Advanced Materials Research Vol. 717

Paper Title Page

Abstract: The implementation of the construction bill of quantities (BOQ) pricing system is an important measure for deepening project cost management, and it is not only an important way to promote the construction project marketable and international, but also one of the measures for regulate the construction markets .In-depth study of the existing BOQ software, proposed construction projects BOQ system development based on software reuse. During the cause of system development software reuse is used, the function of the system model and the model of system development the soft component are given, with a soft component to assemble the system. The software reuse-based development model, with soft component assembly systems, it is not only speeding up the development progress and development costs, but also can improve the maintainability and scalability of the software.
820
Abstract: A recent work utilized a transformation function to protect a DTW template. Unfortunately, a matching template was not protected properly. In this paper, we first show that an adversary can exploit the matching template to gain access to the system. Then, we introduce our scheme to address this problem. For this scheme, a hardened template is utilized to protect the DTW template. For the matching template, it is protected by a cryptographic framework. We evaluate the system with a public database: the MIT mobile device speaker verification corpus. The experimental results show that our scheme outperforms the other approaches.
826
Abstract: Directed to the problems of the military concept model in the digital battlefield, such as the indeeded definitions,the unfull contents and the non-system process.this paper defines the intension and extension of the military concept model in the war action,makes the standard contents,and definitudes the principle.at last, using the engineering science,it advances the exploiting process of models,and gives us a primary basic theories of the military concept models in the digital battlefield war action.
832
Abstract: From the RCM analysis demand of equipment, the function and constitution of the computer aided RCM analysis system are discussed in this paper. The function and composition of the database system are expounded. Meanwhile, the basic train of thought RCM analysis database system is put forward.
838
Abstract: Previously there was algorithm shortage about making watermark hidden in semantic meaning of text and text formatting, this paper presents a new zero-watermark algorithm based on English text and the algorithm is suitable for Chinese text as well. Firstly, the algorithm determines the textual characteristics through the punctuation mark of texts. Then add the watermark information into the host through coring the information between cryptographic watermark and textual characteristics. The algorithm has a good concealment and strong robustness.
844
Abstract: The Advanced Encryption Standard (AES) was specified in 2001 by the National Institute of Standards and Technology. Our attempt is to define the hardware rule about hardware calculation and to find further reduce for the size of AES, by seeking to other normal bases.Finally, we give the result that our hardware implementation is better than the previous results.
849
Abstract: The creation and reasonable dispatch of workflow plays an irreplaceable role in improving work efficiency, reducing operating costs and improving the execution on collaborative system. In this paper, we designed and implemented the creation and scheduling collaborative system, and proposed an interactive creation method by using drag-and-drop technique. In the created workflows, work assignments are configurable for users to provide more convenient service. The system provide communication platform for users at the same time, which is convenient for users to better understand workflow and solve problems encountered in work.
854
Abstract: With the wide application of cloud platform, information security based on cloud platform has become a research hot point. In this paper, by analyzing the security features of the cloud platform, researched the intrusion clustering based on Kohonen neural network, and proposed a new framework, and improved the weights of output layer. With the software Matlab simulation, the experimental results were satisfactory, illustrated that invasion clustering of neural network based on cloud platform took good effect.
859
Abstract: EEE 802.11 WLAN can adjust transmission rates according to channel environment. Among rate adaptation methods, open loop schemes do not rely on explicit messages that tell channel state of receivers but can estimate from the arrival of ACKs. However they cause rates to alternate repeatedly. To remedy such oscillation, Adaptive Auto Rate Fallback (AARF) and Robust Rate Adaptation Algorithm Plus (RRAA+) were proposed. This paper evaluates their performance by using simulations in order to understand their characteristics and responsiveness to channel conditions. We expect such efforts to encourage new ideas to improve them further. From the evaluations, we observed that AARF is superior to RRAA+ in the perspective of throughput. Also, we found that the oscillation does not badly affect performance as known and TCP and UDP traffic are influenced differently by rate adaptation.
864
Abstract: Advances in optical networks opened a new way of transmission of accurate time information. Presented approach requires a Photonic Service. The Photonic Service represents a new type of multi-domain, end-to-end network service. This type of service also enables IP, real-time and non-data transmission over photonic networks. The concept of photonic services was verified on a specialized metrology application of accurate time transfer distance of 1100km. The paper discusses networking definition of Photonic Service with its implementation, laboratory and field experiments and verifications.
870

Showing 151 to 160 of 168 Paper Titles