Advanced Materials Research
Vol. 787
Vol. 787
Advanced Materials Research
Vols. 785-786
Vols. 785-786
Advanced Materials Research
Vols. 781-784
Vols. 781-784
Advanced Materials Research
Vols. 779-780
Vols. 779-780
Advanced Materials Research
Vol. 778
Vol. 778
Advanced Materials Research
Vol. 777
Vol. 777
Advanced Materials Research
Vols. 774-776
Vols. 774-776
Advanced Materials Research
Vol. 773
Vol. 773
Advanced Materials Research
Vol. 772
Vol. 772
Advanced Materials Research
Vol. 771
Vol. 771
Advanced Materials Research
Vol. 770
Vol. 770
Advanced Materials Research
Vol. 769
Vol. 769
Advanced Materials Research
Vol. 768
Vol. 768
Advanced Materials Research Vols. 774-776
Paper Title Page
Abstract: To reduce the computational burden of the reliability analysis of complex engineering application, approximate method is always used to construct the surrogate model of the implicit limit state function. Since the limit state function is a classifier of the failure domain and safe domain, its approximation can be established by the function regression method and data classification method. In this paper, these two methods are tested to several limit state functions including linear function, highly nonlinear function, high dimensional function, series system and parallel system. Least squares support vector machines are used to construct the surrogate models. A detail comparison of function regression method and data classification method for limit state function approximation is given. The conclusions of this paper can give guidance for the engineers to choose an appropriate approximate method in the engineering applications.
1738
Abstract: Access control has vital significance in cloud computing, where data files are stored in the cloud server. In current schemes, the cloud server typically needs to consult the backend authorization server, when processing access control request from data users. This will put a heavy burden on the authorization server, and therefore introduce Denial-of-Service attack on it. To address this issue, this paper models the access control requirement in cloud computing, and designs a distributed access control scheme. Its security features and efficiency are analyzed. The results show that our scheme is quite improved, because it separates the authorization process from the access control process, and releases the authorization server from the access control process. By doing so, the burden on the authorization server is reduced, and the Denial-of-Service attacks on it during access control process are avoided.
1745
Abstract: This article defines a new self-resolving message protocol HML by departing self-describing area and data area. This protocol has limits of the layers of description area, so it could have good parse performance. The feature is proved to be true by compared with XML and ISO8583, and the protocol could be used in communication between layers in high concurrent process system.
1752
Abstract: This paper takes more than four hundred records of some cable television system for example, makes data mining according to users data record, uses BP neural network and decision tree method respectively to have model building and finds the best model fits for users to order press service. The results of the experiment validate the methods feasibility and validity.
1757
Abstract: Using the derivative of the Boolean function and the e-derivative defined by ourselves as research tools, we go deep into the internal structure of the Boolean function values,and discuss the relationship of a variety of cryptographic properties of the weight symmetric H Boolean functions in the range of the weight with the existence of H Boolean functions. We get the results of the weight symmetric H Boolean function should have the same algebraic immunity order, correlation immunity order, the degree of diffusion and nonlinearity. The results provide a theoretical basis to reduce nearly half workload for studying the cryptographic properties of H Boolean function, and provides a new research methods for the study of the properties of cryptographic security of Boolean functions.
1762
Abstract: Situated reconstitution is proposed in this paper to cope with un-manifold polyhedral from the function to form mapping processes. Specifically the situated reconstitution is not simply re-arrangement of geometric elements, mainly face entities in the un-manifold polyhedral, rather it needs a complex geometric/algebraic reasoning to reconstitute a manifold object, novel mathematical as well as AI techniques are introduced in this paper, several tools are developed to testify the proposed situated reconstitution in the “top-down” design automation systems.
1766
Abstract: Simulated Annealing Algorithm is one of the top ten classical optimization algorithm, and it has been successfully applied to various fields. Simulated annealing is a optimization algorithm which can find the global optimal solution, compares to neural network algorithm, it is so easily to implement that has higher probability to be adopted, but it has own shortcomings like other optimization algorithms, its result largely depends on initial value, The initial value of the traditional simulated annealing algorithm began with a random number, its convergence speed is often slow very much and the effect is bad. In this paper, a new simulated annealing algorithm that based on genetic algorithm and hill-climbing method was brought up, because of hill-climbing algorithm was easy to fall into local optimum, and simulated annealing can just solve the problem, it not only escaped from local optimum, but also got good convergence speed and results.
1770
Abstract: The network communication between MATLAB and configuration software is established using OPC (OLE for Process Control) technology, which is easily to give full play to generate interactive interface in configuration software and simulation of control object model in MATLAB software. The calculation function of weakness in configuration software is repaired and the control object model and controller is to be isolated. The effective simulation platform for theory research and design of control system is established.
1774
Abstract: A method of image segmentation based on boundary geometrical characteristics is proposed to solve the problem of the low contrast and difficulty contour concavity, and different matching rules are given by comparing the numbers of inflexions with the numbers of particle image. Segmentation lines are drawn based on Bresenham algorithm and overlapping particle image are separated by connecting the candidate inflexions. The algorithm is simple and effective, while the results meet the requirements.
1778
Abstract: University mobile digital library is a new service system in digital library. Based on wireless network, Internet and multimedia technology, readers of mobile digital library can make use of a variety of mobile terminal conveniently and flexibly to access services and resources without any limitation on time and space. Service pattern of mobile digital library mainly has SMS service mode, WAP service mode, mobile reference service mode and digital full-text reading service mode. This paper discusses the architecture of mobile digital library mode, which includes base layer, content layer, technology layer and user layer, and establishes the technical framework of mobile digital library system, which has the characteristics of unique authentication, unified retrieval and comprehensive function, etc.
1782