Applied Mechanics and Materials Vols. 764-765

Paper Title Page

Abstract: In the paper, design and Implementation of cloud-dust based intelligent system is proposed. For achieving applications of intelligent system, such as records, surveillance, assessments, predictions, diagnosis, prescription, scheduling and fool-proofing checks, an architecture named Cloud-Dust is developed. The intelligent system is separated into the cloud system and the dust system. The dust system contains (1) Wireless sensors network (2) Features extraction circuits (3) Intelligent computing circuits (4) Embedded system. It can play a role as real-time preprocessor very well, just like an intelligent agent. However, the cloud system contains (1) Cloud database (2) Intelligent computing engine (3) Ubiquitous human-machine-interface. It can flexibly use computing resources and integrate information from many different dust systems. By the experiments, we can find the advantages of the cloud-dust based intelligent system. It meets the both needs of real-time and integration for intelligent systems. So it is necessary to develop the cloud-dust based system for design and implementation of the intelligent system.
872
Abstract: Cloud services are widely used in manufacturing, logistics, digital applications, and document processing. Cloud services must be able to handle tens of thousands of concurrent requests and to enable servers to seamlessly provide the amount of load balance capacity needed in response to incoming application traffic in addition to allowing users to obtain information quickly and accurately. In the past, scholars proposed using static load balance or server response times to evaluate load balance capacity, both of which cause the server to load unevenly, and in this study, a dynamic annexed balance method is used to solve this problem.
877
Abstract: In the paper, a cloud-dust based intelligent maximum power analysis system for photovoltaic is proposed. In order to resolve NP problem for photovoltaic, factors of photovoltaic are integrated to cloud-dust based intelligent maximum power analysis system for computing. This study is the development of the maximum power analysis system for photovoltaic, to improve the solar panels effects of the different region and enable them to get maximum efficiency of the power generation. The design methodology of this study includes: (1) The monitoring and control Module (2) The prediction and evaluation module (3) The performance diagnosis module (4) The maintenance prescription module. At last, we can find the advantages of the cloud-dust based intelligent maximum power analysis system for photovoltaic. It increases overall competitive performance of products, reduces cost of products and consummation rates of human resources.
881
Abstract: A 2-covered path routing method providing each path with redundant antennas to provide high availability ensures reliable multi-hop communication under practical conditions. In real life, the transmission range of an antenna increases at a rate proportionate to its input power. This paper focuses on the 2-covered path problem in which antennas have discrete transmission power levels. Given a set of n antennas with m available radii, a source point A and a destination B on the plane, we propose three power-aware methods that construct the 2-covered paths between endpoints A and B. These methods are called 2-covered area stretching planning (TASP), and radii shrinking planning (RSP) to reduce power consumption. RSP and TASP are polynomial-time algorithms and save energy up to 96% of that achieved by optimum solutions.
886
Abstract: This paper proposes an approach using dynamic time wrapping (DTW) to improve the classification performance of the SVM separation hyperplane. The presented method by incorporating the distance information derived from DTW template matching calculations into SVM separation hyperplane training will be able to effectively control the balance between mar-gin maximization and the amount of misclassifications, and therefore the recognition accuracy of the SVM classifier on speaker recognition will further be increased. Experimental results demonstrated the effectiveness and efficiency of the developed approach.
891
Abstract: Construction projects are becoming ever more complex and time driven, especially as the amount of project data and active project participants’ increase. For achieving a project success, project management not only must to meet time, cost, quality objectives, but also satisfies the project stakeholders needs related to the project management process. Project managers were difficult to effectively seizing, collecting and handling information which are generated from different systems. The elements of information presentation in web-based was contributed an important role to project management success. The purpose of this study is to provide a background to denote the enhancing project management via information presentation based on effective information technology/information systems which are emphasized in web-based.
895
Abstract: An evil twin is a kind of rogue Wi-Fi access point (AP) which has the same SSID name to the legitimate one and is set up by an adversary. The user who associates to the evil twin, adversary may eaves-drops sensitive data on wireless communications to the Internet. Most of existing detection solutions are administrator-based, which is used by wireless network administrator to verify whether a given AP is in an authorized list or not. Such administrator-based solutions are limited, hardly maintained, and difficult to protect users timely when the attack is launched. Hence, we propose a client-based detection by operating the wireless network interface controller (WNIC) in monitor mode and capturing the Internet packets. Through analyzing the captured packets, client users can easily and precisely detect the evil twin attack even in a complicated AP scenario as well as avoid any threat arisen from connecting to an AP. Our method does not need to know any authorized AP list, and does not rely on data training or machine learning technique of target wireless network. Finally, we implemented a detecting system on Windows 7, which is widely used nowadays.
900
Abstract: Traffic counts are one of the fundamental data sources for the Highway Performance Monitoring System (HPMS). Automatic Traffic Recorders (ATRs) are used to provide continuous traffic count coverage at selected locations to estimate annual average daily traffic (AADT). However, ATR data is often unavailable. This paper investigated the feasibility of using Video Detection System (VDS) technology when ATR data is not available. An Android Tablet-based manual traffic counting application was developed to acquire manual count based ground truth data. The performance of VDS was evaluated under various conditions including mounting styles, heights, and roadway offsets. The results indicated that VDS data presents reasonably accurate data, although the data exhibits more variability compared to ATR data.
905
Abstract: Recently, Formal Concept Analysis (FCA) have been widely used for various purposes in many different domains such as data mining, machine learning, knowledge management and so on. In this paper, we introduce FCA as the basis for a practical and well founded methodological approach for data analysis which identifies conceptual structures among data sets. As well as, we propose a FCA-based data analysis for discovering association rules by using polarity from social contents. Additionally, we show the experiments that demonstrate how our data analysis approaches can be applied for knowledge discovery by using association rules.
910
Abstract: This research enhances a home security service with information stations. The service is based on a web-based multiple stations supervisory control framework. A service server (or cloud) kept in a company to serve numerous homes for security monitoring. Arduino controllers are used as home security controllers. An Arduino controller senses door switch, motion detection, smoke detection, gas detection, CO detection, an emergency button, RFID tag, and a spare sensing contact. The controller also drives door lock, two relays to perform security task. RFID is used to help personnel in/out management and alert enable/disable. The controller reads inputs, uploads input/output data to the service server, executes commands from the server, and drives output continuously. Camera servers are added to a house to provide video surveillance. Camera alert events are sent to the service server. Information stations, like earthquake alert station and weather station, are established in the server to provide environmental information. Users can subscribe certain information data and put them in the control laws of the Arduino controllers with condition control. With input/output authorization, the home security of one user is associated with others. Therefore, the whole security service forms a social security group.
915

Showing 171 to 180 of 276 Paper Titles