Applied Mechanics and Materials
Vol. 598
Vol. 598
Applied Mechanics and Materials
Vol. 597
Vol. 597
Applied Mechanics and Materials
Vol. 596
Vol. 596
Applied Mechanics and Materials
Vol. 595
Vol. 595
Applied Mechanics and Materials
Vols. 592-594
Vols. 592-594
Applied Mechanics and Materials
Vol. 591
Vol. 591
Applied Mechanics and Materials
Vol. 590
Vol. 590
Applied Mechanics and Materials
Vols. 587-589
Vols. 587-589
Applied Mechanics and Materials
Vols. 584-586
Vols. 584-586
Applied Mechanics and Materials
Vols. 580-583
Vols. 580-583
Applied Mechanics and Materials
Vols. 578-579
Vols. 578-579
Applied Mechanics and Materials
Vol. 577
Vol. 577
Applied Mechanics and Materials
Vol. 576
Vol. 576
Applied Mechanics and Materials Vol. 590
Paper Title Page
Abstract: The explosive development of the IT field, the number of structured and unstructured data is increasing in geometrical. Also, using these data a number of cyber-crime has occurred. So, the security threat in many areas is a serious problem.The importance of Big Data and analysis techniques has been developing.But, efforts about security are showing a low level relatively.In this paper, we are discussed about security threat and security technology. And, we proposed a new security technique that complements traditional security techniques.
752
Abstract: Online social network is different from the traditional social network. it has distinctive characteristics, such as openness, anonymity, across the region, a high degree of interactivity and complexity. In this paper, community structure analysis in social network of Sina Weblog is analyzed and discussed based on directed network. According to the characteristics of Sina Weblog, We first constructed three kinds of network (such as follow-network, fan-network and all-network) and discussed degree distribution of weibo users. Then, structure and characteristics of Sina Weblog social network community is discussed and analyze based on the three network types on the. The experiments show that part and integral has the same properties, Degree distribution obeys power-law distribution, community has a small world and users are in accordance with six degrees of separation theory in Sina Weblog community. These research results verify that Sina Weblog has the structural characteristics of on line social relation network.
756
Abstract: This paper aiming at the zero-failure data and uncertain-decision problems exist in the information system reliability growth process, it proposes to build the Bayesian network topology of FMEA. It adopts Leaky Noisy-OR model, and it analyses the probability that the subsystem functional module will go wrong in quantity. It solves the problem of identifying the vague and incomplete information exists in the complex system rapidly and accurately, laying the foundation for further study of the reliability growth comprehensive ability assessment of system based on the Bayesian network. In this paper, on the background of Manufacturing Execution Systems (MES) engineering, aimed at research on models and evaluation methods of reliability growth for MES, enclosing reliability of MES task and design target, reliability growth test and analysis methods, it proposes the goal of MES reliability growth planning.
763
Abstract: This paper studies Optimal NT policies for a k-phase service M/G/1 system with Bernoulli vacation schedule. The system contains an unreliable server with a breakdown period and delaying period. The server determines to start service by the policy: the server reactivates as soon as the number of arrivals in the queue reaches to a predetermined threshold N or T time units have elapsed since the end of the completion period. There are k phases of service in the system. After the completion of k phases service, the server may take a short vacation or may remain in the system to serve the next unit, which is defined by Bernoulli vacation schedule. Moreover, we assume the server fails according to a Poisson process whose repair time follows a general distribution. In final, we analyze the system characteristics for each scheme and obtained the optimal NT threshold to minimize the cost function.
768
Abstract: For multiple attribute group decision-making problems in intuitionistic fuzzy theory, a new targeted consistency-adjusting method is proposed to insure the efficiency and consistency of the decision process as well as preserving the original information of the experts. To reach this goal, the new method modifies the evaluation information of the expert who has large difference with the group evaluation information in the level of attribute which differs from the traditional modification without target. By applying the new method in longitudinal position selection model of engine room in naval ships, the practicality of the method is proved. By contrasting to traditional method, it is indicated that the method adjusts evaluation information with high efficiency and little modification of original information.
773
Abstract: Team collaboration for project implementation has become the main pattern in modern work. How to allocate tasks to the right team member is the key for project completion. The paper firstly reviewed the related methods and concepts of team collaboration and knowledge sharing. Then the model of knowledge was built. Based on knowledge model, this paper built the model of the task and the team member. According to the knowledge background and project experience of team members, the paper proposed an allocation model which automatically allocated tasks in group work. Finally, a prototype system was developed for practical validation.
778
Abstract: This paper presents a novel image trading mechanism based on hybrid watermarking techniques. The removable visible watermarking technique is used to provide the safe preview of the protected media. The fingerprinting is used to trace the illegal distributor. Two kinds of watermarking techniques embed watermarks in DCT domain in order to conform to compression techniques. Experimental results show that image trading mechanism based on hybrid watermarking techniques can protect the image with high quality.
784
Abstract: In this paper, a novel image representation coding based on non-uniform Block Truncation Coding (BTC) is proposed. A given image can automatically be partitioned into different regions with different sizes and the bivariate piecewise polynomials are used to do the Least Square Approximation for the pixel values in each sub-region based on BTC bitmap. When the approximation error and initial partition are specified, a specific image partition result is obtained. The image re-construction quality of the proposed algorithm is better than that of the traditional BTC. Based on this algorithm, an effective denoising scheme of image is implemented and some of the experimental examples are illustrated to prove that the quality of the re-constructed image, the denoising effect are all satisfactory and can be referenced by other researchers.
789
Abstract: In this paper we study some combinatorial properties and inequalities of some classes of Z-matrices. These matrices arise in many problems in the mathematical and physical sciences. We show that all (inverse) N0-matrices are irreducible and some eigenvalue inequalities of (inverse) N0-matrices.
795
Abstract: In some typical schemes, the receivers must know the information of a non-maximally entangled state for quantum teleportation. In this paper, using a generalized measurement, we propose a scheme of probabilistic teleportation via a quantum GHZ-entangled state, which is known by only the sender.
799