Applied Mechanics and Materials
Vol. 345
Vol. 345
Applied Mechanics and Materials
Vol. 344
Vol. 344
Applied Mechanics and Materials
Vol. 343
Vol. 343
Applied Mechanics and Materials
Vols. 341-342
Vols. 341-342
Applied Mechanics and Materials
Vol. 340
Vol. 340
Applied Mechanics and Materials
Vol. 339
Vol. 339
Applied Mechanics and Materials
Vols. 336-338
Vols. 336-338
Applied Mechanics and Materials
Vols. 333-335
Vols. 333-335
Applied Mechanics and Materials
Vol. 332
Vol. 332
Applied Mechanics and Materials
Vol. 331
Vol. 331
Applied Mechanics and Materials
Vol. 330
Vol. 330
Applied Mechanics and Materials
Vol. 329
Vol. 329
Applied Mechanics and Materials
Vol. 328
Vol. 328
Applied Mechanics and Materials Vols. 336-338
Paper Title Page
Abstract: RFID system is a foundational component for the internet of things. Its applications are more and more popular, such as travel, retail, industry, defense, agriculture, storage and other fields. Controller or reader is an essential part for RFID applications. It can identify tags, process data and issue management instructions. Microcontrollers are common hardware for embedded applications. With microcontrollers, the RFID controller will be smart and easy to be used. In this paper, RFID, internet of things, contactless cards, readers, microcontrollers and design of a RFID controller with microcontrollers are discussed.
2521
Abstract: For express companies' distribution center, optimizing the vehicle routing can improve service levels and reduce logistics costs. This paper combines the present vehicle routing situation of Chang Sha Yunda Express in KaiFu area with the specific circumstances to analyze. A model of the vehicle routing problem with time window for the shortest distance was built and then use genetic algorithm to solve the problem. Its application showed that the method can effectively solve the current vehicle routing problems.
2525
Abstract: With the application of the ROHS standard in the products management, the Product Overall Lifecycle Management has been increasingly complex. Based on the UML2.0 modeling technology, this paper discussed the ROHS conformity system modeling process by the modeling tool VP-UML. According to the information model, the core data about Product Life Cycle can be converted to the XMI document, and be used to get the optimization of the model.
2529
Abstract: We adopt rapid prototyping method to develop the system, depend on the rapid prototyping creation tool to achieve the design and implementation of management system of university sports scores, aim at simplifying the calculation and statistics of sports scores, realize the informatization management, and deliver the cumbersome calculation and statistics work to computer to accomplish automatically.
2533
Abstract: BPEL-based composition of Web services has become one important part of business processes, but because of the dynamic and complexity of network, it easily raises various exceptions during the execution. In order to address various exceptions may exist in execution of composite Web services process effectively; this paper proposes an effective exception handling model of composite Web services in combination of the autonomic management theories and techniques in the field of autonomic computing. This model incorporates the autonomic management element of autonomic computing to monitor the execution of composite services and to compensate or restore the business process of the composite services according to the specified policy when an exception occurs. The model enhances the exception handling autonomy while reducing the complexity of exception handling of composite services.
2537
Abstract: Tianjin eco-city is made an example to introduce the design and implement of energy system based on smart grid. This system implemented the acquisition and testing of energy information of the residents of the smart community, buildings and large customer. This system provided user energy using strategy, energy using assistant decision-making and other technologies through analyzing users data, diagnostic analysis of the level of user energy efficiency, and ultimately implemented the using and extension of energy saving technology in the end-user.
2544
Abstract: Power provision is coming to be the most important constraint to data center development, how to efficiently manage power consumption according to the loads of the data center is urgent. In this paper, we provide the Request-Response Hierarchical Power Management (RRHPM) model for data center, and based on queuing theory, analyse the performance and constraints of two strategies hierarchical structure implement of RRHPM. Numerical results show that the Equal Utilization Strategy has less average response time, can manage more service nodes with the same response time threshold, and require less power management nodes than popular Equal Degree Strategy.
2549
Abstract: Power provision is coming to be the most important constraint to data center development, how to efficiently manage power consumption in the data center is urgent. For solving this problem, we designed the Request-Response Hierarchical Power Management model (RRHPM) for data center and analysed its performance in our latest work. Because failures are quite common in current data centers, in addition to performance, the fault-tolerance is another important metric of power management system. In this paper, we further explore the fault-tolerance of RRHPM for the data center. Numerical results show that the Equal Utilization Strategy has higher fault-tolerance than popular Equal Degree Strategy.
2555
Abstract: Based on attack model of database,a model of database intrusion prevention system is proposed in electronic commerce platform. The model is divided into session level intrusion detection model, schema level intrusion detection model and semantic level intrusion detection model according to the abstraction level of test information. It extends the COAST firewall model with intrusion detection, and a layered intrusion prevention model which detect intrusion behavior according to session level, schema level and semantic level information of transactions. Thereby, it updates database security from passive protection to proactive protection.
2559
Abstract: To solve the special recommendation problem in C2C e-commerce websites, a three-dimensional collaborative filtering recommendation method which can recommend seller and product combinations is proposed by extending the traditional two-dimensional collaborative filtering method. And a C2C e-commerce recommender system based on the proposed method is designed. The framework of the system and the key calculations in the recommendation process are discussed. The system firstly calculates seller similarities using seller features, and fills the rating set based on sales relations and seller similarities to solve the sparsity problem of the three-dimensional rating data. Then it calculates the buyer similarities using historical ratings, decides neighbors and predicts unknown ratings. Finally it recommends the seller and product combinations with the highest prediction ratings to the target buyer. A true data experiment proves the good recommendation performance of the system.
2563