Applied Mechanics and Materials
Vol. 391
Vol. 391
Applied Mechanics and Materials
Vol. 390
Vol. 390
Applied Mechanics and Materials
Vol. 389
Vol. 389
Applied Mechanics and Materials
Vol. 388
Vol. 388
Applied Mechanics and Materials
Vol. 387
Vol. 387
Applied Mechanics and Materials
Vols. 385-386
Vols. 385-386
Applied Mechanics and Materials
Vols. 380-384
Vols. 380-384
Applied Mechanics and Materials
Vol. 379
Vol. 379
Applied Mechanics and Materials
Vol. 378
Vol. 378
Applied Mechanics and Materials
Vol. 377
Vol. 377
Applied Mechanics and Materials
Vol. 376
Vol. 376
Applied Mechanics and Materials
Vols. 373-375
Vols. 373-375
Applied Mechanics and Materials
Vol. 372
Vol. 372
Applied Mechanics and Materials Vols. 380-384
Paper Title Page
Abstract: The exponential synchronization problem of complex networks is investigated. The complex network model considered is a moving agent network in a two dimensional space and the coupling of between nodes is nonlinear links. In order to achieve the objective of exponential synchronizaiton, linearizing error system is presented. Base on the Lyapunov stability theory, a new criterion is proposed for exponetial synchronization of moving agnets networks under the condition of fast switching. In addition, an numerical example of the Lorenz chaotic system are analyzed, and numerical simulations results show the effectiveness of proposed exponential synchronization criterion.
2415
Abstract: The paper puts forward a method of reconstructing a vivid virtual gallbladder geometric modeling. We use Visual C++ to write import program, save the geometry information of gallbladder contour which is related to reconstruction, and discarded something irrelevant such as materials, textures and so on. In the process of reconstruction, it need to import the data of gallbladder contour vertexes and facets, but not to read the entire 3DS file again, which will undoubtedly save more time and benefit more to real-time interactive. Then we change the independent facets into an interrelated whole through indexing and finding out storage location of triangular facets vertexes in vertex array. So that we can change the position and the shape of the gallbladder by changing the coordinate values of vertexes.
2419
Abstract: Building Information Modeling (BIM) has been one of the most promising developments in the architecture, engineering, and construction (AEC) industries. To extend the BIM technology and make it more collaborative, a specific application should be made for viewing and managing the model on mobile devices. Based on the authors study and development results, this paper presents a systematic solution on BIM mobile application developments and discusses some critical issues for solving the existed problems, such as the network-speed limitations, simplifications and transferring of the BIM models, as well as platform independence issues to develop well suited mobile applications.
2423
Abstract: A rapid growth in the number of vehicles contributes to more and more attention on vehicular ad hoc network (VANET) recently, and ensuring security plays a significant role in maintaining its stable operation. Because of some variable environmental factors, its impossible to evaluate a precise value of packets transmission success rate. To reduce the influence of errors on detection, we develop a novel two-person zero-sum intrusion detection game model for formulating confrontation behavior between intrusion detection system (IDS) and malicious node.
2427
Abstract: With the development of the Internet of Things, collected data from the Internet of Things include more and more incomplete data because of the network fault or the sensing terminal breakdown. A lot of incomplete data do harm to the IoT application and decision. For filling the incomplete data in IoT effectively, this paper presents a new method based on power graph, which first uses the graph power to abstract the important attributes of the objects. Then the proposed method fills the important attributes using improved method based on similarity. Experimental results show the effectiveness of our method, especially for filling the massive incomplete data in IoT.
2431
Abstract: Certificateless short signature schemes can not only have the advantage of certificateless signature, but also provide a short signature size in communication. However, all existing certificateless short signature schemes only proven secure against a normal adversary which can only obtain the valid signature for the original public key rather than a super adversary which can obtain the valid signature for the replaced public key. Recently, Fan et al. proposed a certificateless short signature scheme which is very efficient, but we found it is still cannot against super adversary. In this paper, we first analysis their scheme, and then present an improved scheme which can against super adversaries. Furthermore, our scheme can provide both the strongest security level and the shortest signature size compared the existed provably secure certificateless short signature scheme.
2435
Abstract: HINOC (High Performance Network over Coax) is a coaxial cable network access system self-developed by China. In this paper, we discuss the software architecture of an embedded test device designed for it. The device integrates the functions of modem and terminal to help to solve the network problem. The software uses the hierarchical model to realize its multiple functions. The test results show that the design of device has a good performance.
2439
Abstract: With sharply rising of electronic commerce, many people would rather shop on Internet. Many advertiser companies take advantage this opportunity to promote their products. This paper introduces an improved precision system based on parallel system with Hadoop framework. It is designed for processing massive data in PB level. It can meet different users to see different types of advertising content. This paper also introduces a key algorithm of user classification.
2443
Abstract: This study explores the cloud computing service security and access by considering the cloud provider, service provider and the customers concern and identifying new trends of challenges relate to the two types of concerns. Focusing on the mobile environment, strategies to cope with the challenges are proposed. By investigating concerns from different perspectives, and drawing upon the proposed levels of strategies, we hope to bridge the gap between technology/service providers and the customers.
2447
Abstract: With the increasing amount of online shoppers, the security for E-Business becomes more important. Security middleware is one of the methods to achieve secure E-Business application. A security middleware based on smart card and combined secret key is proposed for mobile users and PC users. The security components are developed on the basis of cipher service provide by smart cards, encryption cards and combined secret key method, and provide security service interfaces based on J2EE. The middleware is proved valid for protecting the secrecy and integrity of order information during payment test.
2451