Applied Mechanics and Materials Vols. 556-562

Paper Title Page

Abstract: In this paper, the transmission evolution process based on life-cycle model is proposed, which includes five stages: Producing, Outbreak, Spread, Remission and Termination. It constructs the information transmission model of product quality and safety based on the media influence. And finally the computational result is presented, which show that the proposed model is effective and feasible.
5603
Abstract: The mesh network is an important topology for on-chip networks since it provides great flexibility for the on-chip interconnection with diverse application requirements. We have proposed the tree-based routing architecture for on-chip networks called TRAIN, which achieves deadlock freedom and high-performance communication for on-chip networks. With TRAIN, a packet arriving in a switch can be adaptively routed to utilize a shortcut to reduce the distance to the destination switch efficiently. In this paper, we propose two arbitration schemes in a TRAIN switch and their arbiter designs: the sequential arbiter and the shortcut-first arbiter. The experimental results show that the shortcut-first arbiter achieves better performance than the sequential arbiter, while the former costs larger chip area. With the network size grows, the performance advantage is more pronounced for the shortcut-first arbiter.
5609
Abstract: Retracted paper: In recent years, much research has been devoted to the visualization of 802.11 mesh networks; on the other hand, few have explored the evaluation of Smalltalk. after years of theoretical research into link-level acknowledgements, we demonstrate the understanding of Moore's Law. In this work, we show that even though DNS and DHCP are continuously incompatible, IPv6 and 2 bit architectures are never incompatible.
5614
Abstract: Based on 33-year typhoon information of South China Sea (SCS) in 1980-2012 and NCEP/NCAR reanalysis data, taking Climatology and Persistence (CLIPER) and earlier physical quantities predictors selected by Stepwise Regression (SWR) and Multidimensional Scaling (MDS) methods as model inputs, the Genetic Algorithm-Artificial Neural Network (GA-ANN) forecast model was built for typhoon gale. The forecast verification results for independent samples in MDS-GA-ANN model show that mean absolute error of 24h forecast for wind velocities at 36 grid points around typhoon centers from July to September is 1.6m/s. Using the same samples, the prediction results of MDS-GA-ANN models for independent samples were compared with that of traditional SWR models. Taking July as example, prediction abilities for 29 MDS-GA-ANN models (81%) among 36 grid points around typhoon centers are superior to that of SWR models; only 2 grid points of MDS-GA-ANN models are worse than that of SWR models (6%). Therefore, prediction ability for most of 36 grid points using MDS-GA-ANN models is superior to that of SWR models and can meet business requirements of meteorological stations at present.
5618
Abstract: From the perspective of user’s experience and starting from the user’s emotional experience, it particularly analyzes the interactive need of user to smartphone and interactive design of smartphone. Take a specific research case of iPhone and specifically analyze the emotional experience in the interactive design of iPhone, as well as elaborately analyze specific functions of emotion in the interactive design of iPhone.
5623
Abstract: In the urbanization process, attaching great importance to urban development and how to coordinate the relationship between the historical and cultural heritage protection is already new scientific ideas and urgent duties. With the development of digital technology, the degree of development of historical and cultural heritage has become an important indicator in the evaluation of a national information infrastructure. This paper discusses the application of digital surveying, digital restoration, digital recording, digital protection and other digital technology in heritage protection.
5628
Abstract: In the field of computer, android operating system is a new smart phone platform developed by Google Company. Through the analysis of platform, its advantages are no boundaries between applications, openness, rapid and convenient application development, and equality application, etc. On this basis, this article makes the in-depth study of android system architecture, development and application of related important functional components and related problems such as environment configuration and verifies the availability of the android platform finally by means of relatively short message application.
5632
Abstract: In this paper, discusses the design and realization of large file asynchronous upload and Broken-point continuingly-transferring based on ASP.NET MVC. At the first, brief review the traditional upload method based on HTTP(Hypertext transfer protocol) protocol and ASP.NET(C#), point out the existed malpractices, while introduce the basic principles of asynchronous upload and broken-point continuingly-transferring, and in-depth analysis of the design and realization of the function of asynchronous upload and broken-point continuingly-transferring in ASP.NET MVC.
5636
Abstract: This paper proposed warehouse safety warning system design and implementation method based on multi-sensor fusion: by collecting monitoring the scene temperature, smoke, infrared and video signal and fusion algorithm for decision-making, greatly reducing false positives and false negative rate of the system, increasing the reliability of the system; using two wireless communication networks, increasing the system suitability and scope of monitoring; using modular design approach, increasing the flexibility and scalability of the system. The results show that the use of security warning systems can use the limited funds to address storage warehouse security risks in the complex security environment, improve the efficiency of storage and security management of funds, save manpower, material and financial resources, and reduce storage costs.
5640
Abstract: The paper analyzes a forward-secure group blind signature scheme based on the Chinese remainder theorem in cryptographic method, and points out that the attackers can tamper with the parameters of signature algorithm easily, which causes that the attackers revoke legal group members randomly .At the same time, the article proves the scheme does not have the feature of the blind signature .At last the author comes to a conclusion that the scheme is not safe.
5644

Showing 1251 to 1260 of 1532 Paper Titles