Applied Mechanics and Materials
Vols. 568-570
Vols. 568-570
Applied Mechanics and Materials
Vol. 567
Vol. 567
Applied Mechanics and Materials
Vol. 566
Vol. 566
Applied Mechanics and Materials
Vol. 565
Vol. 565
Applied Mechanics and Materials
Vol. 564
Vol. 564
Applied Mechanics and Materials
Vol. 563
Vol. 563
Applied Mechanics and Materials
Vols. 556-562
Vols. 556-562
Applied Mechanics and Materials
Vol. 555
Vol. 555
Applied Mechanics and Materials
Vol. 554
Vol. 554
Applied Mechanics and Materials
Vol. 553
Vol. 553
Applied Mechanics and Materials
Vol. 552
Vol. 552
Applied Mechanics and Materials
Vol. 551
Vol. 551
Applied Mechanics and Materials
Vol. 550
Vol. 550
Applied Mechanics and Materials Vols. 556-562
Paper Title Page
Abstract: Artificial Neural Networks have been used for a wide variety of chemical applications because of their ability to learn system features.This paper presents the use of BP neural networks for soft senor of the cell concentration.For microbial concentration in fermentation process of the problem of real-time online detection,from the perspective of biological cell metabolism in the process of fermentation were analyzed by the correlation of metabolic parameters,then these parameters as the input variables, established the cell concentration BP neural network model of soft senor for biomass parameters detection in complex system.The simulation results show that the soft senor method has highly accuracy and can well applied in the biological fermentation process.
6167
Abstract: Retracted paper: Unified interactive models have led to many appropriate advances, including Lamport clocks and DHCP. this follows from the visualization of voice-over-IP. Given the current status of low-energy models, cyberneticists compellingly desire the investigation of randomized algorithms. Onocerin, our new approach for evolutionary programming, is the solution to all of these grand challenges.
6171
Abstract: Amount of legacy systems in early stages are fall behind multi-core ages, and these legacy systems were designed for single processor which can not expand the computing power of the multi-core hardware. In this paper, we employ aspect oriented programming technology and design the crosscutting concerns for the potentially parallelizable software components of legacy systems. We propose a new multi-core programming model which can change the single thread of legacy systems into multi-threads for multi-core hardware platform without revising the source code of legacy systems. The proposed method can enhance the performance of software and utilization of hardware.
6175
Abstract: With the rapid development of information technology, the extensive use of cloud computing promotes technological change in the IT industry. The use of cloud storage industry is also one solution to the problem of an amount of data storing, which is traditionally large, and unimaginably redundant. The use of cloud computing in the storage system connects the user's data with network clients via the Internet. That is to say, it not only solves a lot of data storage space requirements in request, but also greatly reduces the cost of the storage system. But in the application of cloud storage, there are also many problems to be solved, even to some extent which has hindered the development of cloud storage. Among these issues, the most concerning one is cloud storage security. The following passages discuss the problem and propose a solution to it.
6179
Abstract: A large number of concepts such as, composition, abstraction, autonomy, lose-coupling, are introduced with Service Oriented Architecture (SOA). This diversity of concept is at the same time the strength and weakness of SOA because it may affect the realization of its benefits if not well controlled. Therefore, it is necessary to adopt an appropriate model based on SOA governance. In this paper, we propose a generic SOA governance model for all service life cycle, from design Time, Run Time to change Time. This model is mainly based on the communication of each phase within a service life cycle among all stakeholders, developers and different department leaders of the organization, so as to check services concerning capability, security and strategic business alignment. This model contains 3 kinds of groups: SOA Board Team is concerned with applying enterprise governance strategy; SOA Core Team is a group of business which takes direction from the SOA Board to help implement the required services, and IT team department which oversees the implementation of SOA related activities. The Case study and its analysis show that the more flexible & efficient organization structure, and a permanent supervisor of the service’s operations and organization goals can be obtained by using our proposed model.
6184
Abstract: This paper proposes a correlation analysis method based on fuzzy rules and artificial immune. Firstly, we adopt the alarms selection algorithm based on a sliding time window to improve the efficiency of selected alarm. Secondly, the analysis method based on fuzzy correlation rules is used to associate the known patterns static and rapidly. Then, using a method based on immune evolution to improve and adaptive the antibody so as to achieve the dynamic, intelligent correlation of unknown model. The experimental results in LLDOS1.0 and LLDOS2.0 show that the new method gets better accuracy than typical correlation methods, which can ensure the efficiency of correlation analysis and the adaptability of the correlation method.
6191
Abstract: Cloud computing is a fast-developing Internet computing paradigm. It includes large numbers of IT resources, forms a large virtual resources pool, and offers the remote Internet users on-demand IT services. The easy, cheap and elastic resources in cloud are pulling increasing attentions of the enterprises and users. It is becoming the attention of the academia, industrial sectors and governments. However, the security problem is confining its popularization and development.
6196
Abstract: The presence of large amounts of Data Island in medical information system seriously hindered the whole process coordination and integration of the health service. To solve above problems, this paper, on the basis of the analysis of characteristics of medical information resources, put forward medical information sharing system based on cloud computing, discussed the medical computing platform and key technology of the system structure and in the technical implementation, on the basis of Hadoop platform and virtual platform Tashi, demonstrates the feasibility of the system by using graphs to cloud computing distributed programming.
6199
Abstract: This paper presented a improved method of hash table, the algorithm based on transform and conquer, established a number of small-scale array, then imitated binary search processes and reduced the hash collision. Simulation results shows that , not only the continuous memory requirement is reduced greatly, but also that when the hash collisions occur, the searching efficiency is improved by an order of magnitude from O(n) to O(logn), the space utilization rate is also improved greatly.
6203
Abstract: With the wide application of computer network, network security issues become increasingly prominent. Currently, the most commonly used network security evaluation method is risk assessment method, as well as to test and evaluation system of safety degree by software vulnerability scanning tools and so on. However, network security is related to computer, communication, physics, mathematics, biology, management, social, and many other fields, which is complicated system engineering. As a result, poor operational safety exist in the existing method, thus in this paper, the research of computer complex network reliability evaluation method based on GABP algorithm is put forward.
6207