results are then compared with experimental data obtained on a real servomechanism prototype. The comparison quantitatively demonstrate the improvement on torque prediction and position error reduction when detailed models of the controller and the electric motor dynamics are coupled with the mechanical system model.
1758
Abstract: Cloud computing has been a hot researching area of computer network technology, since it was proposed in 2007. Cloud computing also has been envisioned as the next-generation architecture of IT Enterprise [1]. Cloud computing infrastructures enable companies to cut costs by outsourcing computations on-demand. It moves the application software and database to the large data centers, where the management of the data and services may not be fully trustworthy [2]. This poses many new security challenges. In this paper, we just focus on data storage security in the cloud, which has been the most important aspect of quality of service. To ensure the confidentiality and integrity of user’s data in the cloud, and support of data dynamic operations, such as modification, insertion and deletion, we propose a framework for storage security, which includes cryptographic storage scheme and data structure. With our framework, the untrusted server cannot learn anything about the plaintext, and the dynamic operation can be finished in short time. The encryption algorithm and data storage structure is simple, and it’s easy to maintain. Hence, our framework is practical to use today.
1767
Abstract: Trust management is one of the most challenging issues in the emerging cloud computing. A distributed way is adopted to manage and store trust feedbacks data. We propose a credibility-based trust management model that not only distinguishes between credible trust feedbacks, but also has the ability to detect the malicious trust feedbacks from attackers .On this basis, we also present a replication determination model that dynamically decides the optimal replica number of the trust management service so that the trust management service can be always maintained at a desired availability level. The research results have been validated by experimental results.
1771
Abstract: This paper proposed a new model of computer Go based on patterns and designed CGML (a new markup language based on XML)for computer Go, and applied the G/S cloud for computer Go for the first time. Connection relations (patterns) were used to construct basic model of Go. This new idea was an ideal and practical solution to the problem of computer Go.
1779
Abstract: 1PB or more of the data has been the concern of the reliability of the data in large data warehouses. It strongly depends on many interdependent system parameters, such as the replica placement policy, the number of nodes and Previous work has substantially and respectively discussed the individual effects of these parameters, and rarely provide its optimum value, there is no mention of their optimal combination. In this paper, we propose a new object-based repair Markov model. The analysis of this model based on three popular replica placement strategy, we calculate the personal best value of these parameters in the first, then work out the best combination of GA. Compared with the existing models, our model is easier to solve, and to achieve a more comprehensive and practical conclusions.
1783
Abstract: As important evidences and clue sources in computer crime investigation, the information of user activity plays an important role in the aspect of revealing detail of offender’s operation. The specific keys of registry in RAM are related to specific user activity. The structures of registry in RAM are different from in disk, especially in the aspect of cell index translation. Based on analysis of data structure for registry in RAM, this paper introduces the technology of cell index translation in detail. Also summarizes the keys closely related to user activity, and illustrates the method of analysis of user activity based on registry in RAM with real case. The method is proved to be accurate and efficient in real work of digital investigation.
1787