Applied Mechanics and Materials Vols. 713-715

Paper Title Page

Abstract: This paper use crowd simulation and virtual reality technology design choreography prototype system. Based on the analysis and research of group calisthenics performance’s choreography work draws the related theory of crowd movement model, proposes a crowd movement model which can describe actor behavior in group calisthenics. This paper is divided into three parts; the first part introduces the development of group gymnastics in China. The second part introduces the structure and function of group calisthenics prototype system. The third part focuses on the design and implementation of a prototype, at the same time provides a useful reference for depth study of virtual crowd simulation.
2495
Abstract: Intrusion detection system as a proactive network security technology, is necessary and reasonable to add a static defense. However, the traditional exceptions and errors detecting exist issues of leakage police, the false alarm rate or maintenance difficult. In this paper, The intrusion detection system based on data mining with statistics, machine learning techniques in the detection performance, robustness, self-adaptability has a great advantage. The system improves the K-means clustering algorithm, focus on solving two questions of the cluster center node selection and discriminating of clustering properties, the test shows that the system further enhance the detection efficiency of the system.
2499
Abstract: It is very important in developing effective and efficient traffic engineering schemes for identifying large flows. In this paper, according to the characteristic of network flows, a new algorithm which combined by scalable bloom filter and dynamic bloom filter is proposed to realize elephant flows identification. This method can improve the performance of network measurement and the efficiency of the resource usage of measurement system by handling flows with different strategy according to its different feature. The theoretical analysis and the simulation result indicate that under the condition of existing some tolerable measurement error about the length of flows, our algorithm can identify elephant flows accurately, which reduce the storage space and improve the processing speed efficiently.
2503
Abstract: At present, the issue of intrusion detection has been a hot point to all over the computer security area. In this paper, a novel intrusion detection method has been proposed. Unlike the current existent detection methods, this paper combines the theories of both intuitionistic fuzzy sets (IFS) and artificial neural networks (ANN) together, which leads to much fewer iteration numbers, higher detection rates and sufficient stability. Experimental results show that the now method proposed in this paper is promising and has obvious superiorities over other current typical ones.
2507
Abstract: The UML model of database is a frame foundation of developing a database, this paper recommends a way to build data model based on the urban heating pipe networks by using VISIO[1] modeling tools. There are two ways that Use Case Diagram and Static Structure Diagram. The article describes the function of database application system, data structure and relationship on the heating-pipe network. The data structure model makes it more clear and lower redundancy when the developers are developing an application system of database.
2511
Abstract: In this paper, an efficient anomaly analysis method that is proved to be more efficient and less complex than the existing techniques has been proposed. The approach relies on monitoring the security state by using a set of accurate metrics. The Non-Subsampled Shearlet Transform (NSST) is used to decompose these metrics. Attacks are viewed as singularities that arise in some specific points of time. Therefore, the anomaly detection process is performed through processing the signals representing the metrics. Experimental results indicate that the proposed technique is effective and promising.
2515
Abstract: The issue of intrusion detection has been an active topic in both military and civilian areas, and a great many relevant algorithms and techniques have been developed accordingly. This paper addresses a novel technique based on non-subsampled shearlet transform (NSST) domain artificial neural networks (ANN) to solve the above problem, employing multi-scale geometry analysis (MGA) of NSST and the train characteristics of ANN together. Experimental results indicate that, compared with other existing conventional intrusion detection tools, the proposed one is superior to other current popular ones in both aspects of iteration numbers and convergence rates.
2519
Abstract: s. This system adopts RS-485 bus-based data collection method and utilizes Oracle database to combine with network telecommunication technology and intelligent telecommunication technology. At the same time, it implements the real-time collection, transmission and analysis on electricity, water, gas,heat consumption and other energy consumption data. The system includes the simple and precise structure, collects each energy consumption data rapidly and provides the important technical supports for effective management and energy consumption control.
2523
Abstract: The paper digs out useful conclusions for businesses from the mass of product reviews. To conduct commodity pricing, merchandise improvements provide a basis so as to promote sales performance. The paper discusses the product reviews of emotional connotation. It summed up the current situation development of emotional analysis on product reviews. It analyzes the significant commercial value of product reviews. Product reviews explores the relationship between emotion and sales performance analysis. We can research the technical implementation process of reviews.
2528
Abstract: A combination of Task and Role-based Access Control with multi-constraint is put forward in this paper. It is designed to solve problem of access control management about collaborators in workflow system, whose difficulties lie in complex authorization and low users efficiency. It combines the tasks and roles, classifies tasks, simplifies permissions management, defines the mutually exclusive roles and binding tasks and formulates dynamic users allocation policies by establishing a users execution history table to improving the efficiency. Finally, a specific dynamic access control design is given for electric power enterprise equipment maintenance management workflow, the given example shows that the model and algorithm satisfies the principle of least permission and separation of duties and ensures the workflow system to execute tasks safely and efficiently.
2532

Showing 551 to 560 of 664 Paper Titles