Advanced Materials Research
Vols. 718-720
Vols. 718-720
Advanced Materials Research
Vol. 717
Vol. 717
Advanced Materials Research
Vol. 716
Vol. 716
Advanced Materials Research
Vols. 712-715
Vols. 712-715
Advanced Materials Research
Vol. 711
Vol. 711
Advanced Materials Research
Vol. 710
Vol. 710
Advanced Materials Research
Vol. 709
Vol. 709
Advanced Materials Research
Vols. 706-708
Vols. 706-708
Advanced Materials Research
Vol. 705
Vol. 705
Advanced Materials Research
Vol. 704
Vol. 704
Advanced Materials Research
Vol. 703
Vol. 703
Advanced Materials Research
Vol. 702
Vol. 702
Advanced Materials Research
Vol. 701
Vol. 701
Advanced Materials Research Vol. 709
DOI:
ToC:
Paper Title Page
Abstract: Cloud computing has been envisioned as a next generation information technology (IT) paradigm. The risk of losing data stored with any untrustworthy service provider is the key barrier to widespread uptake of cloud computing. This paper proposes an algebraic signature based remote data possession checking (RPDP) scheme to verify the integrity of the data stored in the cloud. This scheme uses skip-list to support fully dynamic data operation, including insertion, modification and deletion. The scheme allows verification without the need for the auditor to compare against the original data, which reduces the communication complexity dramatically. The storage complexity of cloud user is reduced to several bytes information. Extensive security analysis shows that the proposed scheme is highly provably secure.
603
Abstract: To obtain the best control effect for the controller of Extended Range Munitions (ERM), an optimal method for control parameters design was proposed. The adaptive genetic algorithm (GA) with real coding and the elites to keep the tactics were combined, based on which the original GA was improved. An optimal model of pitch angle controller for a type of ERM was established and the improved GA was used as the solver. Taking the stabilization loop as an example, the Powell algorithm, the simple GA and the improved GA were used to optimization, respectively. The simulation results indicate that the improved GA is more efficient and possesses stronger capability for searching.
611
Abstract: This paper proposes a genetic algorithm-based method to generate test cases. This method provides information for test case generation using state machine diagrams. Its feature is realizing automation through fewer generated test cases. In terms of automatic generation of test data based on path coverage, the goal is to build a function that can excellently assess the generated test data and guide the genetic algorithms to find the targeting parameter values.
616
Abstract: With respect to the multiple attribute decision making problems based on grey correlation, sensitivity analysis is proceeded to attribute values, and analysis model as well as search algorithm are proposed to compute the attribute variation intervals which preserve the original ranking. Finally, an example is presented to demonstrate its application.
620
Abstract: Image digitization and transmission process often subject to outside interference that was easy to let the image turn into de-noising image; General de-noising was easy made the image details blurred. Against the phenomenon, this paper using "mathematical microscope" said with wavelet transform, and according to the inherent characteristics of the human eye's visual. Put a new optimize the scan mode of the wavelet coefficients, and proposes a new threshold de-noising algorithm. At last, decrease the overhead of unnecessary coding algorithm; simplified scanning path to reduce,decrease encoding time and improve de-noising ability to effect, making the algorithm de-noising while protecting image details; Tests showed that the research to achieve the purpose of the above study and stability de-noising advantage.
624
Abstract: A model of intrusion detection system based on the technology data mining is presented on the basis of introduction on the concept and the technical method of the intrusion detection system. In this model, the two methods of the technology data mining association rule and the classified analysis cooperate with each other and the detection efficiency will be greatly enhanced.
628
Abstract: This paper introduces a hybrid radial basis function neural network (RBFNN) using a two-stage particle swarm optimization. In stage one, we initially demonstrate how the PSO learning method simultaneously determines the optimal number of hidden neurons, centres and widths of the radial basis function. Afterwards we apply the least mean squares (LMS) method to calculate the weight between the hidden layer and output layer in stage two. Then we propose a novel fitness function and make forecast simulation of HS 300 stock index. It proves to improve the performance of RBFNN.
632
Abstract: This paper has explored the characteristic of objected-oriented programming languages and its impact on software testing. Has summarized the main contents of object-oriented software testing, hierarchical testing and approaches for designing the test case. Has discussing the current situation and the future development of object-oriented software testing technology.
638
Abstract: Weibo is a dominant twitter-like micro-blog media in China, which indicates the trend of social changes in recent years in China. Opinion leaders, in particular, have a marvelous power to influence the thinking of the mass to some extent. In this paper, we propose an innovative model which automatically revises the selection of opinion leader list and analyzes their influence in consideration of the amount of followers and friends and topics such as life, campus, government, public welfare and entertainment. Two-step strategy is applied to our model, namely self-revised opinion leader list construction and VSM-based influence analysis. Experimental results reveal that our model has a good performance on reflecting the analysis of the relationship between authoritative opinion leaders and the mass media.
642
Abstract: With the popularity of the research and use of cloud computing, the use and understanding of cloud computing become deeper and deeper, therefore, people's attention and exploration has been sparked by the importance of cloud computing security. This article mainly analyzes the cloud computing security of Hadoop environment, and studies the factors which affect the security of cloud computing, starting from a specific environment. Finally, this paper puts forward an improved Deterministic Packet Marking (DPM) algorithm to improve the security of cloud computing from the aspect of the network.
646