Applied Mechanics and Materials Vols. 416-417

Paper Title Page

Abstract: Capture effect is very common in wireless communication systems. If the capture effect was properly used, it will enhance the systems identification efficiency. We proposed a capture-aware tag estimation algorithm based on Maximum a Posterior Probability (MAP) estimation, which estimates the tag number and the capture effect by searching for the values of tag number and capture probability in their hunting zone jointly, that maximizing the posterior probability. Then reset the frame length given by the optimal frame equation under capture effect. Compared with the traditional MAP estimation, i.e. the estimation of tag number without capture effect, the estimated error of the proposed method is lower and the system identification efficient of the proposed algorithm is higher, also much closer to the ideal efficiency.
1484
Abstract: As the main means of transport, Railcar performs main task of railway equipment repairing department. For managing railcar information better, upgrading the version of the DMI program version, basic data version, revealing data version of GYK on railcar, the paper develops railcar management system which is based on the B/S mode of J2EE lightweight development framework Struts-Spring-Hibernate (SSH) . This paper introduces the system design process and every function module in detail. Result proves that railcar management system improves the management efficiency of railcar, consists with the characteristics of the railcar and plays a positive role in the safety of railcar.
1489
Abstract: During the process of implementing enterprise informationization, the main content is the system of ERP, collecting data is very important in the preliminary requirement analysis stage. Data collection is not only theory problem, but also practice problem. In this paper, the author focuses on the topic research, aiming at some problems existing in the process of data collection, and puts forward the new method of data collection, trying to improve the quality of data collection.
1495
Abstract: File transfer and e-mail business dealings have a lot of insecurity on the Internet. This paper presents a encryption algorithm of electronic documents based on matrix, and it brings forward implementing by VC.the algorithm relies on a special class of matrix combination, the method is feasible and effective to improve the security of the electronic document system. Finally, the code is given.
1502
Abstract: In order to make the embedded system without large memory capacity and embedded operating system can use database to manage data for itself, this paper puts forward a universal model of embedded database combining the characteristic of embedded database. It studies the structure of the model and applies it to tire pressure monitoring system (TPMS). It discusses the hardware design, file frame, physical structure and logical structure of the embedded database of TPMS. Then it sets up a reliable, real-time, convenient database for TPMS. This database will manage the data which come from TPMS effectively when automobiles are running. It makes TPMS can analyze the status of driving car scientifically and provide reliable tire information.
1507
Abstract: Web ontology language, which is discussed usually by people, is abbreviated as OWL. Actually, it specifically refers to the computer Web ontology language, namely a type of computer machine language. OWL is one of the very important components composing semantic Web technology. It is an ontology language that is recently offered by W3C especially for Web language, and its ontology working group makes a description to OWL through a series of documents. OWL is applicable to the description and modeling on the semantic aspects of complex data, and it can establish a flexible semantic model when a lot of complicated structures and rich semantic data are often derived in the development process of software system. All software engineering data systems are managed in modes. OWL, as an ontology language, has been widely valued in the IT industry. However, the development of OWL has been seriously restricted because it is difficult to understand.
1512
Abstract: To solve the problem of only considering constraint verification and ignoring current running environmental security, Economical risk is applied in Role-Based Access Control (RBAC) to weigh user needs and environmental security according to context information and current environment. A model for Role-Based Risk Adaptive Access Control (RRAAC) combining traditional RBAC with new Risk Adaptable Access Control (RAdAC), and the method of risk calculation used in RRAAC model and its mathematic analysis and verification are presented in this paper. This RRAAC model has already been realized in a general personnel management system and experimental result shows that this model possesses great flexibility and certain adaptability coping with environmental changes during access control and task executing in business processes.
1516
Abstract: This paper illustrated the teaching status of packaging experiment in colleges and universities, discussed feasibility of constructing virtual packaging lab on the basis of virtual instrument and information control , introduced hardware structure and software module of virtual packaging lab in detail, and analyzed development of virtual instrument for temperature measurement under liquid filling through examples. Moreover, packaging lab can be constructed with the lowest cost and the utilization rate of experimental instrument can be increased through virtual instrument; this is an important development direction for packaging lab.
1522
Abstract: Cloud computing is rising fast these years. It is making software or hardware more attractive through transform them to services. It provides a new developing opportunity for many research fields. A service-oriented Computational Biology Community Cloud (CBCC) is constructed in this paper. Computational biology related programs are collected, integrated and systematic. A four-layer cloud architecture of CBCC is presented and analyzed in this paper. The key technologies are also discussed. By using browsers, CBCC exposes users a lot of simple and easy use services. Users can easily begin their works on CBCC, process results or make their conclusions. Users no need to learn complex programming or prepare many files like before. Some typical applications on CBCC are introduced. By using CBCC, researchers of computational biology can save a lot time and enhance their working efficiency.
1527
Abstract: The prevail of network in universities brings big impact for the current university students' ideological and political education , also leads to network public opinion have a great influence on university students' thought, attitude. The current network public opinion has become a common concern of the society, also become the focus new areas university ideological and political education. This radical serve the foundation literature of network public opinion as a starting point, doing actual research direct at the four grade students, to understand the current situation of Ideological and political education of university students, at the same time with mathematical statistics method SAS to statistical analysis, constructed a university students' ideological and political education in the network public opinion monitoring model, in order to guide college ideological and political education workers pay more attention to college students' Ideological and political dynamics. Strengthening the collection of information resources links, the effective use of information resources processing, audit functions, to achieve the effective information release, eventually achieve good ideological and political education.
1533

Showing 261 to 270 of 385 Paper Titles