Applied Mechanics and Materials
Vol. 345
Vol. 345
Applied Mechanics and Materials
Vol. 344
Vol. 344
Applied Mechanics and Materials
Vol. 343
Vol. 343
Applied Mechanics and Materials
Vols. 341-342
Vols. 341-342
Applied Mechanics and Materials
Vol. 340
Vol. 340
Applied Mechanics and Materials
Vol. 339
Vol. 339
Applied Mechanics and Materials
Vols. 336-338
Vols. 336-338
Applied Mechanics and Materials
Vols. 333-335
Vols. 333-335
Applied Mechanics and Materials
Vol. 332
Vol. 332
Applied Mechanics and Materials
Vol. 331
Vol. 331
Applied Mechanics and Materials
Vol. 330
Vol. 330
Applied Mechanics and Materials
Vol. 329
Vol. 329
Applied Mechanics and Materials
Vol. 328
Vol. 328
Applied Mechanics and Materials Vols. 336-338
Paper Title Page
Abstract: Some spectral conditions for a graph to be Hamilton-connected in terms of the spectral radius of the adjacency matrix or signless Laplacian of the graph or its complement are established, and then the condition on the signless Laplacian spectral radius of a graph for the existence of Hamiltonian paths or cycles is given.
2329
Abstract: This paper developed a distributional PACS system conform to the J2EE specification, implemented the DICOM images receiving, storage and archiving on the basis of the DICOM standard. Extract meta information and stored in the database. Visit from different clients of different platforms to look up patient and some management. Web Service provides services functions. The System is a true cross-platform, provides a good background support for remote diagnosis system and the borderless PACS system. Compared to the traditional PACS, the PACS based on J2EE specification is easier to install and manage and more security and flexible, overcome the traditional faults of pure Client/Server model or Browser/Server architecture. Simplifies enterprise application development, management and deploy as a distributional and portable PACS.
2335
Abstract: For the problem of data limited in the mountainous area, a method of FLS-SVM (Fuzzy Least Square Vector Machine) that supporting small sample data and having high noise ability was put forward. The CPSO(chaos particle swarm optimization algorithm) is adopted to optimize the parameters of least squares support vector machine algorithm, and to avoid the uncertainty of artificial parameter selection. Meanwhile, considering the impact of terrain, the terrain correction is introduced to the support vector machine model. The experimental results show that the model can get higher precision fitting effect compared with traditional fitting method such as PSO-LSSVM and GA-LSSVM, and suitable for the SRTM application of getting normal height.
2339
Abstract: Designed based on H.264 video compression standard for embedded wireless video teaching system,Given in detail of the system hardware design and software implementation of the corresponding method,And data transmission network for the RTP problem corresponding solutions,Practice has proved that the system design is reasonable,reliable operation .
2344
Abstract: Service computing facilitates resource sharing and business collaboration for cross-domain partiers by universal service description and discovery. The multi-domain nature of service oriented environments introduces challenging security issues, especially with regard to information flow control which controls the flow of privacy resources. This paper presents a state-of-the-art review of information flow control technology in service oriented environments. We review the research background and classifications of information flow control, and discuss architecture and existing technologies of both centralized and distributed information flow approach. We outline the features, advantages and limitations of existing information flow control approaches. The analysis results show that the research of collaboration and dynamic nature are important, but insufficient to secure information flow.
2348
Abstract: The paper proposes a new method for a targets trajectory, assumed to be linear and uniform, based on the observation of its speed and bearings. After introducing the new method based on assumed model, the paper analyzes the relative error of range estimation caused by speed and bearings estimations relative error; The results of target motion analysis (TMA) is optimized by linearizing the model and using kalman filter. Pond test shows that relative error of range estimation calculated by this method is less than 10-1.
2354
Abstract: By the method of nonstandard analysis, the definition of *-finite graph is given, and necessary and sufficient conditions of *-finite graph are obtained. Further, by the Transfer Principle, we apply the theory of finite graph to *-finite graph, embed given infinite graph into some *-finite graph, and finally obtain the related results of infinite graph.
2359
Abstract: This paper investigates the problem of hybrid projective synchronization (HPS) in dynamical networks with fractional-order hyper-chaotic system nodes. Based on the stability analysis of fractional-order systems and nonlinear control technique, we propose a novel and general approach to realize the synchronization of complex network. A nonlinear controllers are designed to make the fractional-order complex dynamical networks with distinct nodes asymptotically synchronize onto any smooth goal dynamics. Numerical simulations are presented to demonstrate the effectiveness of the proposed synchronization scheme.
2365
Abstract: The mis-configuration investigation is an important field in the security of cloud computing. However, the common method of investigating mis-configuration is a post-processing way. In order to find errors in the process of the cloud service management timely, we analyze the relationship between indicators of the cloud computing and locations of configuration items in this paper. According to this relationship, we construct a solution model based on the fuzzy pattern recognition. The lattice degree of nearness is used to determined locations of the mis-configuration. We further test the validity and accuracy of the model under the cloud simulation environment. The results show that the model is more effective and accurate to find the location of the mis-configuration rapidly.
2369
Abstract: In order to improve the detection accuracy of the intrusion detection, the proposed ensemble learning model is applied to the intrusion detection. This method can significantly improve the generalization capability and flexibly. Compared to the single classification method, despite choosing the ensemble classifiers for data detection can cause an increase of the additional overhead, ultimately the detection accuracy can be improved obviously. The experimental results with the KDD dataset further verify the significant efficiency of ensemble learning model.
2376