Applied Mechanics and Materials
Vol. 616
Vol. 616
Applied Mechanics and Materials
Vol. 615
Vol. 615
Applied Mechanics and Materials
Vol. 614
Vol. 614
Applied Mechanics and Materials
Vol. 613
Vol. 613
Applied Mechanics and Materials
Vol. 612
Vol. 612
Applied Mechanics and Materials
Vol. 611
Vol. 611
Applied Mechanics and Materials
Vol. 610
Vol. 610
Applied Mechanics and Materials
Vols. 608-609
Vols. 608-609
Applied Mechanics and Materials
Vol. 607
Vol. 607
Applied Mechanics and Materials
Vol. 606
Vol. 606
Applied Mechanics and Materials
Vols. 602-605
Vols. 602-605
Applied Mechanics and Materials
Vols. 599-601
Vols. 599-601
Applied Mechanics and Materials
Vol. 598
Vol. 598
Applied Mechanics and Materials Vol. 610
Paper Title Page
Abstract: In recent years, the frequent occurrence of kindergarten school bus driver or teacher left children in the car, which leads to the accident, injury and even death. Based on UHF RFID technology has developed a safety system which can effectively prevent child being forgotten in school bus. After testing, the system is high reliability, low false alarm rate and with easy installation, low cost and so easy to put on the market.
549
Abstract: This article introduces the software system of the intelligent lappet loom. Its structure and implementation are discussed in detail. The purpose of the system is to provide a data management platform for fabric designers. The pattern simulation and the transmission of the design data are implemented. The proposed system can help fabric designers to work more efficiently, so that the cycle of fabric development is shortened and then the cost of fabric production is decreased.
552
Abstract: With the rapid growth of Web services on the Internet, the atomic Web services as nodes and their functionality dependency relationships as edges form a complex Web service network. Various interactions between Web services can occur along the edges, such as collaboration, competition and substitution, etc. So far, however, there lack of an effective and scalable model for generating Web service interaction networks capturing the aforementioned types of interactions, which hinders the relevant researches such as development of new service composition algorithms and the investigation of evolution mechanisms of service networks. In this paper, we propose a model which is able to generate two types of Web service interaction networks, namely complementary Web service interaction network (CWSIN) and similar Web service interaction network (SWSIN). We show that CWSIN exhibits some of the typical characteristics reported in the previous empirical studies.
559
Abstract: We propose an autonomic QoS and QoE management architecture based on causal graphs for IPTV services over IP access networks. Our solution achieves a global self-diagnosis process based on local knowledge of each network element using a model-based diagnosis approach. We illustrate this novel approach in an IMS platform and detail the corresponding causal graph and diagnosis process for IPTV services.
568
Abstract: Electronic certification authority (CA) application has problem in compatibility. The validation between some certification authorities is indispensable. In this paper, special qualities of some overlapped authentication models are analyzed based on the operation application. Also, an electronic authentication public service platform has been designed for compatible application of Multi-CA. The platform is both efficient, and convenient.
579
Abstract: In order to achieve the purpose of “integrating students’ practical capacity, initiative spirit cultivation and humanistic quality, technical literacy and artistic achievement” about vocational technology cultivation, in the teaching research on vocational skill competition, we explore, develop and construct a digital information sharing mechanism and application technology oriented to “multi-level, comprehensive skill competition teaching”. On actual vocational skill cultivation, against the multi-level skill competition teaching, we expand the information technology application, and construct digital information sharing resource pool with certain theory bases and application values.
584
Abstract: this paper investigated resource sharing and allocation in P2P social networks which based on game theory. Firstly, resources are divided into two categories: Public goods (PG) and Club goods (CG). The PG has the following characteristics: self-less, Non-exclusive and un-competitive; but the CG has some self-ish, exclusive and competitive. The PG only to get the sharing fixed costs and transaction costs, but the CG needs to obtain more benefits over than costs. We demonstrated that when providers sharing resource is CG within sharing capacities can achieve the maximum benefits and Nash equilibrium. Secondly, peers are divided into two sets: friends set (FS) and strangers set (SS), providers allocate the CG in different sets within different pricing by the average price. Finally, simulations analyzed benefits of peers sharing the PG or the CG, and then discussed resource allocation in different sets within different payment strategies and resource pricing in the same set.
588
Abstract: It is difficult to assess the design of satellite information application chain, but it is very important to do it. In this paper, we try to assess the information flow instead of the whole designed satellite information application chain. For information exchange can reflects the main characters of satellite information application chain. The assessment of the information flow is much easier, and also reflects the design quality of satellite information application chain.
595
Abstract: In order to adapt to the development trend of cloud computing, next-generation data center virtualized computing, storage and other resources to provide users with dynamic deployment of resources through the network, Equipment and technology such as servers, storage, security and software to connect together to form the infrastructure cloud platforms play a key supporting role. This paper focuses on network bandwidth, cabling systems, network protocols, and explores the next-generation data center infrastructure construction. The important idea is how to deploy more energy-efficient and low-cost, on-demand service-oriented infrastructure cloud.
601
Abstract: To optimize training procedure of IDS based on SVM and reduce time consumption, a SVM intrusion detection method based on GPU is proposed in the study. During the simulation experiments with KDD Cup 1999 data, GPU-based parallel computing model is adopted. Results of the simulation experiments demonstrate that time consumption in the training procedure of IDS is reduced, and performance of IDS is kept as usual.
606