Applied Mechanics and Materials
Vol. 654
Vol. 654
Applied Mechanics and Materials
Vols. 651-653
Vols. 651-653
Applied Mechanics and Materials
Vols. 644-650
Vols. 644-650
Applied Mechanics and Materials
Vol. 643
Vol. 643
Applied Mechanics and Materials
Vols. 641-642
Vols. 641-642
Applied Mechanics and Materials
Vols. 638-640
Vols. 638-640
Applied Mechanics and Materials
Vols. 635-637
Vols. 635-637
Applied Mechanics and Materials
Vols. 633-634
Vols. 633-634
Applied Mechanics and Materials
Vols. 631-632
Vols. 631-632
Applied Mechanics and Materials
Vol. 630
Vol. 630
Applied Mechanics and Materials
Vol. 629
Vol. 629
Applied Mechanics and Materials
Vol. 628
Vol. 628
Applied Mechanics and Materials
Vol. 627
Vol. 627
Applied Mechanics and Materials Vols. 635-637
Paper Title Page
Abstract: In order to resolve the modelling problem of business processes collaboration, especially, the asynchronous communication mechanism problem and the verification problem, combining the respective strengths of Petri Nets and the classical process algebra CCS, a modeling method is proposed in this paper. First of all, modelling the internal view of cross-organization based on Petri Nets, extracting the communication interface and mapping to internal transition to get the public view; Secondly, researching on the asynchronous communication mechanism and modelling the communication process by CCS to get communication behavior view, thus making the verification of collaboration converts to the CCS derivation; Finally, an algorithm is proposed to generate automatically the behaviors possessed by every transition in model view. The modelling method proposed is not only to analyze and verify the structure properties in collaboration, but also to analyze and verify the behavior properties, which brings a huge convenience for further analysis and verification in cross-organizational business process collaboration.
1480
Abstract: This study aims to present a new imputation method for missing precipitation records by fusing its spatio-temporal information. On the basis of extending simple kriging model, a nonstationary kriging method which assumes that the mean or trend is known and varies in whole study area was proposed. It obtains precipitation trend of each station at a given time by analyzing its time series data, and then performs geostatistical analysis on the residual between the trend and measured values. Finally, these spatio-temporal information is integrated into a unified imputation model. This method was illustrated using monthly total precipitation data from 671 meteorological stations of China in April, spanning the period of 2001-2010. Four different methods, including moving average, mean ratio, expectation maximization and ordinary kriging were introduced to compare with. The results show that: Among these methods, the mean absolute error, mean relative error and root mean square error of the proposed method are the smallest, so it produces the best imputation result. That is because: (1) It fully takes into account the spatio-temporal information of precipitation. (2) It assumes that the mean varies in whole study area, which is more in line with the actual situation for rainfall.
1488
Abstract: New production techniques need to be developed in the clothing industry to satisfy the demands of customers. In this paper, a new algorithm, which can transform 3D surface of the prototype garment to 2D cutting pattern, was developed. The corresponding feature points with 2D prototype pattern were defined manually using 3D cursor on the body in advance. Further 3D wireframe of garment prototype was created by connecting feature points. The final pattern of the prototype was obtained by flattening geometrically 3D wireframe of each zone. The visual assessment was also made and proved the algorithm validity. This approach improved the flattened pattern practicality.
1496
Abstract: FDTD(Finite Difference Time Domain) method is widely applied to many branch of computational electromagnetics because of its simple principle and programming. In general, 10 gridding must be used in a wavelength, and time pedometer is restricted because of the request of numerical dispersive and Courant stability condition. Thus, a large number of memory and computational time will be consumed when big dimension and complex structure object is considered, which is beyond the capability of single computer. FDTD Parallel computing technology is a available choice. We researched the computation of RCS based on FDTD and MPI, and the program was done, and its correctness was tested by comparing different result.
1502
Abstract: Based on the classic octree streamline algorithm, an adaptive octree streamline algorithm was put out based on energy criterion in this paper. By comparing the energy in each grid, the grid was reserved that the energy was less than the set, and the grid was meshed to smaller that the energy was more than the set until the energy of every grid was less than the set. Then the points within the grid were deleted except the central point of the grid, and the streamlined data were obtained. Experiments showed that by this streamlined approach, better streamline point of cloud data could be achieved and retained sufficient image detail.
1508
Abstract: Datacenter has evolved to become more business-relevant, dealing with the increasing business data from different systems. Chinese traditional state-owned enterprises, large and small, are in a fast paced competitive market right now, regardless of industry. Determining how to make effective use of the existing huge business data has become a common problem to them. This paper gives typical modern datacenter architecture in a Chinese tobacco industry enterprise, and summarizes the critical factors of the planning of modern datacenter both in management and technical aspects to provide those, especially some similar Chinese traditional state-owned enterprises with some help in the follow-up planning.
1512
Abstract: It is first extended the log4j and then applied the log file distribution function of log4j in E-Commerce service system in this paper. In this way, it can avoid all log information are centralized interspersed in a single log file, effectively disperse the log information of different concerns, easy to monitor and analyze E-Commerce service system operation status. Key words: Log4j, dynamic log file, extension, e-commerce services
1517
Abstract: As a promising communication technology for smart grid system, Fiber-Wireless (FiWi) broadband access network integrating wireless and optical access technologies, is becoming a promising “last mile” access technology. As the front-end of FiWi broadband access network, Wireless Mesh Network (WMN) has the features of high transmission rate, wide coverage and low cost of networking, etc, which can make FiWi broadband access network have the advantages of self-healing, self-configuring and flexibility. As one of the key technologies in WMN, wireless routing protocols play an important role in the performance optimization of WMN, which directly influence FiWi broadband access network. Thus, this paper mainly studies the routing protocols in WMN based on OPNET network simulation platform. By simulation and analysis, this paper shows that Ad hoc On-demand Distance Vector (AODV) routing protocol has low data dropped and good performance in network delay. Dynamic Source Routing (DSR) protocol has low network load. Meanwhile, Optimized Link State Routing (OLSR) protocol has high network throughput.
1522
Abstract: In order to detect hacker attacks and take early countermeasures, this paper introduced a novel mobile botnet called CPbot which uses Google Cloud Messaging (GCM) to spread Trojan on Android devices. First, we presented the network model of this GCM based mobile botnet as well as its command and control (C&C) mechanism. Secondly, we illustrated the different roles that this botnet can play. Finally, we setup a simulation model to discuss the topology of this mobile botnet. The MATLAB simulation result shows that CPbot is robust against single point of failures and has good resiliency to shutdown attempts, its command dissemination is highly efficient and the bot App has very low battery consumption. This analysis indicates that mobile botnet is a leading threat to mobile network security; therefore we must deploy defense strategies against this botnet.
1526
Abstract: Within the layered enterprise application architecture, database is usually the bottleneck of system. Cache technology can significantly improve the system performance and scalability by caching the data in application layer. Firstly, this paper discussed the significance and importance of the Distributed Cache System. Our system provided two kinds of cache mechanism, including replicated cache and partitioned cache. Each of these has advantages and disadvantages. The design and implementation of this system covered problems including consistent hashing arithmetic. This paper described and analyzed data distribution, data update and the procedure of operations in different cache mechanisms. At last, we made the compared test between our system and the similar product, Memcached. We found that there are both advantages and disadvantages of these two products, it points out the direction for our future improvement.
1530