Applied Mechanics and Materials
Vol. 526
Vol. 526
Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials
Vol. 521
Vol. 521
Applied Mechanics and Materials
Vols. 519-520
Vols. 519-520
Applied Mechanics and Materials
Vol. 518
Vol. 518
Applied Mechanics and Materials
Vols. 513-517
Vols. 513-517
Applied Mechanics and Materials
Vols. 511-512
Vols. 511-512
Applied Mechanics and Materials
Vol. 510
Vol. 510
Applied Mechanics and Materials
Vol. 509
Vol. 509
Applied Mechanics and Materials
Vol. 508
Vol. 508
Applied Mechanics and Materials
Vol. 507
Vol. 507
Applied Mechanics and Materials
Vols. 505-506
Vols. 505-506
Applied Mechanics and Materials Vols. 513-517
Paper Title Page
Abstract: As one of the freshest technologies nowadays, the development of Internet of Things is attracting more and more concerns. Internet of Things is able to connect all the items to Internet via information technology such as RFID and Wireless Sensor Network, in order to realize intelligent identification and management. It is supposed in Internet of Things environments, satisfactory services can be provided through any devices or any networks, whenever it is demanded. It makes that not only PC device but also other small devices with intelligence can be connected to the same network. As a result, It is much more convenient for people to obtain real-time information and then to take corresponding actions.
1915
Abstract: In this article, the numerical scheme of a linearized Crank-Nicolson (C-N) method based on H1-Galerkin mixed finite element method (H1-GMFEM) is studied and analyzed for nonlinear coupled BBM equations. In this method, the spatial direction is approximated by an H1-GMFEM and the time direction is discretized by a linearized Crank-Nicolson method. Some optimal a priori error results are derived for four important variables. For conforming the theoretical analysis, a numerical test is presented.
1919
Abstract: The paper studies how to mine automatically and process the dormancy data and then improve the performance of database management system. It analyzes the main mode of dormant data into the data warehouse, the innovative design of SQL capture and changer function, as well as gives the statistical method of recognition dormant data in data warehouse, and the SQL change and capture function migration to the application server, automatic capture dormancy data without professional intervention. It helps to solve the problem of the lack of staff and cumulative historical data influence performance of the database management system in the small and medium-sized enterprises.
1927
Abstract: A method using the HowNet ontologies for short texts classification was proposed. First, the domain high frequency words were got as the feature words. Then the feature words were extended to concept by HowNet, which extended the feature from semantic and amends the feature scarcity. Last, the word semantic correlation values were got by calculating the distance between different concepts in node tree. Experimental results prove that the classification efficiency and precision are both improved.
1931
Method of Testing Point Optimizing Based on Multi-Echelon Comparison Hybrid Particle Swarm Algorithm
Abstract: This paper introduces the multi-echelon comparison hybrid particle swarm optimization (PSO) algorithm and its processes, and describes its application in the testing point optimization, and the simulation analysis and comparison show that the algorithm improves the convergence speed of global search, and overcomes the shortcoming that fundamental particle swarm optimization algorithm is easy to fall into "premature" convergence and other shortcomings.
1935
Abstract: The computer data mining technology plays an important role in the financial risk management. It can extract the implicit data that people don't know in advance, in the mean time, and potentially useful information and knowledge for managers to provide decision-making reference. This paper introduces the concept of data mining, the process and main technology first, and then introduces the typical application of data mining in the financial risk management, such as customer relationship management, credit risk assessment and financial crisis early warning analysis. At last, it has a summary to provide the risk management for the financial industry.
1940
Abstract: Requirements for software testability is an important basis of design for software design of testability. During the software-testability-design work, a series of software design for testability measures must be taken to make software testing stage less detours, and formulation and implementation of requirements for software testing is an important element. This paper introduces a kind of develop-method of requirements for software testability. According as causal analysis, basing on manifestations of software testability, the method develops appropriate requirements for software testability for software system.
Preface
The software testability is referred to as a kind of attribute that aims to facilitate the application test and improve the location and correction of software error [. To a certain extent, the software testability can solve some problems facing the software test, such as helping the designer to develop the software that is easier to test, so as to reduce the test difficulty, save more test time and optimize the resource allocation. Therefore, the software testability has stood out as quite an important factor that has a great effect on the cost, time and labor allocation of software test, which are also closely related to the quality of software engineering [.
Since the 1990s, the software testability has been widely concerned by the scholars both at home and abroad. According to the relevant literatures collected, the general research direction has been toward the measurement and analysis of the software testability [. It should be noted that a well developed scheme of the requirement of software testability can not only enhance the testability of the target software, but also serve as the evaluation criterion of the testability, which means that it will have special reference to the improvement on the software test [.
Based on the casual analysis, this paper has sought to provide a whole set of the requirement of software testability and come up with a real case so as to approach the design issues of the software testability [.
1 The requirement of software testability
1944
Abstract: At present, all the applied schemes of the digital signature schemes based on the research of the factoring problem, discrete logarithm problem, and discrete logarithm problem on the elliptic curve cant meet the demand of actual application. This paper introduces the knowledge to the digital signature and studies the signature scheme based on the quaternion ring. The scheme introduces the multivariate functions of high degree to non-commutative quaternion ring, and its safety based on the computational difficulty to solve the the multivariate equations of high degree. The article applies this thought to proxy signature and designs a proxy signature scheme. Finally, it gives the safety analysis of the new scheme.
1951
Abstract: Nowadays informational technology is being used in more and more fields. Multimedia, computer, even blog and network become one platform of language teaching and learning. Here an empirical research was conducted to find the effects of application of such technology in foreign language learning. Based on the analysis, the paper explores the correlation between application of technology and English proficiency, and puts forward some constructive suggestions.
1955
Abstract: For the data is fuzziness and the uncertainty on software quality evaluation,on the basis of ISO 9126 quality model,an evaluation model of software quality is established based on fuzzy comprehensive evaluation and analytic hierarchy process in this paper.Through the establishment of software quality evaluation model, we can solve the multi-index evaluation problems of software quality effectively and it can be used to guide users to improve software process.
1959