Applied Mechanics and Materials Vols. 651-653

Paper Title Page

Abstract: Static analysis tools can generate plenty of information about the software. This paper uses the information to build the evaluation metrics of software maintainability, and unified these metrics. Then, we put forward a calculating method of the weights of metrics and create a software maintainability evaluation model. The results of software evaluation show that this method can evaluate the software maintainability objectively and qualitatively, and provides guide for decision-making and execution of software maintenance.
1757
Abstract: In this paper detection method for the illegal access to the cloud infrastructure is proposed. Detection process is based on the collaborative filtering algorithm constructed on the cloud model. Here, first of all, the normal behavior of the user is formed in the shape of a cloud model, then these models are compared with each other by using the cosine similarity method and by applying the collaborative filtering method the deviations from the normal behavior are evaluated. If the deviation value is above than the threshold, the user who gained access to the system is evaluated as illegal, otherwise he is evaluated as a real user.
1761
Abstract: Removed due to plagiarism
1767
Abstract: The abilities of summarization, learning and self-fitting and inner-parallel computing make artificial neural networks suitable for intrusion detection. On the other hand, data fusion based IDS has been used to solve the problem of distorting rate and failing-to-report rate and improve its performance. However, multi-sensor input-data makes the IDS lose its efficiency. The research of neural network based data fusion IDS tries to combine the strong process ability of neural network with the advantages of data fusion IDS. A neural network is designed to realize the data fusion and intrusion analysis and Pruning algorithm of neural networks is used for filtering information from multi-sensors. In the process of intrusion analysis pruning algorithm of neural networks is used for filtering information from multi-sensors so as to increase its performance and save the bandwidth of networks.
1772
Abstract: With the development of Information Technology, the traditional software engineering method is no longer fully meet the needs of software development. Thesis, according to the point of view of bionics, combined with the analysis of animal architecture, presents the concept of bionic components characteristic of animal body organs and the software engineering method which uses bionic components as the basic unit, based on bionic component method for short. In this paper, the bionic component model, the process model based on bionic component method and the life cycle model based on bionic component method are studied. And on the basis of these models, detailed describes the software development method based on bionic components.
1776
Abstract: The modern hospital is a knowledge intensity organization and the knowledge management has become inevitable development trend of the hospital management. The medical profession background is the data resources of the health profession, and the quality of data resources directly influences the effect of hospital knowledge management. How to fully use the data resources of hospital for enhancing the innovation strength and the core competitive power of the hospital have already become the main focus of the health and academic professionals. The current status of medical profession data resource has been reviewed, the related concepts about data, information and knowledge have been differentiated and analyzed, and the knowledge management system based on the data resources has been constructed, which mainly includes: the hospital background, the knowledge management technology, the knowledge management mechanism, the knowledge management system and the knowledge management process etc. The primary contents of these various parts have also been outlined.
1784
Abstract: Efficient intra-cluster communication on the MAC layer in the underwater acoustic sensor networks has always been the primary concern. However, the existing MAC protocols are not suitable for the intra-cluster communication. In this paper, we analyze some typical MAC protocols and the reasons for their unsuitability. We propose IC-MAC, an Intra-cluster MAC protocol based on a model of intra-cluster nodes location. This protocol realizes the slot synchronization between nodes, sleep mechanism and collision avoidance. Finally, we simulate IC-MAC, TDMA and T-Lohi for comparison. The results show IC-MAC has better performance in terms of throughput and end-to-end delay. Our design is also energy-efficient.
1790
Abstract: Typical CPS system composes of large scale of smart physical nodes communicated by kinds of network, while each node shows certain hybrid dynamic behavior. Their dynamic behavior features with networked mix of discrete time-driven cyber behavior and continuous time-driven physical behavior, complicating the modeling and simulating of the entire CPS behavior during the design and analysis. In this paper, an event bridge framework is proposed, extending the composition semantics of the hybrid automata, to capture the communication relationship among CPS nodes as well as the transmission delay properties. First, the event bridge model is given and a rail control system is taken as an example to explain its conciseness; second, a modeling and simulating framework is designed and implemented according to the event bridge model, where the dynamic behavior of each node is required to be modeled as an event-driven state chart; finally, the framework is applied in the rail control system and the lunar rover system, and the results show that it is effective both in networked hybrid physical behaviors and in networked cyber physical behaviors.
1798
Abstract: The paper studies the VIPS algorithm, and improves VIPS which has the deficiency with complex rules and low performance, according that the Web page has the feature of DIV structure in Web2.0, and combines the method based statistics information, introduces a DVIPS algorithm of extracting web main content.
1806
Abstract: Complex network theory is a new theory, which is rising with the rapid development of the computer. At present, the network structure of computers more complex network models already existed, has been unable to meet its topological properties. So, emerge as the times require complex network theory, provides a new development ideas and platform at the same time, complex network theory to the study of computer network topology. This paper firstly introduces the complex network theory, and then about the application of complex network theory in computer topology behavior, research on computer network topology and the experiment and model specific about complex network theory. More reduction.
1811

Showing 371 to 380 of 544 Paper Titles