Applied Mechanics and Materials Vols. 513-517

Paper Title Page

Abstract: In this paper, we prove the strong convergence of an iterative method for finding a common element of the set of solutions of mixed equilibrium problems and the set of fixed points of a finite family of nonexpansive mappings under some suitable conditions. Result presented in this paper improves and extends the recent known results in this area.
382
Abstract: There are many similarities between the intelligence algorithms and the Statistical Physics and Thermodynamics in many aspects, such as the research object, tasks and methods. Firstly, this paper presents the hybrid intelligence algorithms improved by Thermodynamics. Then the theory analysis of intelligence algorithms by Thermodynamics is presented. Finally, a new research direction, that is the novel intelligence algorithm based on statistical physics and thermodynamics, is proposed for the future.
386
Abstract: In order to solve and optimize the task and virtual machine allocation strategy in cloud computing environment, firstly allocation strategy mathematical model, the target of which is the total running time, is established, then a simulated annealing and genetic hybrid algorithm is proposed to solve the mathematical model. The integer coding, a crossover operator, two kinds of mutation operators and the selection mechanism based on simulated annealing strategy are applied in the hybrid algorithm. In the experiments, three sets of data are used to verify the performance of the hybrid algorithm in the Cloudsim software. And the experimental results show that the series of cloud tasks can effectively be assigned to the virtual machine by the hybrid algorithm and the total running time is also minimized by the algorithm.
391
Abstract: According to the situation of inland navigation, to explore the ship remote monitoring system based on 3G mobile communication network, to achieve the long distance identification and monitoring of inland vessels. This paper proposes an overall solution, including smart phone terminal, 3G communication network, Internet network monitoring and management center. The program is an effective supplement of AIS and VTS. The system components and functions are analyzed; this paper deems that the establishment of the system not only for have an important role to improve the safety of navigation, and can greatly reduce investment and has high feasibility.
395
Abstract: The dynamic, heterogeneity and complexity make cloud platform much less credible. As a vital level in cloud computing platform, IaaS is very important to improve the trustworthy degree of cloud. In this paper, we explore this area, we identify the fundamental function provided by the trusted IaaS, we identify the indispensable tasks completed by the trusted IaaS, and then we propose a foundation framework for establishing trusted IaaS. Finally, we gave a conclusion and the direction of future works.
399
Abstract: By analyzing the current problems in equipment automatic test system, we describe the concept, the basic working principle and advantages of service-oriented architecture (SOA), then introduce the web service architecture and the standards of establishing service-oriented architecture. The architecture model of automatic test system on SOA-based equipment was designed, and was used to realize the unified description of equipment automatic test (including fault diagnosis) information. This effectively improves the equipment's capability in performance detection and maintenance support.
403
Abstract: In order to find more efficient and handle the internal network threat with the LAN network threat warning and real-time processing, remote process monitoring and management of computer systems is used in this paper. By getting the system process handle on the local computer, realizes the acquisition of the threat source information of the system. By customization of the application layer protocol AMCP, realizes the efficient information transmission between server and client. In order to enhance the reliability of the system security threat model, the System security threat information is analysised with the anomaly detection algorithm based on statistics. Analysis of the test data shows that: through getting the system process handle on the local computer, the system treating information can be obtained. Through the security threat model based the anomaly detection algorithm based on statistics, network threat is dealed efficiently and real time.
408
Abstract: In this paper, the purpose is to develop a Short Message Service (SMS) system that can aid the ALS patients to control a mobile phone to send a message by using of the steady state visually evoked potentials (SSVEP) brain computer interface (BCI) to a person who can help him/her. The EEG signals may be detected by electrodes and signal extracting chip. Then these signal can be transmitted to the mobile platforms by using of Bluetooth interface. Finally, the message and phone number can be selected in accordance with the components in frequency domain transferred from time domain. The experimental results had shown that the proposed system can easily send a message from a mobile phone to another.
412
Abstract: Considering the relationship among user-to-user, service-to-service, user-to-service, This paper use clustering algorithm to cluster the data, and then re-use model which is based on the population-based recommendation, the content-based recommendation, and collaborative filtering recommendation absorb their benefits and overcome their shortcomings, This paper proposed multi-personalized recommendation service model which is based on the full understanding between interrelated users and services. It can provide users with accurate and personalized service. We verified the model through experiments and carried out the proposed recommendation model drawn feasible.
416
Abstract: This paper discusses how to find out conspirators when only know the topics of messages they sent and received. In order to determine the weight of every topic, we establish AHP model and CNC (Crime Network conspirator finding) model to define possibility, which includes three parameters: the relative connection degreeC(h) , the relative intermediate degree I and the I(h)relative tightness degreeT(h). After that, obtaining scores by synthesizing these three degrees and get a prior list. Through analyzing the list, we can determine the suspected conspirators.
420

Showing 91 to 100 of 1031 Paper Titles