Applied Mechanics and Materials
Vol. 658
Vol. 658
Applied Mechanics and Materials
Vol. 657
Vol. 657
Applied Mechanics and Materials
Vol. 656
Vol. 656
Applied Mechanics and Materials
Vol. 655
Vol. 655
Applied Mechanics and Materials
Vol. 654
Vol. 654
Applied Mechanics and Materials
Vols. 651-653
Vols. 651-653
Applied Mechanics and Materials
Vols. 644-650
Vols. 644-650
Applied Mechanics and Materials
Vol. 643
Vol. 643
Applied Mechanics and Materials
Vols. 641-642
Vols. 641-642
Applied Mechanics and Materials
Vols. 638-640
Vols. 638-640
Applied Mechanics and Materials
Vols. 635-637
Vols. 635-637
Applied Mechanics and Materials
Vols. 633-634
Vols. 633-634
Applied Mechanics and Materials
Vols. 631-632
Vols. 631-632
Applied Mechanics and Materials Vols. 644-650
Paper Title Page
Abstract: Nowadays Role-Based Access Control (RBAC) is widely used in privilege management framework. In the paper, by the multi – granularity, it realized the effective management with system privileges and proposed the formal description for the concepts and operations. Meanwhile, aiming at the codes mixed problem to permissions analysis logic and business logic, combined with the Aspect Oriented Programming (AOP) design method, the realization of normal privilege management framework is given so as to achieve the decoupling of certification authority with business logic and improving the framework reusability.
3251
Abstract: Cloud computing is a typical network computing model.Large-scale network applications based on cloud computing presents the characteristics and trends of distributed, heterogeneous data-intensive.Smart grid is a complex system running a real-time online.It is a data-intensive applications.How to effectively integrate multiple data centers in the smart grid and let them work together in the cloud computing environment is a question.And how to make rational distribution of data in the smart grid is also a question.Therefore, we propose a global placement strategy based on genetic algorithm.And we give the data placement scheme for solving on data-intensive applications.Through simulation software CloudSim, we conducted simulation experiments and analyzed the effectiveness of the program.
3256
Abstract: This paper presents a framework for generating assembler and disassembler from ADL (architecture description language), which enables processor architecture designers to explore a large design space by quickly modifying the architecture description written in high abstraction level ADL. We present our ADL: GADL(GNU tool chain based ADL) and propose the binary utilities generation algorithms for GADL. Some issues are discussed and resolved which have not been covered by related research. We have implemented the binary utilities generator with the proposed algorithms and used it to generate the binary utilities for a DSP we are designing, which shows the efficiency of the algorithms.
3260
Abstract: When we design a routing protocol for WSNs, it is necessary to found an energy control mechanism to reduce the overhead of wireless communications. Considered that WSN systems need a simple routing protocol in practical applications, we designed a simple Energy-hops-based routing protocol (SERP) in this paper which can be used in most WSN systems with low communication overhead and complexity. We analyzed the performance of the SERP, furthermore we run it in a real WSN experimental system consist by GAINS3 sensor nodes. The experiment result confirmed that the SERP is highly effective by which the WSN system energy can be balance while the working lifetime can be increased.
3266
Abstract: In order to analyze human error how to have effect on manufacturing cell and improve manufacturing efficiency from operators’ point of view, manufacturing cell human error simulation model based on the principle of human-machine integrated is proposed firstly. The realized process of manufacturing cell simulation model is detailed described. After that, human behaviors in manufacturing cell were analyzed and realization mechanisms of main model were introduced. Finally, applied above model and theory in a motorcycle manufacturing cell and simulated various human errors. The simulation result shows that human errors have significant effect on evaluating manufacturing cell performance and the influence degree increased along with the possibility of human make errors. As a result, different production mode should be adopted according to different configuration scheme of organization and personnel stability.
3270
Abstract: Retracted paper: The implications of empathic models have been far-reaching and pervasive. Here, we verify the deployment of systems. In this position paper, we verify not only that context-free grammar and fiber-optic cables can agree to achieve this mission, but that the same is true for fiber-optic cables. This follows from the development of architecture.
3275
Abstract: Recently, the development of electronic commerce has gotten better and better. But the sales tool of e-commerce platforms is not yet mature. In this paper, a sales tool is implemented by using mashup technology combined with MVC pattern to aggregate data from different data sources, such as gostats.com, k780.com. It can help vendors and develop reasonable sales strategy in the e-commerce, by tracking the IP addresses of the visitors on product pages and display the distribution by calling Google Map API.
3279
Abstract: Being important in the field of network security, it is essential to study the firewall technology that has been an indispensable part of computer networks. This paper describes a new design and implementation of ASIC firewall architecture based on the state detection technology. Implementation and measurements in a real network show that the proposed system can provide high performance with reliability, flexibility, and security.
3283
Abstract: The detection technology for malicious attacks to campus wireless network is analyzed. In this paper, a detection method based on PrefixSpan algorithm for malicious attacks to campus wireless network is adopted. Aiming at hostile attacks environment to the wireless network campus, the detection method is proposed to reduce the amount of computation and memory consumption, and through incremental learning to achieve training of large data, and improve performance of mining further. Experimental results show that the proposed algorithm for hostile attacks detection to campus wireless network, can effectively improve accuracy and security of detection, and achieved the desired results.
3287
Abstract: The problem of malicious attacks detection on campus network is studied to improve the accuracy of detection. When detecting malicious attacks on campus network, a conventional manner is usually conducted in malicious attack detection of campus network. If a malicious signature is mutated into a new feature, the conventional detection method cannot recognize the new malicious signature, resulting in a relative low detection accuracy rate of malicious attacks. To avoid these problems, in this paper, the malicious attacks detection method for campus network based on support vector machine algorithm is proposed. The plane of support vector machine classification is constructed, to complete the malicious attacks detection of campus network. Experiments show that this approach can improve the accuracy rate of the malicious attack detection, and achieve satisfactory results.
3291