Applied Mechanics and Materials Vols. 687-691

Paper Title Page

Abstract: The course Mechanical and Electrical Drive Control, which is a compulsory course for the mechanical and electrical engineering in our school, has a strong engineering practicality. A large number of experiments are taken in this course to achieve good teaching effect. By analyzing of the status of PLC experiment links, this paper put forward to control object according to force control configuration software. Practice shows that this new system can meet the requirements of the PLC teaching experiment, which has the characteristics of lowly experimental cost, strongly commonality, easily maintenance and so on.
3011
Abstract: In cloud computing, customers outsource their data to the cloud storage, as they no long physically possess the data, how to perform the integrity verification becomes more difficult. Our protocol follows Shacham and Waters’s ideas (2013). We solve the problem of customer’s privacy against both the cloud and the third-party verifier and formally prove that the complex bilinear operations can be removed under the customer’s help. Every step of our improvements is based on rigorous proofs.
3015
Abstract: Cloud computing technology is emerging technology in the field of information technology, and its technical advantage has brought new opportunities and challenges for the development and service of digital library in the Internet era. Virtualization is the key technology of cloud computing, and the paper discusses the virtualization of digital library in the cloud computing environment from technical level. Firstly, the paper introduced cloud computing and virtualization technology; then created a virtualized environment for digital library based on the cloud computing technology, and described the function of various levels; finally, the capacity of virtual machines appointment scheduling can be calculated according to formulas. The paper has great significance in enhancing the efficiency and quality of library service, constructing resource sharing system of digital library.
3019
Abstract: With the rapid development of network technology, music websites gradually become a popular, and the emergence of pop music website is to meet the people's strong demand for popular music, because database plays an important role in the design of website, studying the database design of pop music website development is important. From the conception of database design, firstly, this paper studies conceptual design for the database design, conceptual design is mainly reflected in the form of an E-R diagram; then conducted logical in the database design, logical design is expressed by the pattern of table structure; finally, studies the security design of database design, describes the security policy of database. The studied content of this paper plays a supporting role for popular music website design, promotes the combination of music and websites, and enriches people's leisure life.
3023
Abstract: According to the problems that the current computer lab resource utilization is low, large maintenance workload, update the cost is high Etc. In this paper, the application of cloud computing and virtualization technology, a model of computer laboratory construction based on cloud computing and virtual machine technology are given, good results are obtained through practical application.In recent years, the construction of computer laboratory in our country has achieved great development, Nearly all colleges and Universities have built many computer labs. However, in these completed labs, the computer equipment is single, lack of effective resource integration between devices, resulting in laboratory and the work efficiency is low, professional collaboration is poor, and the lack of stability, security. The emergence of cloud computing and virtualization technologies offers a new way for the construction of computer lab, It can be further standardized computer laboratory work flow from the point of view of technology, improving the operation efficiency of laboratory [1].
3027
Abstract: This paper describes cloud computing services, analyzes the types of services and cloud computing services corresponding structural model; research focus on cloud computing data security issues were discussed in the service mode.
3032
Abstract: By using the two-dimensional barcode encryption technology with pseudo fingerprint feature key, an asymmetric, encrypted and anti-fake design of two-dimensional barcode has been implemented. After being processed , the collected fingerprint information is used to set parameters, translated and rotated. With the accomplishment of coding the parameters, datas of pseudo-random fingerprint feature come into being. With the help of the RSA, encrypt the private key which is randomly produced by pseudo fingerprint feature to get a new one. With the new private key,the only information of owners is encrypted, solving the problem of "witness identity" .
3036
Abstract: With the development of cloud computing paradigm, energy consumption becomes a big problem. Green cloud computing requires efficient resource management for the purpose of energy saving. Service schedule is an important part of the resource management to ensure the quality of service. A mathematic model is proposed which can determine service schedule quantity. In this model, taking energy saving and reputation index of service supplier into account, an optimization problem of two targets is simplified under hypothesis in reason. Through numeric calculation and analysis, this paper show there is an optimal point for the advance schedule of service.
3040
Abstract: We study the problem of information brokerage in wireless sensor networks, where each sensor node can be an information producer or an information consumer, or both an information consumer and information producer. Some sensor nodes in the sensor networks can be selected out as the storage nodes, where the producers can store their data and the consumers can retrieve the data they are interested in. Which node/nodes should be chosen as the storage node/nodes is a challenging problem, because many factors such as the data generating rates of the producers and the query frequencies of the consumer should be considered. In this paper, we proposed a novel data storage and retrieval scheme named SRVR (Storage and Retrieval with Virtual Rings). SRVR chooses the nodes in an optimal ring around the center of the sensor network field as the storage nodes, and achieves data storage and retrieval based on the ring. We show by simulation that SRVR achieves more balanced traffic load on sensor nodes and prolongs the lifetime of the senor networks.
3044
Abstract: This paper studieddomestic micro-blog areas, which adopted the cluster analysis; strategic coordinate analysis and co-word network analysis based on the knowledge mapping theory and methods with software tools SPSS19.0, Matlab, Ucinet6.0 and NetDraw. The study found that research of micro-blogareas can be divided into five knowledge groups: (1) propagation characteristics and application research of micro-blog; (2) marketing and social network analysis based on the micro-blog; (3) new media characteristics and application research of micro-blog; (4) microblogging public opinion analysis and its application research in colleges and universities and government affairs; (5) based on theEmergency communications and microblogging public opinion monitoring guide method research.
3048

Showing 691 to 700 of 1182 Paper Titles