Advanced Materials Research
Vol. 770
Vol. 770
Advanced Materials Research
Vol. 769
Vol. 769
Advanced Materials Research
Vol. 768
Vol. 768
Advanced Materials Research
Vols. 765-767
Vols. 765-767
Advanced Materials Research
Vol. 764
Vol. 764
Advanced Materials Research
Vol. 763
Vol. 763
Advanced Materials Research
Vols. 760-762
Vols. 760-762
Advanced Materials Research
Vols. 756-759
Vols. 756-759
Advanced Materials Research
Vols. 753-755
Vols. 753-755
Advanced Materials Research
Vols. 750-752
Vols. 750-752
Advanced Materials Research
Vol. 749
Vol. 749
Advanced Materials Research
Vol. 748
Vol. 748
Advanced Materials Research
Vol. 747
Vol. 747
Advanced Materials Research Vols. 760-762
Paper Title Page
Abstract: With the wide application of UAV in the scientific research,its route planning is becoming more and more important. In order to design the best route planning when UAV operates in the field, this paper mainly puts to use the simple genetic algorithm to design 3D-route planning. It primarily introduces the advantages of genetic algorithm compared to others on the designing of route planning. The improvement of simple genetic algorithm is because of the safety of UAV when it flights higher, and the 3D-route planning should include all the corresponding areas. The simulation results show that: the improvement of simple genetic algorithm gets rid of the dependence of parameters, at the same time it is a global search algorithm to avoid falling into the local optimal solution. Whats more, it can meet the requirements of the 3D-route planning design, to the purpose of regional scope and high safety.
1690
Abstract: PCI (Peripheral Component Interconnect) bus is a high-performance local bus, is put forward to meet the high-speed data transmission between peripherals and host. The CPCI technology is adapted from PCI-based, it conforms to the PCI bus standard and mature European card mechanical standards , supports hot-swap capability, has advantage of the more stronger, more reliable, use and maintenance simply. Can break through the limitations of the PCI card via the PCI bridge technology to achieve PCI to CPCI conversion, the paper introduces the principle of the PCI-PCI bridge technology and in-depth analysis of a typical bridge chip PCI2050, based on a PCI card circuit design example, and provide a reference for the type of system design and verification.
1695
Abstract: In todays world, the web pages are both descriptive and graphic. The videos are more vivid, and the games more realistic, and so on, which all demand for the ability of concurrently processing greater data flow. Considering that the CPU has more control unit but less calculation unit, so the CPU can not meet multitasking and more concurrently processing greater data flow. But GPU has amount of calculation unit, and it can meet easily. In order to achieve the effect of hardware acceleration, this paper dealing with the redundancy comes from data transmission between CPU and GPU,optimized communication module, raised a VIP channel to multistage process the signals of 2D and 3D,and increased the logic of hardware and the ability of processing the driver from user layer.
1699
Abstract: Web Service matchmaking ensured the availability of the discovered service, is a critical issue for Web Service discovery. In this paper we proposed a Semantic Inner Product based Web Service Matchmaking method (SIP-WSM). SIP-WSM merged the structural and semantic information into the Semantic Inner Product of element in WSDL document to realize a loosely structured matchmaking on semantic level. Experiment result shows that SIP-WSM performs better.
1703
Abstract: At present, as the number of web services resources on the network drastically increased, how to quickly and efficiently find the needed services from publishing services has become a problem to resolve. Aiming at the problems of low efficiency in service discovery of traditional web service, the formal concept analysis ( FCA) is introduced into the semantic Web service matching, and a Matching Algorithm based semantic web service is proposed. With considering the concept of limited inheritance,this method introduces the concept of limited inheritance to the semantic similarity calculation based on the concept lattice. It is significant in enhancing the service function matching in practical applications through adjust the calculation.
1708
Abstract: Owing to their major contribution to the total transaction's sales profits, increasingly importance has been attached to high utility itemsets mining. This paper has proposed a TIFF-tree based algorithm, which takes two-pass database scan to obtain the transaction utility information, the conditional matrix of potential high utility is adopted, through the row-column operation, the calculation of transaction utility can be simplified. The experiment result analysis shows that as the decreasing of user-defined threshold, the performance of TIFP-Growth algorithm is much better than the two-phase algorithm.
1713
Abstract: As a new paradigm for hosting and delivering services over the Internet, cloud computing technology especially suitable for dealing with series of problems in strong smart grid. However, despite the fact that cloud computing offers huge opportunities to the strong smart grid, the development of cloud computing technology is currently at its infancy, especially with many security issues to be addressed. In this paper, we present the overall architecture and benefits of cloud computing applications in strong smart grid. After that, we propose a unified security protection system framework of power cloud computing and give some practicable security protection suggestions.
1718
Abstract: This paper gives the structural model of modern distance education platform of distance education ,compares the implementation method and functional framework of the platform of distance education of J2EE architecture with that of service-oriented architecture (SOA) , and proposes the service-oriented architecture (SOA) as an intelligent way of distance education platform architecture. According to CELTS-1 standard, the necessary hardware topology for intelligent distance education platform and the detailed functional design of main module of the platform are given.
1723
Abstract: Intelligent distance education platform needs to construct an open distance education support service system, which is in close contact with network curriculum development and teaching management system, can support various teaching organization forms and teaching methods, can be applied to each link of the network teaching, has good humancomputer interaction function, can provide various services. Proceeding from the hardware topological structure required by the platform, this article elaborates the Intelligent distance education platform design and implementation process comprehensively.
1728
Abstract: Remotely data storage in cloud computing faces great challenge. Data possession checking ensures the data integrity and availability. In this paper, a cloud data possession checking model has been presented. Based on Paillier cryptosystem and elliptic curve cryptograph (ECC),we designed a data possession checking scheme, where the user asks the server to compute a checking value of randomly appointed data blocks, and then makes a decision by proof verification. The homomorphic verification tag (HVT) generated based on Paillier cryptosystem to achieve unlimited queried times. Extensive evaluation and analysis shows the proposed scheme is efficient and secure with the features: a high confidence level, un-forged HVTs, a small constant overhead, etc.
1733