Applied Mechanics and Materials Vols. 427-429

Paper Title Page

Abstract: This paper presents a new sophisticated platform for solving the topology optimization problems of various fields including structural, heat, other alternative physics and even coupled multiphysics. Although several up-to-date commercial packages have been launched for solving topology optimization, all of them are limited to solving structural problems with specific constraints and objectives, such as volume, compliance, stress, eigen-frequencies and limited a few kinds of manufacturing constraints. This paper pays much attention to extend the power of the commercial software to solve the multiphysics and multidisciplinary problems. For comparisons, the classical structural designs with different constraints are also discussed in this paper. Numerical examples both in 2D and 3D are provided to illustrate the new software.
2436
Abstract: This paper presents a software design useful for power quality analysis and data management. The software was programmed in LabVIEW and Oracle, running on Windows in a regular PC. LabVIEW acquires data continuously from the lower machine via TCP/IP. Using its database connection toolkit, LabVIEW accesses to Oracle to stores and retrieve the power quality data according to different indicators. A friendly GUI was built for data display and user operation, taking advantage of the powerful data-handling capacity of LabVIEW and its rich controls. Moreover, Excel reports can be exported using report generation toolkit in LabVIEW. The software greatly improves the data analysis and management capacity.
2441
Abstract: The basic idea of trust model is to define and expect the entity trustiness according to the history behavior of an entity; it was firstly proposed to solve the question of the trust evaluation in distributed system. And the trustiness is an important reference for choosing an object entity to cooperate. The choice of trust model process in the implementation of public key infrastructure is a key starting step. Paper firstly introduces the concept of trust and trust model, and then the situation of the study was introduced. Finally we compared typically trust model.
2445
Abstract: Traditional supervised classification method such as support vector machine (SVM) could achieve high performance in text categorization. However, we should first hand-labeled the samples before classifying. Its a time-consuming task. Unsupervised method such as k-means could also be used for handling the text categorization problem. However, Traditional k-means could easily be affected by several isolated observations. In this paper, we proposed a new text categorization method. First we improved the traditional k-means clustering algorithm. The improved k-means is used for clustering vectors in our vector space model. After that, we use the SVM to categorize vectors which are preprocessed by improved k-means. The experiments show that our algorithm could out-perform the traditional SVM text categorization method.
2449
Abstract: This paper mainly discusses the 3D reconstruction of pipelines from 2D DWG format files, which are widely used in architectural design, municipal planning and so on. To address this nontrivial problem, a novel method is proposed, which consists of two steps. In the first step, the entity information is extracted from DWG format files based on the DWGDirect technology. Subsequently, a 3D modeling procedure is followed by using OpenSceneGraph and the extracted entity information. Several experimental instances are given to demonstrate the validity of the proposed method.
2454
Abstract: With the deepening of the degree of enterprise information,SSL VPN is gradually becoming an important way for remote enterprise users safely connecting with internal servers.SSL VPN takes the role of being an agent of remote clients to access the internal servers.Such function is called HTTP Proxy Server.To avoid being attacked,HTTP Proxy Server encrypts the IP of internal Web Server.This paper presents the design and implementation of the secure HTTP Proxy Server in SSL VPN.
2458
Abstract: E-Box multimedia system is developed for the rich audio and video resource on the Internet and on its server side, it can automatically search and integration of network video and audio resources, and send to the client side for the user in real-time broadcast TV viewing, full use of remote control operation, Simply its a very easy to use multimedia system. This article introduces its infrastructure, main technical ideas and you can also see some details about server side and client side. At the same time, the improvement on how to collect and integrate video resources is comprehensively elaborated.
2462
Abstract: The Internet of Things is a novel paradigm in the scenario of modern wireless telecommunications. It has high impact on several aspects of everyday-life and behavior of potential users. However, it raises serious concerns over individual privacy in the new environment of smart things. In this paper, we provide for an overview on privacy preserving techniques in the Internet of Things and discuss the present problems and directions for future research.
2466
Abstract: With the development of molecular-bio technology, the feature of DNA molecules for ultra-large-scale data storage has created a new approach for data storage. This paper gives a way of strengthening key transport security. Through recombinant DNA technology, use only sender-receiver know restriction enzymes to combine the key DNA and the T vector, to form a recombinant plasmid, making the key DNA bio-hide, and then place the recombinant plasmid in implanted bacteria .
2470
Abstract: Resource optimum scheduling with resource constraints is a complicated optimization problem. In this paper, in order to address complex resource management issues, some optimizations are adopted, such as, making use of the spare time between two subtasks which are on the same node, optimizing the order of executing subtasks, and so on. The algorithm can approximate the optimal solution quickly and stably. The simulation results demonstrate that the algorithm works effectively for this class of problems.
2473

Showing 541 to 550 of 657 Paper Titles