Applied Mechanics and Materials
Vol. 442
Vol. 442
Applied Mechanics and Materials
Vol. 441
Vol. 441
Applied Mechanics and Materials
Vol. 440
Vol. 440
Applied Mechanics and Materials
Vols. 438-439
Vols. 438-439
Applied Mechanics and Materials
Vol. 437
Vol. 437
Applied Mechanics and Materials
Vol. 436
Vol. 436
Applied Mechanics and Materials
Vols. 433-435
Vols. 433-435
Applied Mechanics and Materials
Vol. 432
Vol. 432
Applied Mechanics and Materials
Vol. 431
Vol. 431
Applied Mechanics and Materials
Vol. 430
Vol. 430
Applied Mechanics and Materials
Vols. 427-429
Vols. 427-429
Applied Mechanics and Materials
Vols. 423-426
Vols. 423-426
Applied Mechanics and Materials
Vol. 422
Vol. 422
Applied Mechanics and Materials Vols. 433-435
Paper Title Page
Abstract: Cloud computing is a term within coined within the past several years. The mere mention of the term may cause confusion or disagreement on the scope of cloud computing. This paper provides out of a large resources, and charging according to the actual amount of resources consumed is a shared characteristic of cloud computing.
1756
Abstract: In the WEB2.0 environment, the report of public events will appear on the Internet as soon as they occur and attract a large number of peoples attention in a very short time. It is believed that the Internet public opinion represents the social public opinion. Hence, it is very valuable to study the relationship between the Internet public opinion and mass emergencies. In this paper, we proposed an improved effect model of the Internet public opinion spreading on mass emergencies. Different from the original model, we use variables as the parameters of the equation instead of constants and the whole mass emergency is divided into five stages. In the first two stages, the new participants proportion u(t) and the new leavers proportion v(t) holds the inequality u(t)≥v(t), and in the other stages, they hold u(t)≤v(t). Simulations show that the design of our proposed model can well fit the mass emergency development process.
1760
Abstract: For old and new systems data integration of the functional requirements, design and develop the data conversion module, satisfied with the development of new systems based on the existing system for data integration process, the offsite data across heterogeneous systems level ERP system needs to synchronize data. The module has been designed and implemented in the enterprise ERP system has been its application.
1765
Abstract: This article has introduced the composition of the engineering machinery virtual designing and manufacturing system which is based on the microcomputer platform, introduced the implementation plan of the system and the key technology such as the development of general machinery part CAD system, movement simulation, finite element analysis, NC code automatically programming, Visible CAPP system based on Solid Edge platform, the realization of network issue system and Solid Edge integration technology.
1770
Abstract: This paper focuses on the research of the transformation process of workflow engine caused by relevant information changes within the node.This paper describes how to improve the flexibility of the workflow engine from three aspects,that is,adapting to nodes’ internal circuit changes,dealing with nodes’ audit type and quantity changes, and version change processing.
1776
Abstract: Simulation technology provides a powerful tool for the package design. Parasitic are one of the most important factors for press pack IGBT. By the aid of the simulation software, the package parasitic is extracted and the current distribution among paralleled chips is analyzed. Simulation results confirm the theoretical analysis and verify the efficacy of the new approach.
1782
Abstract: The electromagnetic properties of the material have been paid much attention as time goes by. The electronic large-scale material simulation is always a big problem. Parallel processing simulation codes is a good choice and a new method is proposed to simulate only one quarter of the structure and finally a small structure patch antenna with wide material is introduced to validate the method.
1786
Abstract: This paper works on the general design of tracking ships system software structure with an eye to the complexity of information source of maritime tracking, and illustrates the design technique, methods and application examples in its realization. In this paper, a separation of system software function from specific data format is proposed to adapt to the difference in data structure resulting from each tracking ships unique equipment position and parameters. The difference in data structure is represented by parameters. The format information passed by parameter files is recorded by equipment sequence structure. A parameter program configuration is utilized and through real-time tracking data the allocation of system software is finished. The system can automatically adapt to data of different structure and treat all formats without rectifying software. The application software system designed in this conception has been used till today without major adjustments in its main structure. All changes can be adjusted via data files and in this way realizes adaptive processing.
1790
Abstract: Stream Control Transmission Protocol (SCTP) is a new generation of reliable transport layer protocol, unlike TCP, it has new features of multi-homing and multi-streaming, and has good scalability. SCTP is expected to replace TCP as the next generation of universal transport layer protocol. We introduce and analyze the basic structure and features of SCTP, introduce the related research of SCTP, including the implementation method of mobile SCTP and the Concurrent Multipath Transfer mechanism. Finally, compared and analyzed the performance of TCP, SCTP and SCTP-CMT by the ns-2 simulations, results show that in the case of multiple paths are available, the transmission performance of SCTP and SCTP-CMT are both better than TCP.
1795
Abstract: To reduce the algorithm complexity and improve performance, comparison table is created, and then encrypted by a randomized ten-bit serial number. Serial number forms the first key named key1, and the encrypted comparison table forms the second key named key2. Watermarking image is transformed into a binary bit stream. By using tuples primary key, key1 and key2, each tuples unique Id is computed. According to the watermarking length, all tuples are divided into different groups. Using tuple Id, by searching the encrypted comparison table, each tuple group can embed one bit information of watermarking. Robustness and security of this algorithm are tested by experiment.
1800