Applied Mechanics and Materials Vols. 284-287

Paper Title Page

Abstract: The construction of syntactic tree structures is vital to different Natural Language Processing applications. In the meanwhile, the use of monolingual or bilingual structures directly affects the quality of Machine Translation systems. However, manually annotated syntactic tree structures are not only considered as a time consuming task but also a very expensive work, and automatic construction approaches cannot always guarantee the quality of the syntactic trees. In this paper, a system for annotating and constructing synchronous grammar tree structures in a semi-automatic way is proposed. The system is built in the Web environment with a graphical display for users to review and modify alignment relationships between nodes of the tree and strings or trees of the other language. The core part relies on the parsing of Constraint Synchronous Grammar, and consists of several modules in establishing alignments at different levels between the languages, including relationships between syntactic tree and strings of the other language, and bilingual tree alignments. Moreover, it provides import functions in obtaining monolingual skeletal bracketing syntactic tree and Translation Corresponding Tree structures for the creation of synchronous rules in order to have wider applicability.
3357
Abstract: The research described in this article focuses on one important aspect of monitoring scientific and technological trends and tries to examine topics of research and trends in the photovoltaic field. The data used to examine the research and trends were scientific and technological literature published during the last five years, which were exhaustively collected from the two SCI journals that specialize in photovoltaic and solar energy research. In order to analyze the 2,031 academic papers colllected, text-mining was applied. As a result, research topics were identified through document clustering and classified through text categorization into four major subjects; ‘Cell’, ‘Module/Array’, ‘System’ and ‘Relative/Advanced.’
3362
Abstract: This paper develops a parallel and distributed evolutionary algorithm based on the cloud computing environment and feedback control algorithm to help planners solve the emergency logistic problems. The cloud environment is emulated and used as various virtual machines with different types of evolution procedures. To yield both exploration and exploitation, two crossover processes are deployed on different virtual machines. In the process of crossover, local optimal solutions can be competed and evaluated to form new populations so that the search space can be expanded and the advantaged crossover procedures can be further adopted. The proposed feedback control algorithm based on the evaluation of evolution algorithm can interact and emphasize the process with better performance. According to proposed feedback algorithm, virtual machines with different on demand formatted crossover algorithms can be dynamically established and adopted. Taking the advantage of cloud computing environment and the proposed feedback control algorithm of evolution algorithm, planners can take less effort on deploying both computation power and storage space. Also, it can further applied in various complicated applications more practically.
3370
Abstract: Most Web users today rely heavily on search engines to gather information. To achieve better search results, some algorithms such as PageRank have been developed. However, most Web search engines employ keyword-based search and thus have some natural weaknesses. Among these problems, a well-known one is that it is very difficult for search engines to infer semantics from user queries and returned results. Hence, despite of efforts of ranking search results, users may still have to navigate through a huge amount of Web pages to locate the desired resources. In this research, the researchers developed a clustering-based methodology to improve the performance of search engines. Instead of extracting features used for clustering from the returned documents, the proposed method extracts features from the delicious service, which is actually a tag provider service. By utilizing such information, the resulting system can benefit from crowd intelligence. The obtained information is then used for enhancing the performance of the ordinary k-means algorithm to achieve better clustering results.
3375
Abstract: The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. By letting EVs discharge during peak hours and charge during off-peak hours, V2G networks could bring numerous social and technical benefits to the smart grid. Due to the scale of the network, the speed of the vehicles, their geographic positions, and the very sporadic connectivity between them, V2G communications have the crucial requirements of fast authentication. In 2011, Guo et al. proposed a unique batch authentication protocol for V2G communications. There are three parties in V2G communications, including an aggregator, a smart grid control centre, and individual EVs. The proposed idea is that instead of verifying each packet for each vehicle, the aggregator verifies the received batch of packets with only one signature verification. They used DSA signature for the batch authentication and claimed their protocol is strong enough to defend against security attacks. In this paper, we investigate the security of Guo et al.’s protocol. More precisely, we show that any attackers can easily forge signatures satisfying the batch verification criterion without the knowledge of the signer’s private key. To remedy the security flaw of Guo et al.’s protocol, we proposed a simple and secure improvement of Guo et al.’s protocol. The key point of the improved protocol is that we make multiple signatures in order. The attacker or the dishonest signer cannot transpose these digital signatures such that the aggregator passes the validation of the batch verifying multiple digital signatures. Based on Guo et al.’s protocol, the security of our proposed protocol is the same as that of their protocol except that our improved protocol has no security flaw of their protocol. Therefore, the improved protocol is secure to detect forged multiple signatures.
3380
Abstract: Nowadays keystroke logging is one of the most widespread threats used for password theft. In this paper, rather than detecting existing malware or creating a trusted tunnel in the kernel, we present a method called Broker to protect the password that a user provides for a web page to login to a web service. Installing such solutions in a host only requires limited privileges of related computers. The Broker method uses a second device and the Broker server to safely transfer users’ account-related information. Comparing with previous work, the Broker method successfully separates user names and passwords so that even a second device and the Broker server are compromised, users still will not leak their private information to attackers. Finally, the Broker method can be applied to all websites without any modification of them.
3385
Abstract: In this paper, we study a solution to solve the authentication problem in the ID management system (IDMS). Our solution is based on the virtualization technology which allows data transfer between two servers in the absence of the network connection. In this paper, we propose a Virtual ID management system (VIDMS) that logically divides the login server and the authentication server in a physical system. The ID authentication process minimizes the security threat in the network since it can be performed using the virtual shared memory in the absence of the network connection. As compared with the existing IDMS, our solution improves the authentication performance (in terms of the speed).
3390
Abstract: In the ECC, scalar multiplication represents the core operation of the system. In recent years, the circuit architecture of triple processor cores or greater has been addressed in the domestic and international literature. A parallel processing concept is mainly used in this type of framework to accelerate circuit operation. In the present study, equation calculation and circuit design were employed to integrate the pipeline architecture and the parallel processing architecture and further propose an elliptic curve scalar multiplier for dual processor cores. In addition, a Xilinx XC5VLX110T FPGA was used to verify the accuracy and performance of circuit functions. The maximum frequency was 173 MHz, the number of LUTs was 14999 slices, and the time to accomplishing one scalar multiplication was only 8.8s. Compared to architectures described in recent reports, the architecture presented was faster and effectively reduced the square measure by 28%.
3395
Abstract: This paper discusses an Unmanned Aerial Vehicle simulation system design and implementation, which focuses on the system design, system management, software development, and the information flow management of the whole system. To simulate battlefield environments, this system provides a clear and visual expression way for complex system design. Besides, it provides services for the design, integration testing, experiment, verification and evaluation of complex system. The main tasks of the system include: establish flight control simulation model; construct three-dimensional visual environment model and three-dimensional entity model; In the case of aircraft loading, drive various kinds of simulation modules, use related model of aircraft task / path planning module; display the typical use of aircraft system visually, as combining with three-dimensional visual simulation environment. Based on VC++ and MultiGen Creator/Vega, this simulation system probes into three-dimensional modeling technology and visual simulation-driven. It proposes general techniques route, improves work efficiency and has a wide range of application.
3401
Abstract: Today it's been getting hard to find books suitable for the purpose among a lot of books published every day. There are so many kinds of books which are more than one hundred million and huge amounts of books are published every day. Therefore, readers are getting hard to find the suitable books for them. In this paper, we propose a book recommendation system that recommends the suitable books for readers. In addition, we introduce finding relation between books in a way of looking for other titles of books mentioned in a book. The titles of books are regarded as relation data. It is used for building relation database using the MapReduce model and it will be served to readers.
3405

Showing 631 to 640 of 699 Paper Titles