Applied Mechanics and Materials
Vol. 772
Vol. 772
Applied Mechanics and Materials
Vol. 771
Vol. 771
Applied Mechanics and Materials
Vol. 770
Vol. 770
Applied Mechanics and Materials
Vol. 769
Vol. 769
Applied Mechanics and Materials
Vol. 768
Vol. 768
Applied Mechanics and Materials
Vols. 766-767
Vols. 766-767
Applied Mechanics and Materials
Vols. 764-765
Vols. 764-765
Applied Mechanics and Materials
Vol. 763
Vol. 763
Applied Mechanics and Materials
Vol. 762
Vol. 762
Applied Mechanics and Materials
Vol. 761
Vol. 761
Applied Mechanics and Materials
Vol. 760
Vol. 760
Applied Mechanics and Materials
Vol. 759
Vol. 759
Applied Mechanics and Materials
Vol. 758
Vol. 758
Applied Mechanics and Materials Vols. 764-765
Paper Title Page
Abstract: This paper aims to study the opinion dynamics in military command and control (C2) network with the impact of informal network. The authors reviewed recent opinion dynamics models and explored the relationships between formal and informal networks in detail. Then the opinion dynamics model in C2 network was introduced and a hybrid network based on small-world or scale-free network was proposed. Afterwards, the authors studied the opinion dynamics based on the formal C2 network and hybrid network by computer simulations, and found that opinion dynamics with the impact of informal network is almost independent on the network properties (including small-world, scale-free and rewiring probability) but dependent on the scale of the informal network. And it is concluded that the larger the size of informal network is, the better it can facilitate convergence of opinions in formal C2 network.
919
Abstract: Cloud technology has undergone significant and rapid growth in recent years, providing users with ever more Cloud resources. The services offered are based on users’ usage habits, so users come to rely ever more on Cloud applications. OpenID Union proposed an authorization method, allowing the authorized transfer of users’ personal data from one Cloud to another, using personal registration information. However, since providers do not protect users’ private information, attackers can easily intercept and tamper with confidential messages. In this paper, we use the characteristics of the blind signature to support user verification of the registering provider, to protect the user’s identity, and to address known vulnerabilities in the system.
924
Abstract: Using an underlying cluster-based virtual backbone induced by the weakly connected dominating set (WCDS) is a very promising approach to enhance network efficiency. This paper proposes a novel loosely-coupled dominating set (LCDS) which is adapted from the concept of WCDS by further relaxing its connectivity requirement. The main advantages of the proposed LCDS are as follows. First, it can further reduce the size of the dominating set compared with that generated by the WCDS. Second, it can decrease the average utilization of the selected cluster heads to prolong their life-cycle. Third, it can increase the edge coverage of the network to exploit the benefits of load balancing. Fourth, it provides the network with high reliability by supporting more alternative routing paths. Numerical results show that the proposed LCDS outperforms the WCDS in almost every node deployment scenarios and every performance aspects.
929
Abstract: Ontology integration carries significant importance in terms of reuse of knowledge and interoperability. In this paper, a framework for ontology integration based on extended metadata registry plus (XMDR+) is focused, that is, we try to developer a methods for ontology integration to provide high quality Semantic Web services. To sum up, the ontology integration framework proposed herein not only produces global ontologies; but also defines such methods, and, thereby, performs better in extending and integrating ontologies. The framework will rely on a model independent of ontology storage structures, but will be capable of representing semantic relationships between different ontology systems.
936
Abstract: Opportunistic routing has been shown to achieve the high throughput of the wireless mesh network with lossy channels. Different from deterministic routing mechanisms in which a frame is transmitted and forwarded along with a fixed and predetermined path, the opportunistic routing technique allows multiple nodes hearing the frame to form the forwarder set containing promising candidates for the frame forwarding. Existing opportunistic routing protocols typically choose among forwarding candidates based on the decision made from the transmitter disregarding the current loads in candidates. In this paper, the opportunistic frame forwarding mechanism with considering backlog of frames among forwarders is proposed and analyzed. Specifically, in addition to take into account the delivery probability, our proposal restricts members of the forwarder set for a given transmitter to those wireless nodes whose transmission range covers one another and makes the true forwarder picked from the forward set of a given transmitting frame being the one who gains access to wireless channel for the frame before others do. Therefore, the efficient and load-balanced opportunistic routing for wireless mesh networks can be achieved. Analytic results show that the proposed method compared to the deterministic routing methodology can achieve the high frame delivery ratio.
941
Abstract: This paper proposed an energy-aware routing method, P-AODV. Based on the AODV routing protocol, this study designed a passive power control (PPC) algorithm to enhance energy efficiency. The proposed method includes signal detection and power setting phases. During the signal detection phase, the source node broadcasts the route request packets (RREQ) and the downstream intermediate node calculates the optimum power level at the upstream intermediate node according to the received signal strength indicator (RSSI) after receiving the RREQ. During the power set phase, the destination node returns the RREQ packet to notify the power level of the upstream nodes to the source node. After that, all nodes from the source node to the destination node engaged in transmission will transmit data in a coordinated power level. As indicated by the computer simulation results, P-AODV could have 30% higher energy efficiency than traditional AODV. This PPC algorithm could also be used in wireless mesh networks (WMNs).
946
Abstract: In previous work, we have proposed a service mechanism which automatically syncs the file resources among discrete mobile devices. The mechanism includes four modules. The role-based access control module (RBAC) defined an organization policy which constructs some rules for file resources accessing. The user identification module dispatches a user some specific role (s) with relevant permission (s) and constraint (s) to access organization file resources. The en-capsulation/de-capsulation module enforces the JXTA protocol to sync the file resource synchronization over a mobile peer-to-peer network. The knowledge base module stores various organization file resources in the proposed service mechanism. However, the service mechanism faces an important challenge about data security. How to securely sync organization file resources among discrete mobile devices is worth exploring. In this study, we enforces some cryptographic techniques, including advanced encryption standard (AES), Triple data encryption standards (Triple-DES), and data encryption standards (DES), to examine secure synchronization of organization file resources among discrete mobile devices. The experiment results show the proposed mechanism is secure to automatically sync file resources among discrete mobile devices. The contribution of this work is to solve data security issue in syncing organization file resources among discrete mobile devices. We also strengthen an organization mobility to acquire the file resources by a mobile device in anywhere.
950
Abstract: This paper proposed a spelling error detection and correction using the linguistic features and knowledge resource. The linguistic features mainly come from language model that describes the probability of a sentence. In practice, the formal document with typos is defective and fall short of the specifications, since typos and error hidden in printed document are frequent, rework will cause the waste of paper and ink. This paper proposed an approach that addresses the spelling errors and before printing. In this method, the linguistic features are used in this research to compare and increase a new feature additionally that is a function of Internet search based on knowledge bases. Combining these research manners, this paper expect to achieve the goals of confirming, improving the detection rate of typos, and reducing the waste of resources. Experimental results shows, the proposed method is practicable and efficient for users to detect the typos in the printed documents.
955
Abstract: This study introduces a direct and intuitive method to resist certain apps from sending SMS message stealthily. According to the heuristic analysis and observation, it is apparently that a SMS message, which has the textual content originated from user's entering manually, is obviously benign. We use this principle to design a serious of SMS examination and verification procedures, in order to force all SMS messages to be verified automatically before delivering them actually. A package named as Taurus, which is comprised of several new components, are developed in the Android framework in this study. The evaluation shows that Taurus, which examines all outgoing and detects potentially malicious SMS messages, has an excellent performance with reasonable memory usage overhead.
960
Abstract: The main purpose of this research is applying an intelligent strategy to improve the customer satisfaction prediction system of airlines service. Historically, the measurement of customer satisfaction collects by questionnaire. We collect and computing the customer satisfaction of each flight by the cloud computing based prediction system. It compares the customer questionnaire, then continuous modifying the accuracy of prediction system by neural network methodology. It is more efficiency and precisely to improve the customer satisfaction for the long-term perspective. We are proposing a parameter of evaluation module that selected 12 influence factors from MEPH and 12 satisfaction evaluation factors of airlines service (by customer perception of service quality). In this study, we are using back-propagation neural network method to build the module. The module could be used by calculating the airlines service satisfaction from the quality factors such as material, machine, product, and staff. However, we could get the prediction of service satisfaction through the way of data fusion by the 12 satisfaction indicators. The results could be used to make the service quality strategy, in order to lead a higher customer satisfaction. The findings help airlines managers to predict their customer satisfaction more efficiently, making changes to service quality strategy easily to meet the customers’ satisfaction level. Even if the managers pre-set a customers’ satisfaction level, a real-time cloud computing could help managers deploy the resources to achieve the goal. After all, in order to prove the feasibility of the parameters and the intelligent evaluation methodology, this study will collect data and test the evaluation of quality from an experimentation of airlines service system in Kaohsiung city in Taiwan.
965