Advanced Materials Research Vols. 694-697

Paper Title Page

Abstract: CManufacturing is a new manufacturing model that has evolved from Service-Oriented Architecture, networked manufacturing and CComputing. It provides intelligent, interoperable and distributed manufacturing model for the industry. This paper introduces a resource integration mechanism in the Cloud Manufacturing environment. Function Block technology is discussed from the Cloud Manufacturing perspective in detail. Next, a novel integration mechanism is proposed, namely the Virtual Function Block. Based on physical Function Blocks and software agents, Virtual Function Blocks are able to manipulate and integrate manufacturing resources via event states and data flows. During implementation, Creo Parametric was integrated as a Cloud Service with the help of VFBs to evaluate the mechanism.
2438
Abstract: The tool trace of turning is intensive and complex, and its virtual manufacturing with high confidence level needs to be solved urgently. In response to this pressing need, based on the general mathematical model of master-slave alignment for shaft part profiles, efficient and low-redundancy "dynamic grid" for data structure and "tool driving" exact algorithm for cutting path, the paper built a database that was flexible to adapt the data structure, packaged an Open Graphics Library (OpenGL) to form the automatic three-dimensional engine, and developed a three-dimensional virtual manufacturing system with high confidence level for turning, with numerical control code analysis, error correction, tool path simulation of turning process, parts management, all-round display, virtual manufacturing process control and other functions.
2442
Abstract: This article in view of the problem that the traditional maintenance training methods and means can't adapt to the development of vehicles, based on EON and virtual maintenance training platform, by using virtual reality (VR) which has developed a set of interactive virtual maintenance training system for vehicles. The system on the basis of analysis virtual maintenance training system function and information needs, constructed the system framework, established the key technology and implementation scheme of the system, and studies the process and function of maintenance training system, confirmed the grading rules, grading standards and evaluation standards, including key technology. The development of this system has great practical significance to improve the training effect, effectively solved the problem of high cost and low efficiency in teaching training.
2449
Abstract: With the development of the internet technology, office automation (OA) has brought people great convenience and at the same time OA as an very important approach to informatization, is required to better solve deeper problems to meet more objectives. Traditional identity authentication is through users name/password pattern, however, this mode is easy to access and the password is easily stolen and hard to remember. Especially on the public computers on public use, password-mode may bring very serious potential safety hazard to the users by being seen by others, being stolen by Trojan Program and so on. This thesis introduces how to use computer software to take the place of Password. This electronic authentication technology has three-leveled dispersed hierarchical organization which can identify the user in a very secured and absolute safe way.
2454
Abstract: In this paper, we extend and rewrite MapReduce dispatcher and its quasi-real-time schedule algorithm to support operation scheduling in time-limited. MapReduce dispatcher has an evaluation of completion time of tasks in dependence of rate of progress of tasks at hand, and allocated resource dynamically to every task when they are running. Experimental investigation shows that, the algorithm increase the resource utilization of the MapReduce system, and the goals of quasi-real-time MapReduce schedule has been achieved.
2458
Abstract: For problem of limited resources in the RFID (Radio frequency identification) system, a power resource allocation scheme is proposed. The method aims to maximize the system throughput, using cultural algorithm (CA) to search for the optimal power allocation scheme. By dynamically adjusting the signal transmission power of the reader, the overlap area between the reader can be reduced so that the maximum reading range can be obtained. Simulation results show that the algorithm has better performance in the system throughput and energy consumption, reducing the impact of interference between the readers and efficiently using the resources in RFID system.
2462
Abstract: Semantic modeling has become indispensable to integrate various specific security issues of Internet of Things. How to describe attack scenarios and how to define an intrusion unambiguously has been an urgent problem. For solving two above problems, a new three-level information security ontology model is proposed, which is an initial attempt to solve security issues by means of ontology technology. Five top classes are proposed in the domain ontology level. Then their subclasses are also proposed on the basis of actual scenarios in the local ontology level. Our intelligent laboratory, as experiment scenarios, is partly instantiated.
2466
Abstract: In order to speed up the integration of industrialization and informatization in China, to promote the transformation and upgrading of enterprises. This article introduces the project of manufacturing informatization based on internet of things (IOT), analyzes the development of IOT technology, expounds the application of IOT in informatization development, and points out the development trend of manufacturing informatization in China based on IOT.
2471
Abstract: An intelligent decision support system in damage control of damaged ship combined with data mining is constructed in this paper. The human-computer interaction subsystem, the database management subsystem, the model management subsystem and the knowledge management subsystem are introduced in detail and some programming technologies of the system are displayed. The pivotal technology of the realization of this system is discussed briefly at last.
2476
Abstract: By analyzing the characteristics of the existing intrusion detection techniques and limitations of network anomaly detection method is proposed. According to TCP/IP protocol packet structure characteristics, the behavior of a new notation, the definition of data packets through the network characteristics of the user's behavior to make up for past acts of intrusion detection system that is incomplete and non-real-time inadequate.
2483

Showing 481 to 490 of 740 Paper Titles