Applied Mechanics and Materials Vols. 602-605

Paper Title Page

Abstract: In this paper, basing on the prisoner’s dilemma model proposed by M.A.Nowak, we present a model to research the action of temptation to defect in prison’s dilemma model. Firstly, we determine whether a player changes its strategy depends on a Fermi equation which is related to the payoffs of the player and its neighbors. If the player changes its strategy next time step, it will select the strategy adopted by the one who gets the highest payoff among its neighbors as its own strategy. Form the results we find that when four neighbors are considered, the density of cooperators will present a downtrend. Well, when eight neighbors are considered, the density of cooperators will decline at the beginning and increase suddenly afterwards. When twelve neighbors are considered, if the density of cooperators is reduced to zero, cooperation will appear again. Thus, the increase of temptation to defect may promote cooperation.
3783
Abstract: The parallel application program development technology and process is analyzed based on the MATLAB parallel and distributed computing toolbox. Hereby, the comparison of the serial computing and the parallel computing is done by computer simulations, and the parallel computing program design and develop method is proposed. The simulations results show that, the parallel computing technology has many advantages in the calculation of high intensive and it is convenience of the parallel application development using MATLAB.
3787
Abstract: Currently, researches on time constraints for access control are not complete. To solve this problem, this paper enriches the time constraints for access control from the following aspects: firstly, we propose a four-tuple representation of time constraint by combining discrete time representation and periodic time representation; secondly, we put forward a function of computing the time of state changing on the basis of (1); finally, aiming at conflicts detecting and resolution for time constraints, we raise an algorithm for conflicts detection and resolution based on XACML and entities overlapping detection.
3791
Abstract: Aimed at the applications of technology of camera calibration to 3D reconstruction, the ideal camera model is discussed, especially on the influences and solving methods of lens radial distortion andtangential distortion, and an arithmetic of camera calibration based on OpenCV (open source computer vision library) in Visual C++ environment is given. This arithmetic makes use of the functions of the library effectively, so it has high calibration precision and good robust. It can meet the needs of august reality and othercomputer vision systems.
3796
Abstract: In order to improve the performance of automobile of human-computer interaction,auto human-computer interaction intelligent and efficient to realize wireless communication and cloud computing server terminal, a combination of the three. The vehicle terminal using the embedded software and hardware design methods to achieve, cloud computing server based on cloud computing data interaction design methods, and finally meets the user interactive eight requirements, improve the user's comfort and safety.
3800
Abstract: Portable terminal equipment maintenance was an important application field of interactive electronic technical manual, based on the analysis of its technical characteristic, a portable maintenance auxiliary equipment which was used for complex equipment maintenance had been designed. The equipment used the latest LAN technology to realize remote communication function, at the same time it integrated the multimeter module, network camera and IETM module, and it achieved the function of signal detection, information query, etc, which met the demand of the equipment maintenance support.
3803
Abstract: As sensor, semiconductor, embedded processing, such as the development of technology, smart home system is more and more get people's attention, make household intelligent has become a development trend. This paper analyzes the key technologies of Internet of things intelligent household the functional requirements, and the key technology of Internet of things intelligent household, expounds the principle and design requirements of the system, on this basis, design a set of relatively complete Internet of things intelligent household system. The smart home system designed in this paper can realize monitoring, alarm, control and reflect the intelligent household convenience and practicability, has wide application prospect.
3808
Abstract: Along with the once again leap development of science and technology, wireless sensor network technology by a great number of agency predicted to be the core technology of power to change the world, has become the one of the important research field both at home and abroad, has wide application background. It is in special scenario application especially, due to the special restrictions on target area, making the advantages of wireless sensor network system well. In this article, through the research of wireless sensor network system, key technologies and difficulties in the design of the Internet of things system for wireless sensor network solution, and describes in detail the system each function module in detail.
3813
Abstract: One optimization decision method is presented in order to solve the problem of how to realize demand response according to RTP in residential electricity. This method aims at minimizing the cost of electricity and the dissatisfaction of the power consumer. Optimization decision model is built based on the classification of residential electricity load and the model is solved by genetic algorithm.The results of an example show that optimal decision-making method can help reduce the cost of electricity and be beneficial to regional power grids’ load shifting. Applying this optimization decision method to AMI can realize Auto-DR according to price signal.
3817
Abstract: The need to securely share information among collaborating entities is increasingly becoming important. It often needed to implement access control (AC) models. The objective of this paper is to design access control policy using formal concept analysis, which is based on mathematical lattice and order theory. We provide discussion on how FCA can be used to capture RBAC constraints. We show with FCA, we can express more intend constrains than it can be done in traditional RBAC approach. The experimental results show that the approach is more resilient to dynamic computer environment.
3822

Showing 861 to 870 of 885 Paper Titles