Applied Mechanics and Materials
Vols. 423-426
Vols. 423-426
Applied Mechanics and Materials
Vol. 422
Vol. 422
Applied Mechanics and Materials
Vol. 421
Vol. 421
Applied Mechanics and Materials
Vol. 420
Vol. 420
Applied Mechanics and Materials
Vol. 419
Vol. 419
Applied Mechanics and Materials
Vol. 418
Vol. 418
Applied Mechanics and Materials
Vols. 416-417
Vols. 416-417
Applied Mechanics and Materials
Vol. 415
Vol. 415
Applied Mechanics and Materials
Vols. 411-414
Vols. 411-414
Applied Mechanics and Materials
Vols. 409-410
Vols. 409-410
Applied Mechanics and Materials
Vols. 405-408
Vols. 405-408
Applied Mechanics and Materials
Vol. 404
Vol. 404
Applied Mechanics and Materials
Vols. 401-403
Vols. 401-403
Applied Mechanics and Materials Vols. 416-417
Paper Title Page
Abstract: With the development of the economy and improvement of science and technology, the management of all kinds of knowledge becomes more and more important for enterprises, and the blueprint of knowledge economy is displayed in front of us. The creation and development of knowledge reduces dependence of the society on natural resources greatly. Traditional production factors including labor, land and capital have gradually lost their dominant position, while knowledge resource has become the primary factor of scientific and technological innovation. Therefore, knowledge is the most important resource of enterprises. Using data mining method to find and collect the implied and valuable knowledge from enormous data and starting from revenue maximization of enterprises and participants, the paper uses the multi-player game with mixed motives, proposes the motivation mode and adopts Nash equilibrium as the starting point to observe how to stimulate the knowledge-sharing passion of the employees, which has great theoretical and practical significance.
1381
Abstract: This paper is based on wavelet analysis. Focusing on nuclear pulse, take Gaussian Shaping Filter (GSF) Technique into practice on SoPC. Validate the feasibility of Gaussian shaping filter with MATLAB. According to the development environment requirements of SoPC, carry out an adjusted algorithm on SoPC. The experiment indicates that the integration between GSF technique and SoPC technique can extract the information of peak value and time in effect and makes further good foundation for the realization of multi-channel system on SoPC.
1388
Abstract: In a large number of measurement data processing, the ill-posed problem is widespread. For such problems, this paper introduces the solution of ill-posed problem of the unity of expression and Tikhonov regularization method, and then to re-collinearity diagnostics and metrics based on proposed based on complex collinearity diagnostics and the metric regularization method is given regularization matrix selection methods and regularization parameter determination formulas. Finally, it uses a simulation example to verify the effectiveness of the method.
1393
Abstract: The discretization is one of the most important steps for the application of Rough set theory. In this paper, we analyzed the shortcomings of the current relative works. Then we proposed a novel discretization algorithm based on information loss and gave its mathematical description. This algorithm used information loss as the measure so as to reduce the loss of the information entropy during discretizating. The algorithm was applied to different samples with the same attributes from KDDcup99 and intrusion detection systems. The experimental results show that this algorithm is sensitive to the samples only for parts of all attributes. But it dose not compromise the effect of intrusion detection and it improves the response performance of intrusion detection remarkably.
1399
Abstract: We develop a model to study how to place still and/or rotary cameras in some locations around the museum. The goal is to determine the optimal camera locations and the smallest number of the cameras so as to provide the best possible coverage during the night and be easy to monitor particular items. We model the process how to select every optimal camera location and the kind of camera. Subject to the given constraints, our algorithm outputs the optimal project for every given museum. We apply our algorithm to a case study of a real museum in China inorder to test the practicability of the model. Finally, we examine the sensitivity of optimal camera locations and the number of cameras to changes in the unit length of zoning.
1404
Abstract: Cloud computing is revolutionizing how resources and services are used and managed, but the revolution comes with new security problems. This paper identifies current security issues in cloud computing environments. To manage service security, we propose a new architecture based on Service Level Agreements (SLAs). To ensure the integrity of data service and relieve the security concerns of users, we implement a new data auditing algorithm in this architecture. Furthermore, we present four-layer cryptography analysis to ensure data security.
1413
Abstract: This paper first discusses the information security and network security, security threat, hacker intrusion process, system and network security vulnerabilities, and then introduces the status of intrusion detection system. By the comparison of two kinds of intrusion detection systems, the article puts forward the detection system based on the combination of the soil and the intrusion of network intrusion detection technology. Combined with the actual project development, this article focuses on the key technology design idea and the realization of the intrusion detection system in network security.
1418
Abstract: The traditional cheating prevention is usually based on visual cryptography (VC), in which the constructed image is bigger than the secret image because of the pixel expansion. In this paper, we studied the cheating problems in visual secret sharing (VSS) by random grids (RG) which can prevent the cheating activities with no pixel expansion. We considered the attacks of collusive cheaters who may deviate from the scheme in any way. We presented the cheating method and applied it on attacking existent n-out-of-n VSS scheme based on RG. Then we proposed one cheat-preventing scheme that can prevent the cheating activity upon.
1423
Abstract: nternet of Things is known to be the third wave of the world information industry following the computers and the Internet. In China, The development of things already elevated to the height of the national strategy. With the application of things more and more widely, security and privacy of The Internet of Things is increasingly a cause for concern. It has also become one of the decisive factors of sustainable development networking industry. Analysis focus on the perception layer of Things layers of security issues and the security policy. Analysis of the privacy issues involved in the Internet of Things applications to the response options. Efforts in the direction pointed out that for the security and privacy issues of Things. On study of the safety of the perception layer, one attack model of perception layer based on attack tree are put forward.
1429
Abstract: The application of RFID technology in the new energy automobile manufacturing, can achieve that the visualization, on time and collaborative business processes of energy vehicles discrete manufacturing production process, to establish a advanced "just-in-time" production model, provide real-time and accurate information for production plans and management decisions, which will help to improve the quality of enterprise production management decision-making and the overall optimization of production operations management functions. On the basis of proposed mainly from management systems and supporting techniques to solve the security issues of the RFID system, give the basic framework of build the RFID system safety management system. The security of the RFID system is technically divided into two security domains, focusing on security issues by the reader to the application system. The intrusion detection technology is introduced in RFID system, and research on the improved of intrusion detection from two aspects: First, the use of clustering algorithm for data preprocessing to reduce the computational complexity, improve the detection efficiency; second, use immune particle swarm evolutionary algorithm directly improved feature selection to improve detection accuracy.
1434