Applied Mechanics and Materials Vols. 536-537

Paper Title Page

Abstract: With the improvement of living standards, people's demands for culture are increasingly high. Based on the research of Android platform and Cloud computing technology, it builds a Cultural Compound system based on Android platform in this paper. It utilizes Cloud computing technology to build a network management unit, uses AMAP to provide the users location information. It can provide users to search the surrounding nine different kinds of cultural venues. Meanwhile, it has a lot of features. Especially, cultural venues can push their information to the users through this system. This system can allow people more convenient to get cultural information through mobile phone at any time and at any place to meet peoples spiritual needs.
657
Abstract: With the aim at resolving the failure problems of Web-Services-Based electronic information systems, which are caused by web services' failure, we propose a QoS model and evaluation methods of web services collaborated with LAN. On that basis, we design a composite adaptive strategy. This strategy uses the reliability of the web services to assist the selection, and uses the web services backup set to achieve a quick fix. The analysis of feasibility shows that this strategy can obviously reduce the failure ratio and the average recovery time of the composite services.
662
Abstract: Combining the development tendency and the current situation of information system, this article provides the design idea and structure of new software system based on reused technology and information sharing principle. It also discusses the key elements and problems when the reused technology is applied into practice. It is meaningful for building the structure of the new information software system.
668
Abstract: Software product line has been a key area of concern in software industry due to its advantage on the productivity and quality of software products. At same time, both software organizations and the academic community are aware that the software measurement is necessary in software product line. However, there are many problems: what is difference in software product line measurement, how about their measurement process in the end, etc. It addresses this problem by creating a specialized Software Product Line Measurement Process Capability Maturity Model (SPLMP-CMM). SPLMP-CMM including five maturity levels: initial, tentatively, defined, compesive and optimized. The model focus on the basic practice areas which should be implementing of every level, it helps the originations to assess their measurement process and provides guidance for them to a higher maturity level.
673
Abstract: Currently, the study of virtual machine migration in cloud computing platform which usually did not consider the trustworthiness of target physical machine. For this, the paper proposes a trusted virtual machine migration with performance constraints algorithm (TVM2PC). The trustworthiness of target physical machine includes direct trustworthiness and indirect trustworthiness. By this method, a virtual machine will be migrated to a trusted physical machine. A large of experiment shows that the proposed method can give a better result than the existing method in load balancing and trustworthiness.
678
Abstract: Retracted paper: Unified highly-available information has led to many compelling advances, including evolutionary programming and virtual machines. Given the current status of replicated information, hackers worldwide particularly desire the refinement of voice-over-IP, which embodies the significant principles of networking. Hackers worldwide agree that self-learning symmetries are an interesting new topic in the field of robotics, and electrical engineers concur. In fact, few leading analysts would disagree with the construction of multi-processors, which embodies the natural principles of cryptography. Our focus in this position paper is not on whether RAID can be made compact, optimal, and real-time, but rather on proposing new heterogeneous configurations.
683
Abstract: When the number of group members changes, public feature key of the group manager must be changed. The deletion of group members is based on the mathematical principle that the secret feature key of each legitimate member will update with the group managers changing of public feature key. Cancel the update operator, create independent secret feature key for each legitimate member, so that the secret feature key of each legitimate member will be irrelevant to the group public feature key. This method can be used to improve the signature computational efficiency and to delete group members effectively.
689
Abstract: Trust model is the foundation of the whole secure architecture because it determines the trust form adopted and the risk to adopt it in network. So the research of trust model in PKI has been the hot spot of PKI technology. Firstly, some backgrounds of PKI and trust model as well as the problems to be solved by the model are discussed. Through analyzing and comparing several extant CA-based trust model, their advantages and disadvantages are described. Finally, PKI trust models are summarized, and the future research directions were discussed.
694
Abstract: This article explores the cloud computing era, schools, teachers, students, parents and education management institutions, through interactive classroom teaching equipment, build wisdom and effective classroom. Feedback based on classroom teaching and analysis of the short board of teachers and students, teachers teach on demand, student learning on demand. Push services using cloud services platform, to build personalized teaching and learning environment.
698
Abstract: High temperature will affect reliability and performance of multicore system. In this paper, we propose a temperature-aware task scheduling algorithm for real-time multi-core systems, which combines the DVFS and energy balancing by analyzing workload information and multicore utilization. At first, calculate average utilization ratio of tasks. Secondly, balancing strategy according to the workload is proposed for uniform temperature distribution on the cores. Finally, adapt the HR-2 and DVFS to scheduling tasks in each core. Simulation results show that the proposed scheduling algorithm obtains a better effect in temperature and energy-saving than other algorithms.
703

Showing 131 to 140 of 348 Paper Titles