Applied Mechanics and Materials
Vols. 365-366
Vols. 365-366
Applied Mechanics and Materials
Vol. 364
Vol. 364
Applied Mechanics and Materials
Vols. 361-363
Vols. 361-363
Applied Mechanics and Materials
Vols. 357-360
Vols. 357-360
Applied Mechanics and Materials
Vols. 353-356
Vols. 353-356
Applied Mechanics and Materials
Vols. 351-352
Vols. 351-352
Applied Mechanics and Materials
Vols. 347-350
Vols. 347-350
Applied Mechanics and Materials
Vol. 346
Vol. 346
Applied Mechanics and Materials
Vol. 345
Vol. 345
Applied Mechanics and Materials
Vol. 344
Vol. 344
Applied Mechanics and Materials
Vol. 343
Vol. 343
Applied Mechanics and Materials
Vols. 341-342
Vols. 341-342
Applied Mechanics and Materials
Vol. 340
Vol. 340
Applied Mechanics and Materials Vols. 347-350
Paper Title Page
Abstract: Multi-Depot Vehicle routing problem is an NP-HARD problem. Because the genetic algorithm is easy premature convergence and search efficiency is not high, this paper established the defects of polymerization degree model, and based on this, this paper proposes an improved algorithm, this algorithm can change the mutation rate according to their own chromosome degree of polymerization size to avoid the prematurity of genetic algorithm, and improved genetic algorithm search efficiency. Through the contrast, the results showed that the algorithm has good search efficiency and stability, which demonstrates that the improved algorithm is effective and feasible for multi-depot vehicle routing problem.
3273
Abstract: To improve and guarantee the quality of software, it is very necessary to effectively predicting modules with defects in the software. There are usually more measure attributes in software quality prediction, which often leads to the curse of dimension. To do this, a new algorithm based on ISOMAP was presented to predict software defect, which combined manifold learning algorithms and classification methods. In the model, the high dimensional software metrics attribute data were firstly mapped into the low dimensional space through ISOMAP. Then the low dimensional features were classified with KNN, SVM and NB. Experiments demonstrate that the new model progresses the prediction precision of software defects as well as great improves the efficiency of the algorithm.
3278
Abstract: The paper first described the structure of JBPM workflow management system, and then proposed the structure of equipment management system that is focused on the JBPM workflow engine and based on the Framework of StrutsSpring and Hibernate, finally discussed and introduced the key technology of adding equipment function.
3283
Abstract: To realize cloud manufacturing (CMfg) production in group enterprises, manufacturing resources and modeling technologies of cloud pool were studied. According to the characteristics of group enterprises, manufacturing resources were analyzed and classified into human, equipment, materials, cooperation resources and so on. Then, the realization method which manufacturing resources mapped into virtual resources was researched, and a layer platform for cloud manufacturing was proposed. Taking CNC machine tool as an example, the ontology model was built with Semantic Web and OWL based on ontology theory. Finally, using semantic similarity computation method and case-based reasoning, the virtual resources were intelligent searched and matched so that manufacturing resources can realize unification, sharing and reuse.
3287
Abstract: After years of digital campus information construction, the school has been set up covering the operation, management, monitoring, application system. Between each application system need to standardize the data exchange services. Data exchange platform construction of university digital campus management system is the realization of system integration, the key measure to solve the problem of data sharing and exchange, is also necessary to promote and realize the resource integration and application integration infrastructure.
3292
Abstract: Mobile commerce brings new requirements for the models of e-commerce recommendation systems. Due to the advantage of field experience of mobile internet devices, augmentation reality would be considered as a suitable technology platform for the implementation of e-commerce recommendation in mobile commerce. Specifically, the idea of using augmented reality to extract user instant interests and render recommended instant information would demonstrate its strong vitality. Currently, the research of augmented reality based mobile commerce recommendation systems consists of three parts: recommendation information processing, recommendation information presentation and augmented reality based interaction. Information processing refers to the use of techniques such as collaborative filtering analysis of user interests, goods or services to decide what information should be recommended to the user. Information representation refers to the way in which recommended information is transmitted to users. Augmentation reality based interaction model is responsible for the interaction of users with the goods and services information, is a concrete manifestation of the recommended way of e-commerce in the mobile business environments. In this paper, the feasibility and main techniques of augmented reality technology used in mobile commerce were analyzed, and the prospects for its applications were looked forward to.
3297
Abstract: The automatic vibration screening of the insects is the important part in the image recognition of the stored-grain insects. A screening detection device of the stored-grain insects was developed to analyze the vibration screening properties of Coleopteran insects. The main structure of the device included a vibration screening unit, a dust removal unit of the grain insects, a binocular machine vision unit and an automatic transporting unit. The adults of Sitophilus Oryzae were taken as the screening objects. Full factorial design was used in order to find out the better vibration screening parameters. Then orthogonal experiment was designed to optimize the screening parameters further, and distinguish between the primary factors and the secondary factors. The optimal vibration screening parameters of the detection device for the stored-grain insects were determined by a series of experiments. The best parameters were that the amplitude of the vibration sieve was 3.5 mm, the vibrating direction angle was 30oand the crank plate speed was 600r/min.
3302
Abstract: Definition of network security is stated first. Network security threats; roughly including network connection threat, physical environment threat, authentication treat, malicious programs and system vulnerabilities, which can be further divided into more detailed categories. 8 prevention technology and strategies consisting of physical security means, firewall technology, intrusion detection, information encryption technology, vulnerability scanning, antivirus software, disaster recovery technology, and honeypots and honeynet technology are elaborated to try to form a general discussion of the security prevention structure. In the end, we propose that all of these technology and strategies should be organically combined and enterprises should pay more attention to network security rather than expanding production uncontrolled.
3307
Abstract: The positive factors of the cloud computing: the great commercial value, the cheap and convenient use, has been recognized widely. But there are many risks on security. These security risks will greatly restrict the development of cloud computing. Cloud security risks such as: the cloud platform is easily vulnerable, cloud resources is easily abused, the cloud platform data is accessed by unauthorized user or the data is missing, the violations in the network is difficult to trace and survey, and the service providers replacement will affect the migration of the users data and services. So we research the virtualization technology, data backup and disaster recovery technology, encryption technology of data storage and transmission, the authentication technology of service providers and users, risk assessment, and legal constraints and safety training. Our research is strived to obtain a secure cloud computing environment.
3312
Abstract: The Internet of Things (IoT) implies a symbiotic interaction among the real/physical, the digital/virtual worlds. Internet of Things is an integrated part of Future Internet and could be defined as a dynamic global network infrastructure with self-configuring capabilities based on standard and interoperable communication protocols where physical and virtual things have identities, physical attributes, and virtual personalities and use intelligent interfaces, and are seamlessly integrated into the information network. In order to think of the possible applications for the Internet of Things, we list out the main application domains. The characteristics of each domain and some indicative examples are presented. Some existing Applications of IoT are also discussed in this paper.
3317