Applied Mechanics and Materials
Vol. 526
Vol. 526
Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials
Vol. 521
Vol. 521
Applied Mechanics and Materials
Vols. 519-520
Vols. 519-520
Applied Mechanics and Materials
Vol. 518
Vol. 518
Applied Mechanics and Materials
Vols. 513-517
Vols. 513-517
Applied Mechanics and Materials
Vols. 511-512
Vols. 511-512
Applied Mechanics and Materials
Vol. 510
Vol. 510
Applied Mechanics and Materials
Vol. 509
Vol. 509
Applied Mechanics and Materials
Vol. 508
Vol. 508
Applied Mechanics and Materials
Vol. 507
Vol. 507
Applied Mechanics and Materials
Vols. 505-506
Vols. 505-506
Applied Mechanics and Materials Vols. 513-517
Paper Title Page
Abstract: Logistics distribution involves preparing goods in the distribution center or logistics node for most reasonable delivery according to the requirements of customers. Genetic algorithm is a random global search algorithm based on the principle of natural evolution. It can be a good solution to optimize the distribution routes. This paper combines genetic algorithm and the simulated annealing algorithm, to which memory device is added, in order to avoid best result losing in the crossover operator of the genetic algorithm. The experimental results show that a memory function with this genetic simulated annealing algorithm in solving the logistics distribution routing problem, can not only get a higher qualified solution, but can also significantly reduce the evolutionary generation that algorithm requires, and obtain solution to the problem in less time.
1740
Abstract: The traditional design method of 3D animation modelings, by which can obtain attractive and precise 3D animation modelings, is to use three-dimensional modeling software such as Maya or 3D Max to draw directly. However, this method is faced with many problems, for instance, the lack of creativity, long design circle, high production costs, etc. For the problem of the lack of creativity, the reason is that animation designers are often subject to the limitation of the existing modelings and design concepts in the design process, therefore, they can not design creative modelings which are attractive and unforgettable enough. [For the problem of long design circle and high production costs, the reason is that although the 3D animation software are powerful, to skillfully master them not only requires users to have knowledge of computer technology and aesthetics at the same time, but also need a long learning process of modeling. Moreover, it takes the designers a lot of time and energy to design, draw and complete each modeling, and this will undoubtedly extend the design circle and increase the costs to some extent. Therefore, how to quickly and automatically generate creative 3D animation modelings has become a research focus of the present computer-aided creative design.
1744
Abstract: With the rapid development of network technology, the Internet and electronic commerce technology is unceasingly used, the application scope of computer application in the hospitality industry booming, online room-booking system also increasingly mature. In this paper, based on the analysis of the present situation of online room-booking system, conducts specific design and system implementation of online room-booking system.
1748
Abstract: For a safety critical computer, large-scale data like database which has to be transferred in an instant time cannot be voted directly. This paper proposes a database update algorithm for safety critical computer based on status vote,which is to vote the database status instead of database itself. This algorithm can solve the problem of voting too much data in a short time, and compare versions of database of different modules in real time. A Markov model is built to calculate the safety and reliability of this algorithm. The results show that this algorithm meets the update requirement of safety critical computer.
1. Communication protocol for database update
1.1 TFTP protocol
TFTP is a simple protocol for transporting document. It usually uses the UDP protocol to realize but the TFTP does not require the specific agreement of implementation and can implement with TCP in special occasions. [This agreement is designed for small file transferring, so it doesn't have function many FTP usually does; it can only acquire or write the file from the server and not able tot list directory, not authenticate. It transfers 8 bits of data with three models: netascii, the eight-bit ASCII form; octet, the eight-bit source data type; mail, no longer supported, it returns the data back directly to the user rather than saved as a file.
1.2 SRTP Ethernet security real-time data transfer protocol
1752
Abstract: With the popularization of network technology, the computer technology is developing rapidly coupled with the emergence of virtual instrument technology. In this context, virtual experiment, an effective complement to the development of the traditional experimental method, has very broad spectrum of application in the field of education, measurement, and even other research areas. Thus, virtual experiment has become an important future development of experimental teaching. Based on analysis of the history and current status of the existing virtual laboratory at home and abroad, as well as the technologies used to accomplish a virtual experiment, this thesis makes a comprehensive study to analyze the construction of the virtual experiment system, including the basic theory of its establishment, the network environment, application classification, the specific tectonic model and technical methods and its development and applications.
1756
Abstract: As one of the new service model of Web 2.0, the emergence of Community Question-Answering system brings a new way for users to obtain information. However, the explosive growth of users and information, it will be hard for users to obtain the information quickly and accurately. Therefore, it is important to find experts in Community Question-Answering system to improve the accuracy and efficiency of information obtaining. This paper firstly analyzed the relationship among users, questions, and answers in Community Question-Answering system, and built the user diagram, and then by means of the Web mining technology, that is the link analysis weighted HITS algorithm, to find experts out. Finally, three evaluation indices were used to measure the validity of the experts finding algorithm. Experimental results show the effectiveness of the weighted HITS algorithm.
1760
Abstract: Product platform is a key theory in mass customization method, and it can satisfy diversely customer needs at high efficiency service and reduce enterprise product development costs. This dissertation explores the product platform development routing and design ability service and resources virtualization and other key technologies in the migration process of product platform to cloud platform in the background of computing clouds technology and product platform theory. It proposes the product platform design service architecture based on cloud computing and its design service modes and the related key technology to the study, including product platform resources virtualization in cloud computing environment and product family design ability services technology and product platform cloud data center retrieval technology, etc.
1765
Abstract: It is a key problem for a 7*24 running system to update and maintain online. According to the feature of OSGi (Open Service Gateway Initiative) framework, current service dynamic update policies for OSGi framework are analyzed. In order to solve the problem of service mutual consistency and service state consistency during service update, the service dynamic update policy based on publish & subscribe model is presented. This policy is based on quiescent state theory to ensure mutual consistency when services are updated online. The process of the dynamic service update policy is described by Petri net. We realize the policy using Event Admin Service in the experiment with well-defined program model. The result shows that the policy is validate and feasibility.
1769
Abstract: Based on the improved enhanced self-tentative (IEST) particle swarm optimization (PSO) algorithm, 2-opt local searching algorithm is introduced in the later evolution stage. 2-opt method further strengthen the self-tentative and make up the deficiency of the IEST PSO algorithm and solve the cross solution problem. The hybrid PSO algorithm greatly increases the chances to find the better solution in the evolutionary process. Time complexity of the 2-opt method is analyzed. Based on this the proper parameters is set to solve different benchmark TSP problems, numerical simulation results show the effectiveness and efficiency of the hybrid PSO algorithm.
1773
Abstract: The computer network attack graph generation method obtained mostly through network scanning, this network reachability information, this approach takes a long presence information and incomplete defects by analyzing network reachability main task of research and developing trends is proposed based on binary decision diagrams algorithm approach to achieve network reachability studies. The algorithm uses the decision diagram modeling firewall rules, through the collection operations to achieve network reachability studies.
1779