Applied Mechanics and Materials
Vols. 465-466
Vols. 465-466
Applied Mechanics and Materials
Vol. 464
Vol. 464
Applied Mechanics and Materials
Vols. 462-463
Vols. 462-463
Applied Mechanics and Materials
Vol. 461
Vol. 461
Applied Mechanics and Materials
Vol. 460
Vol. 460
Applied Mechanics and Materials
Vol. 459
Vol. 459
Applied Mechanics and Materials
Vols. 457-458
Vols. 457-458
Applied Mechanics and Materials
Vol. 456
Vol. 456
Applied Mechanics and Materials
Vol. 455
Vol. 455
Applied Mechanics and Materials
Vol. 454
Vol. 454
Applied Mechanics and Materials
Vols. 448-453
Vols. 448-453
Applied Mechanics and Materials
Vols. 446-447
Vols. 446-447
Applied Mechanics and Materials
Vols. 444-445
Vols. 444-445
Applied Mechanics and Materials Vols. 457-458
Paper Title Page
Abstract: To Test on network is an important method, but how to correct the s by computers is still very difficult. In the paper, according to the teaching experience about net OS, we present an algorithm of automated correction for short answer questions.
811
Abstract: The uncertainty evaluation process of imperfect experimental data is presented in this paper. In the process, data neither in steady state nor under normal distribution compared with the conventional assumptions are considered. Results of the evaluation show that the uncertainty is asymmetry to the mean of the data while symmetry in conventional way. Furthermore, three ways to deal with the uncertainty propagation are discussed, and the probability propagation is simulated by Monte Carlo method.
815
Abstract: The paper proposes a medium access control (MAC) scheme with coordinated and adaptive wakeup scheme designed for delay tolerant mobile sensor networks (DTMSNs). Many applications motivate MAC schemes for DTMSNs that are different from traditional wireless MAC such as IEEE 802.15.4 in several ways: energy conservation and average delay. MAC with coordinated and adaptive wakeup scheme protocol uses a few novel techniques to reduce energy consumption and message overhead rates. It can reduce significantly control overhead and adaptively wake up, and it avoids overhearing unnecessary traffic. Finally, in this paper, simulation applies message passing to reduce contention latency for applications that require in-network data processing. Simulation results show that MAC with Adaptive Sleeping and based on Probabilistic Routing protocol (MAC-ASPR) obtains significant energy savings compared with IEEE 802.15.4 and S-MAC.
821
Abstract: This paper proposed a new distributed peer to peer simulator. The simulator uses message-based event-driven engine with large-scale simulation supported and Cross-platform. Simulator supports multiple protocols, using this simulator test peer to peer agreement, not only to ensure high accuracy, but also effectively reduce the resource consumption and improve the efficiency of the simulation.
830
Abstract: This paper proposed a new structural overlay model HKad. This model employs layered structure, and when constructing the network logical topology of peer nodes, it can detect rock-bottom physical network logical topology fast and efficiently and make it suitable to the rock-bottom network environment, and make the former be consistent to the latter as much as possible and then improve the whole performance of the systems. The goal is to construct a topology-aware overlay network, and improve the finding speed of information, and reduce unnecessary data transmission in networks.
834
Abstract: In the cloud computing federation, the method of cloud computing federation resource scheduling has been introduced to allocate the users requested tasks reasonably to the providers. In the present, single cloud providers method and system of resource scheduling dont apply to the cloud federation environment. Therefore, the solution to the problem of resource scheduling in cloud federation cross data center has become a key technology. The system, mainly about the resource scheduling algorithms across data center, presents the framework and major function of the cloud federation environment cross the datacenter. Furthermore, through Cloudsim, a Web server based system platform was built. Finally, the system proved that it can meet the complicated large-scale demand of users as well as increase the efficiency and profit of resource scheduling among the providers in cloud federation.
839
Abstract: In the case of high class ocean wave, because of the disturbance movement of ocean wave is larger than moment of rudder, it is noneffective to reduce yaw angle with rudder control and it also increase the times of noneffective rudder. In this paper design a filter to deal with yaw angle and reduce the main value frequency impact to heading control system. Filter will reduce the response of heading control system to wave disturbance and then reduce the noneffective rudder. It will reduce the abrasion of steering and energy consume.
844
Abstract: This paper deals with the problem of time-varying multitarget track-before-detect (TBD) using image observation model. The multitarget state is formulated as random finite set (RFS) and its posterior distribution is approximated by multi-Bernoulli parameters, which are recursively evaluated using sequential Monte Carlo approach. The state estimates are first extracted from the updated Bernoulli components with moderate existence probabilities, allowing for all the true targets and false alarms. The extracted target states are then distilled using track consistency test strategy to remain only the true tracks. Simulation results show the improved performance of the proposed method over the traditional multitarget multi-Bernoulli (MeMBer) filter as well as its capability to provide the identity of individual target.
848
Abstract: Robust control for a class of singular systems with distributed delaysand uncertainties is researched. Firstly, a linear state-feedback controller isdesigned. Secondly, without model transformation and matrices decomposition, Asufficient condition for the studied systems, which makes sure the systems tobe regular, impulse free and asymptotically stable, is given by constructingthe appropriate Lyapunov functionals in terms of linear matrixinequalities(LMIs) method and integral inequality technique. The obtained results can be shown in LMIs andsovled easily by LMI toolbox in Matlab. At last, A numerical example is givento illustrate the validity of the method
856
Abstract: Recently, the telecare medical information system, which enables various healthcare delivery services, has been paid more and more attention in countries with aging populations. Using the telecare medical information system, it is possible to bring the advantages of telemedical directly into the patients home. At the same time, it faces some common security threats, thus, only authorized users should be granted the access to this system for the privacy concern. There are many authentication schemes studying protection of user medical information. Unfortunately, these schemes are still vulnerable to some common cyber attacks or has inefficient computational and communication cost. To remedy the weaknesses of these schemes, we propose an enhanced scheme based on elliptic curve cryptography to ensure necessary security and reduce computation load in this paper. By security analysis, we also demonstrate that our scheme is secure and efficient. Therefore, our scheme is suitable for telecare medical information system.
861