Applied Mechanics and Materials Vols. 380-384

Paper Title Page

Abstract: Scientific discourses have obviously enhanced their accessibility and reusability in response to the development of Semantic Web technologies. A handful of representation models of discourse representation have been proposed during these years for semantic search and strategy reading. In this paper, we delineate the relationships that operate between entities or specific instances of entities, such as Semantic Relationships. Such definitions and demonstrations of relationships will be served for semantic algorithms and applications.
2242
Abstract: Network Designer, which is suitable for the CAN, LIN and FlexRay design, is used to design the database of FlexRay according to the actual requirements, including the definition of nodes, messages and signals of FlexRay cluster and the design of communication schedule. And The Network Designer is able to export FIBEX. Import the database file which was well designed to the FlexRay Configuration Tool, then configurate the corresponding parameters of the software and combine it with MATLAB/Simulink to create RTIFlexRayConfig model. MicroAutoBox which is a tool of rapid control prototyping and Simulator which is a tool of hardwarein-the-loop simulation are used as two nodes of FlexRay to verify network performance by transmitting drivers input signals.
2246
Abstract: Clothing is a part of human civilization. The e-commerce revolutionizes the concept and business mode of clothing sales. But there are still many unsatisfactory problems in clothing sales through the e-commerce at present. Compared with the traditional clothing stores, E-commerce clothing lacks many service functions. If we want to provide more service content in E-commerce clothing, it needs to reconstruct virtual environment. The paper promotes ideas that dividing the E-commerce clothing system into three subsystems to improve the cloth sales online. The subsystems are the subsystems of cloth exhibition, and the subsystems of cloth fitting and the subsystems of cloth designing.
2251
Abstract: Popularity of group-oriented applications motivates research on security protection for group communications. A number of group key agreement protocols have been proposed for this objective, but most current group key agreement protocols do not consider privacy protection. Group key agreement protocols for networks should also handle dynamic group membership events such as user join and leave events. The Join and Leave Protocols provide backward and forward secrecy respectively. In this paper, we proposed a new anonymous group key agreement protocol based on ID-based encryption cryptosystems. The proposed protocol not only benefits from the desirable features of ID-based cryptosystem, but also provides privacy protection for users. The proposed protocol achieves the following security attribute: anonymity, unlinkability, group key secrecy, group forward secrecy, group backward secrecy, perfect forward secrecy for the group session key and entity authentication.
2256
Abstract: Due to their conjectured resistance to quantum cryptanalysis, strong worst-case/average-case security guarantees, ease of implementation and increasing practicality, lattice-based cryptography is one of the hottest and fastest moving areas in mathematical cryptography today. In this paper, we give a fuzzy certificateless identity-based encryption scheme from lattice, whose security is based on the hardness of the Learning With Errors (LWE) problem. In the scheme, the user can choose his own secret key that the KGC cannot obtain, which is an efficient approach to mitigate the key escrow problem in fuzzy identity-based encryption scheme.
2262
Abstract: This paper an analysis of the present teaching of electric control system of the office building,the use of RF wireless communication technology combined with single chip microcomputer, using infrared technology, through the central control room for the entire teaching office lights and other electrical equipment for centralized, reasonable control; to ensure the stability of the system.
2267
Abstract: The key technology of personalized recommendation based on CBR involves the representation and the organization of case, construction and maintenance of multiple cases library, judging of the similarity of case and methods of retrieval, and the combination of personalized recommendation technology. The four interrelated aspects are the important links to design the personalized recommendation system. This paper studies the key technology of the personalized recommendation system based on CBR.
2271
Abstract: The relations between link density and network synchronizability based on scale-free weighted networks is investigated. In this work, it shows that synchronizability of networks Type I decrease along with the increases of link density, when the netwrok size is fixed. While the synchronizability of networks Type II is remarkable decreased by enhancing the link density with different network size.
2276
Abstract: For a typical ECoG-based brain-computer interface system that the subjects task is to imagine movements of either the left small finger or the tongue, a feature extraction algorithm using wavelet variance was proposed. Firstly the wavelet transform was discussed, and the definition and significance of wavelet variance were bring out and taken as feature, 6 channels with most distinctive features were selected from 64 channels for analysis; consequently the EEG data were decomposed using db4 wavelet, the wavelet coefficients variances containing Mu rhythm and Beta rhythm were taken out as features based on ERD/ERS phenomenon, and the features were classified by probabilistic neural network under a optimal spread with an algorithm of cross validation. The result of off-line showed high average classification accuracies of 89.21% and 88% for training and test data were achieved, the wavelet variance has characteristics of more simple and effective and it is suitable for feature extraction in BCI research.
2280
Abstract: For the problems of the inefficient communication, increscent delay and raised packet loss rate etc. among the nodes caused by the frequent changes of topology in vehicular Ad hoc network (VANET), an improved solution of AODV (Ad hoc On-Demand Vector) routing protocol is proposed using the backup routing mechanism. By modifying the processing of nodes disposing route reply packet (RREP) packets, the source node maintains a routing to the destination node, at the same time it maintains a backup routing and modifies the local repair mechanism. The simulations analyze the performance of AODV routing protocol when the moving speeds of the nodes increase and the network structure changes frequently. The simulation results show that the packet delivery fraction (PDF) increases using the backup routing mechanism which improves the performance of AODV routing protocol.
2286

Showing 501 to 510 of 1095 Paper Titles