Applied Mechanics and Materials Vols. 556-562

Paper Title Page

Abstract: In-vehicle networks were initially developed to operate in a closed environment and thus their security has not been concerned. However, growing attention has been paid to the convenience and entertainment value of vehicles, and thus automakers are integrating general entertainment devices into vehicles, which brings about the problem of information security. In this paper, the structure of secondary defense system was used to obstruct the Internet and autobody inner in-vehicle networks such as CAN and LIN. We built a strategy ensuring in-vehicle gateway security and an in-vehicle information software system.
5460
Abstract: Activity theory is a useful framework for understanding and constructing the activity in the contexts, and its analysis has practical significance for the research and design of effective teaching mode under the network environment. Based on the theoretical study and analysis of current situation, we think that network teaching is an interactive activity process between learners and learning environment, which follows activity system framework of activity theory. From the perspective of activity theory, we focus on the analysis of network teaching system, analyze the elements and subsystems of network system, and propose the process model of network effective teaching based on this. Finally, we describe the overall design model of effective teaching mode based on activity theory under the network environment and propose the design model of network teaching support environment, in order to provide theoretical support and practical guidance for network teaching.
5466
Abstract: The existing Mashup Platform can only exploit the web service providing APIs, which limits the application scope of Mashup platform. This paper analyzes the HTTP protocol and related technologies, and proposes a semi-automated method for Web information extraction and conversion: the WebAPI system. In WebAPI, users firstly mark pages by hand with browser plug-ins, and then the proxy server grabs the HTTP message flow to obtain the parameters needed. The conversion module of WebAPI analyzes the parameters to create the corresponding Web Service APIs so that Mashup applications can utilize the general Web Service by invoking these interfaces. In this indirect manner, the range of resources that Mashup platforms can utilize is extensively expanded.
5471
Abstract: The 3D models obtained from laser radar are often used to analyze the objects’ reconstruction. Due to the target’s structure and the viewing angle, multi-angle scan are demanded to cover target’s whole surface, which means data got from different directions need to be spliced together. The ICP algorithm can register accurately. But if the surface of target is complex, such as aircrafts, the direct use of ICP algorithm is difficult to complete. In this paper, the corresponding points are found by the point features: normal vector, curvature and point feature histogram descriptor. The initial registration with rotation matrix and translation vector calculated from the corresponding points can be achieved. Then, improved ICP algorithm can be used to register accurately. This method is accurate and reliable with the test of aircrafts data.
5477
Abstract: Analyzing similarities and differences between biomolecular networks comparison through website intuitively could be a convenient and effective way for researchers. Although several network comparison visualization tools have been developed, none of them can be integrated into websites. In this paper, a web-based tool kit named dynamically adaptive Visualization of Biomolecular Network Comparison (Bio-NCV) is designed and developed. The proposed tool is based on Cytyoscape.js – a popular open-source library for analyzing and visualizing networks. Bio-NCV integrates arjor.js which including the Barnes-Hut algorithm and the Traer Physics library for processing in order to express the dynamically adaptive initialization. In addition, in order to maintain consistency, the counterparts in other networks will change while the nodes and edges in one of the compared networks change. Furthermore, Bio-NCV can deal with both directed and undirected graphs.
5482
Abstract: The Quality of Experience (QoE) evaluation for mobile streaming service over LTE network is essential for mobile networking development. However, few QoE researches for mobile streaming service focus on LTE network. Based on the research of QoE for mobile streaming service over other networks, this paper achieves the simulation for network transmission for different videos using H.264 format on the ns-3 LTE simulation platform. What’s more, exponential model fittings are performed for not only single Quality of Service (QoS) parameter and QoE, but also multiple QoS parameters and QoE. Simulation results show that the network parameters and the Mean Opinion Score (MOS) of QoE have strong exponential relationships for streaming service over LTE network.
5488
Abstract: There is a gap between system design and programming in software field. System designers do not use the same kind of language to describe a system as people do on programming. The paper proposes a unified Zhang diagram, which is adaptive to both sides. This diagram uses several simple symbols, connectors and reserved words to represent a whole schema of a system. The experiment shows the efficiency of this diagram in system design and software developing.
5493
Abstract: Adding wireless communication and smart sensing technology into telemedicine filed can enhance the abilities of detecting vital signals of the patients and significantly reduce diagnose cost. An embedded software for monitoring health status based on Zigbee network is proposed in this paper. Motion detection is also exploited to recognize current contexts. Experiments have shown the feasibility of proposed programs which can be easily transplanted into different hardware platform.
5497
Abstract: For a kind of networked control systems with short time-delay, establish discrete time-invariant system model. Construct the Lyapunov function based on the Lyapunov asymptotic stability principle. Using Linear Matrix Inequalities method given the sufficient condition of H robust controller design method of closed-loop feedback control systems. Matlab simulation indicates the effectiveness and correctness of the controller design.
5501
Abstract: Aim to a weapon platform get objects information in aspect of precision stroke beyond visual range, study on a novel method of antiterrorism sensor network. Raise formative network method based on control in order to settle for demands for antiterrorism sensor network. The network topology is distributed plane peer to peer self-organized structure. In the particular geography district, nodes carry on closed loop control, discover routing and maintain it according to the need that the delivering data packets and the state of their link. The simulation results show that the method has characteristic of none-center, self-organized, rapid dynamic which antiterrorism sensor network has. The novel method can be applied in execrably antiterrorism environment.
5506

Showing 1221 to 1230 of 1532 Paper Titles