Advanced Materials Research
Vol. 666
Vol. 666
Advanced Materials Research
Vol. 665
Vol. 665
Advanced Materials Research
Vol. 664
Vol. 664
Advanced Materials Research
Vol. 663
Vol. 663
Advanced Materials Research
Vol. 662
Vol. 662
Advanced Materials Research
Vol. 661
Vol. 661
Advanced Materials Research
Vol. 660
Vol. 660
Advanced Materials Research
Vol. 659
Vol. 659
Advanced Materials Research
Vol. 658
Vol. 658
Advanced Materials Research
Vols. 655-657
Vols. 655-657
Advanced Materials Research
Vols. 652-654
Vols. 652-654
Advanced Materials Research
Vol. 651
Vol. 651
Advanced Materials Research
Vol. 650
Vol. 650
Advanced Materials Research Vol. 660
Paper Title Page
Abstract: With the continuous improvement of the software quality requirements, more and more attentions are paid to the reliability of software systems. Most of the existing reliability models rely on the cumulative test time to characterize the reliability improvement, while ignoring the saturation effects and software module failure characteristic differences exist, making the test results to low confidence. In this paper, Markov description methods are utilized in reliability calculating process to improve the fictitious-excellence problem in current testing models. Finally, the method is applied to a flight control system software reliability testing. The results demonstrate the effectiveness of the method.
169
Abstract: The public traffic flow has the gray characteristics of “small sample and poor information”, thereby a forecast method for transfer flow based on the gray soft computing is proposed. This method utilizes the gray system theory to establish gray neural network prediction model, aiming to improve performance of the neural network as well as the accuracy of the system’s prediction by using genetic algorithm. The results show that the optimized model can more accurately predict the traffic flow, providing a more effective way of location selection for public transit transfer hubs. Finally, take the planning of public transit transfer hubs in Lanzhou City as an example to carry out empirical analysis and evaluation for the transfer hubs using this method
174
Abstract: Because of the deficiencies of the spatial smoothing algorithm, we put forward a new decoherence method which overcomes the shortcomings. The coherent signal is estimated by DOA and compared with the spatial smoothing algorithm it has more advantage. The method does not lose array effective aperture while the spatial smoothing algorithm method will lose array effective aperture. It also avoids the high consistency requirement of the subarray. The simulation results by MATLAB show that the algorithm can effectively analysis the coherent signal.
179
Abstract: In order to tackle the data transmission bottlenecks of the gateway node in clustering Ad hoc Networks, the paper proposes a communication method. Firstly, DMAC (Distributed and Mobility-Adaptive Clustering) algorithm and Omni-directional antenna is well introduced and discussed. Then the ICMMDA (The Inter-cluster Communication Method based on Directional Antennas) policy building virtual channels between two hops away cluster-head and using directional antenna is brought about. Lastly, the simulation shows that the method can reduce the end-to-end delay between two clusters and improve the network throughput.
184
Abstract: Object tracking has been researched for many years as an important topic in machine learning, robot vision and many other fields. Over the years, various tracking methods are proposed and developed in order to gain a better tracking effect. Among them the mean-shift algorithm turns out to be robust and accurate compared other algorithms after different kinds of tests. But due to its limitations, the changes in scale and rotational motion of an object cannot be effectively processed. This problem occurs when the object of interest moves towards or away from the video camera. Improving over the previously proposed method such as scale and orientation adaptive mean shift tracking, which performs well with scaling change but not for the rotation, in this paper, the proposed method modifies the continuously adaptive mean shift tracking method so that it can handle effectively for changes in size and rotation in motion, simultaneously. The simulation results yield a successful tracking of moving objects even when the object undergoes scaling in size and rotation in motion in comparison to the conventional ones.
190
Abstract: Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.
196
Abstract: In view of the fact that traditional vector space model for text similarity calculation which does not take word order into consideration leads to bias, this paper puts forward a longest common subsequence and the traditional vector space model of combining text similarity calculation. This method takes the word order and word frequency information into account, using the texts of the longest common subsequence and substring of their information from all public records and the use of word order and word frequency in the text. The importance of similarity calculation is acknowledged, and the traditional vector space model in the calculation of the weight is used on the word frequency information. Some of the dataset collected through the web crawler are used in the proposed text similarity calculation method for testing, and the results proved the effectivity of the method.
202
Abstract: Considering the inadequacy of deploying the SSL VPN on mobile devices, we proposed a mobile SSL VPN system which can be used on mobile devices without any complex setups. The system mainly based on port forwarding and OPENVPN. This paper analysed the principle of this system and processing flow, then we collected the experimental results and made some improvement.
207
Abstract: With the widely range of applications of wireless ad hoc networks, security threats are increasingly prominent, especially wormhole attacks. In a wormhole attack, unauthenticated entities secretly built wormhole tunnels, silently received messages and selectively reply. In this paper, we introduce an approach to detect and defense against wormhole attacks based on packet leashes scheme. Our solution effectively integrated shared symmetric key authentication and TIK protocol to reduce transmission delay and energy consumption. The result shows that the model can save power and reduce communication delay without sacrificing the accuracy of detection.
212
Abstract: Retracted paper: In recent years, much research has been devoted to the investigation of the UNIVAC computer; however, few have explored the simulation of 802.11 mesh networks. Given the current status of homogeneous technology, cryptographers daringly desire the refinement of systems, which embodies the important principles of steganography. KRA, our new system for e-business, is the solution to all of these problems.
217