Applied Mechanics and Materials Vols. 385-386

Paper Title Page

Abstract: Wireless Sensor Networks (WSNs) is a self-organizing network consisting of a large number of sensor nodes interacting with the physical world. Localization of sensor nodes is an essential issue in WSNs. RSSI-based localization can be implemented conveniently, in addition this technology is cost-efficient and power-efficient in practice. However, limited attention has been paid to underground tunnels environments. In this paper, we present an experimental study of RSSI-based localization in underground tunnels. The sensor nodes used are specially designed based on a 2.4GHz low power radio chipset CC2430 for ZigBee. Experimental results confirm the applicability of RSSI-based localization in underground tunnels.
1756
Abstract: Feature-oriented domain analysis has become a more popular method for domain analysis today. However, feature model the main products of feature-oriented domain analysis method is very difficult to translate into the form of machine recognition. Moreover, it can't model detection. Feature model based on ontology can make up for these shortcomings, so this paper will study on feature modeling based on ontology. The main contents of this paper are: relationship between feature model and ontology, feature modeling framework based on ontology, the advantage and disadvantage of feature model based on ontology and general feature model.
1760
Abstract: For the purpose of measuring document interoperability, a Feature Data Model (FDM) of open office document format is proposed to deal with documents. Feature Data is defined as a document container, which contains a number of document features. Each data object in the container meets different document standards and specifications. By using FDM, the instance documents establish the mapping relationships of features between different formats. Then use Feature Data as assistance to measure interoperability and calculate the statistical results automatically. The Documents Interoperability Measuring System (DIMS) mentioned in this paper is implemented by JAVA to prove the feasibility of this model and architecture.
1764
Abstract: Founded on the requirements of ocean fishing vessel and its operating system, this paper discusses and structures the architecture model of open service components based on a new-type IOT (Internet of Things). Then, this paper disserts the dynamic representation method of service components relationship in the system based on the Petri net. Under the effect of this method, the users overall acquisition capability of the service component base has been enhanced, which contributes to discover the conflict and redundancy of solving among the service components and provide an intuitive illustration mechanism for the combination configuration of service components. The intelligence of the system and the advantage of SOA are evaluated as well. Meanwhile, the reliability of the method is proved by means of the experimental simulation in this paper.
1771
Abstract: Archive management system based on modern information technology as the support, the archives information as management object, the archives work as the core and implement management information system, database design is the core work of the development of archives management system work, this article launches the research from four aspects according to the database design process. First, from the business requirements, functional requirements, performance requirements, such as security requirements for demand analysis; Second, according to the result of requirement analysis, conceptual design using E-R diagram; Third, converting E-R diagram logic structure supported by the database management system; Fourth, for the logic model to determine the storage structure and access method. In this paper, it based on the relational database design, a relational database with full-text database is the development direction of the future.
1776
Abstract: Virtual reality scenes three-dimensional modeling usually is constructed on the basis of learning with virtual data, and learning behavior is too dependent on virtual data.It is difficult to quickly and accurately reflect characteristics of 3D modeling in virtual reality, and learning complexity is higher. In this paper, a method of virtual reality scenes three-dimensional modeling based on semantic was presented on the basis of analysis of the virtual scenes modeling methods. The modeling system architecture using the method is divided into physical model libraries, three-dimensional model semantic knowledge base, semantic-based visual modeling and scene graph automatically generation modules. The experimental results show that the detection performance is better than the results of the three-dimensional modeling based on virtual data, and the system increases flexibility and usability of the three-dimensional modeling,
1780
Abstract: Based on the concept of an integrated maintenance information system and related information environment, this paper discusses the process of troubleshooting in modern maintenance in detail, and gives a model of dynamic faults diagnosis, in which a reasoning program is designed through taking advantage of information fusion and time analysis. In the end, the authors present the logic process of dynamic diagnosis through a typical example, and propose a dynamic diagnostic system based on information fusion.
1785
Abstract: With open source, stable performance, simple structure, integrated in Linux kernel, and good performance, KVM (Kernel-based Virtual Machine) gets wide attention from major IT vendors and academia circles. However, virtualization technology will introduce additional overhead, especially in the I/O virtualization. The current researches about KVM have been carried out mostly focused on the performance comparison and analysis between virtualization solutions. There is no systematic study of the KVM I/O performance. In this paper, the I/O architecture in KVM is firstly studied, and then the disk and network performance of fully virtualization KVM and Para-virtualization KVM with all the different configurations are systemically tested and analyzed. Both the KVM I/O performance and the influences of the different configuration options on the performance are figured out in this paper. These are quite important and useful for the users and designers.
1790
Abstract: The generating polynomials of higher power residue codes over finite fields are factors of the polynomial .Generally speaking; it is difficult to factor the polynomial over finite fields. This paper gives generating idempotents of cubic residue codes over the field .As a result, the generating polynomials of cubic residue codes over the field can be obtained by computing the greatest common divisors of these generating idempotents and the polynomial with computer software such as Matlab and Maple.
1797
Abstract: Ambiguous pattern recognition is a very important technology in the field of science including engineering application nowadays, it uses methods of fuzzy mathematics enabling the computer to recognize and judge the objective things. But, the research on ambiguous pattern recognition rarely involves the field of security, while in fact both the participant of the pattern recognition and the database need to protect their privacy. This paper mainly introduces the secure multi-party computation into the field of ambiguous pattern recognition, raises solution for the secure multi factor ambiguous pattern recognition under the half honest model, and proves the validity and security of the protocol.
1801

Showing 391 to 400 of 428 Paper Titles