Applied Mechanics and Materials
Vol. 555
Vol. 555
Applied Mechanics and Materials
Vol. 554
Vol. 554
Applied Mechanics and Materials
Vol. 553
Vol. 553
Applied Mechanics and Materials
Vol. 552
Vol. 552
Applied Mechanics and Materials
Vol. 551
Vol. 551
Applied Mechanics and Materials
Vol. 550
Vol. 550
Applied Mechanics and Materials
Vols. 548-549
Vols. 548-549
Applied Mechanics and Materials
Vols. 543-547
Vols. 543-547
Applied Mechanics and Materials
Vols. 541-542
Vols. 541-542
Applied Mechanics and Materials
Vol. 540
Vol. 540
Applied Mechanics and Materials
Vol. 539
Vol. 539
Applied Mechanics and Materials
Vol. 538
Vol. 538
Applied Mechanics and Materials
Vols. 536-537
Vols. 536-537
Applied Mechanics and Materials Vols. 548-549
Paper Title Page
Abstract: This paper investigates power and rate control for wireless networks with time-varying uncertainties. A new power and rate control algorithm via dynamic output feedback is presented based on adaptive control technique and robust H∞ control approach. The adaptive H∞ performance of the closed-loop system is analyzed based on the linear matrix inequality (LMI). Simulation results are given to demonstrate the effectiveness of the proposed controller.
1524
Abstract: Delay tolerance is a major design concern for supporting underwater acoustic wireless sensor networks (UA-WSNs) to carry out tasks in harsh subsea environments. Due to the great difference between the underwater acoustic channel and the radio frequency channel, most of the existing routing protocols developed for terrestrial wireless sensor networks perform poorly in underwater acoustic communications. In this work, we present a Neural-Q-Learning algorithm based delay tolerant protocol for UA-WSNs. Due to the advantages of the artificial neural network along with the Q-Learning algorithm, the ferry node is capable of determining an optimal route in a two-dimensional continuous space to relay packets effectively and efficiently between sensors. Simulation results show that the delivery delay and delivery cost of the network significantly decrease by maximizing the meeting probability between the ferry node and sensors.
1530
Abstract: Focused on the operation management of equipment, the workflow of NC equipment informatization management was deeply analyzed in this article. The functional structure of equipment management system was studied here. And, the equipment information management system was developed based on B/S structure. The system was applied to manage the basic information, Spare parts and Maintenance of the NC Equipment by way of information and automation, and realize the traceability of equipment maintenance and spare parts management throughout the whole Life Cycle. The alete integration of the Equipment Information Management System and other system, such as DNC, MES and ERP, was realized. And the integrated system effectively promoted the information interaction between layer of enterprise, workshop and equipment.
1536
Abstract: SFMEA is an important method of improving software reliability. To solve the problem that there are no clear levels or variable clues in Detailed-level SFMEA, focusing on software architecture, the Detailed-level SFMEA method based on Level-dependence model is proposed. The method as follows is advanced:Level-dependence model is constructed to make the software variables clues visualized; variables to be analyzed are selected combined with the model’s features; failure modes are identified based on the model’s attributes and common failure mode library; the affect’s propagation and causes’ analysis are converted to the reachability problem of the nodes.
1543
Abstract: Tweeter, which is very popular as a micro blogging services, offers numerous of information. It is necessary to find more useful information with less effort. This paper purposed a method of information processing when collecting the latest tweets by specific keywords, such as user screen name, keywords of tweets, username and location. For each query, no more than 200 latest tweets will be gathered. During the implementation of information processing, Twitter Search API [1] is adopted to collect tweets. Once those tweets are collected, they will be stored into database firstly which makes sure the database is always up to date. Tweets will be fetched from database when there is a query.
1549
Abstract: With the development of game industry, the requirements of game AI are also increasing. Recently a planning formalism called HTN (Hierarchical Task Network) was used to design AI behaviors. In this paper we describe how to implement an anytime planner based on HTN to handle a dynamic environment, which is the key feature of computer game worlds. This planner allows agent to interrupt its sequence of actions at anytime based on the changes of environment meanwhile return a valid replacement plan. We use Unreal Tournament 2004 which is a famous first-person shooter game as the platform and test our anytime planner.
1553
Abstract: Accompany the widely use of smart phone in China, all inputs and routes packets streams to the Telecommunication Content Distribution Service Switching Centers (TSC). There is a tendency to put more capability into the switch, such as retain or query passing by data. Thus we definitely need to think about what can be kept in working storage and how to analysis it. Obviously, the ordinary database cannot handle the massive dataset and complex ad-hoc query. In this paper, we propose MRTSC, a MapReduce deep service analysis system based on Hive/Hadoop frameworks. A distributed file system HDFS is used in MRTSC for fast data sharing and query. MRTSC also optimizes scheduling for switch analysis jobs and supports fault tolerance for the entire workflow. Our results show that the model achieves a higher efficiency.
1557
Abstract: Pixel value graphical password scheme was introduced with the aim to solve problems faced by users during authentication process that arising from current graphical password scheme weaknesses. Even though the idea of graphical password scheme is still under analysis stage, many researchers have come out with a lot of vulnerabilities finding for current graphical password scheme. Literature studies on vulnerabilities finding has contributed for a development of method design features and requirements for pixel value graphical password scheme. This paper is organized as begin with a brief introduction on graphical password scheme, followed by literature study outcome, discussion on features and requirements, and enclosed with topic conclusion.
1561
Abstract: Main station system of demand monitoring center, as the important part of the Marketing Technology Support System, is the technical support system to achieve customer site information collection, load monitoring, analysis and forecasting of the electricity market, and plays a fundamental and fore running role. This article, tries to make a detailed architecture design of power marketing demand-side monitoring center system from the physical layer, software layer, data layer, technology layer, and application layer respectively, and provides a good reference for the electricity companies and a number of related companies to build demand-side monitoring platform.
1566
Abstract: As the complexity of the indoor propagation environment so that the accuracy of analyzing the millimeter wave propagation characteristics are affected. In this paper, ray tracing method is used to analyze the situation of ample area and finite-difference time domain is used to analyze the complex area contains a discontinuity point. The methods are combined to research the indoor millimeter wave. Working frequency was given at 30GHz, source respectively in both indoor and outdoor situation, indoor millimeter propagation characteristics and method of modeling. Simulation results from MATLAB were compared with reference and show that the hybrid method is helpful and accurate for modeling the indoor millimeter.
1571