Advanced Materials Research Vol. 977

Paper Title Page

Abstract: Freight loading information can not only limit the cargo volume from customers but also guide them to arrange their freight reasonably. This paper analyzed the factors influencing release of railway freight loading information, and established a freight loading information release model based on dynamic planning by setting the most important two indexes -- quantity of freight cars and equilibrium degree of freight cars as objective functions. The model was proved to be effective in balancing daily freight workload on the premise of satisfying customers’ requirements on cargo loadings. Thereby, the author thinks that reasonable release of freight loading information is effective and efficient in making more profits with limited resources.
480
Abstract: Wireless Sensor Networks (WSNs) are used in many applications in military and commercial areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. However, due to the highly resource constrained in sensor nodes, traditional security strategies always can do few with attacks on WSNs. In this Paper, we proposes a study of attacks and security mechanisms in WSNs. First, we summarize the attacks to WSNs and the security requirements based on the TCP\IP networking model, then we present the security solutions to each attack. Along the way we highlight the advantages and disadvantages of various WSN solutions and further compare and evaluate these solutions.
484
Abstract: Nowadays, iPhone has been the most popular smart phone in the world. iPhone sales in the global market have been rising to more than 37 million in the year of 2012. Undoubtedly, iPhone have become common in the world today. iPhone by apple Inc is the yearning of the modern man and the number of iPhone users is increasing every year. A number of 150 iPhone users in Melaka participated in this study by answering the questionnaire from. Moreover it is proved that the independent variables such as feature, innovation, and quality are significantly and positively related to brand image towards purchasing iPhone. The findings result shows that feature contribute the highest influence to the brand image towards the usage of iPhone.
491
Abstract: This paper proposes a non-magnetic framework to calibrate the Inertial Measurement Unit (IMU) based on Total Station. The IMU consists of magnetometer, accelerator and gyroscope. The potential errors are analyzed and raw data of the IMU is preprocessed effectively. The IMU attitude mathematical models are constructed based on the collected spatial coordinate data, marked points, quaternion coordinate transformation, and geographical magnetic compensation. The causations which may affect the accuracy of experimental results are analyzed and technique supports are provided to calibrate the IMU dynamic attitude angle.
496
Abstract: For mutual occlusion problem in multi-object tracking process, a novel tracking algorithm based on bilateral structure tensor corner detection is proposed, which can separate the objects correctly when they experience mutual occlusion. Firstly, it gains the information of each object corners. Secondly, when occlusion occurs, it makes use of K nearest neighbor algorithm combining with the nearest algorithm to classify the corners in occlusion region. Finally, the multi-object tracking algorithm is proposed. The experimental results show that the proposed method can separate the objects correctly and track the objects effectively, when they experience mutual occlusion, even the object changes its motion direction after occlusion.
502
Abstract: Optimization of computer network security technology shift in the relationship is constantly updated. Any computer network security solutions can not be designed once and for all. How seamless integration of network security technology and network security management together to make the network security implementation strategy is very important, this paper proposes a reasonable solution to improve overall network design and optimization of the security system, to develop scientific, reliable, dynamic network security optimization design, the design of enterprise network security solutions, combined with the current firewall, intrusion detection / intrusion prevention technology, VPN technology to achieve rapid escalation of the enterprise information construction in the network security system, thus the basic realization of computer network security optimization design goal.
507
Abstract: The purpose of data analysis is to compress the data extraction, given its simplicity general description. In this paper, the dynamic attack traffic data, trying to establish in the metropolitan traffic monitoring data, according to the abnormal test, hypothesis testing and other methods of attack traffic identification and reasonable analysis, we found the type of attack traffic and network data from a wide range of macro-and related features, in order to provide a basis for analytical methods and techniques of network security data.
511
Abstract: The paper establishes dimensionless mathematical models of the fluid flow in semi-infinite porous media with constant flow rate. Exact analytical solutions of these dimensionless mathematical models are derived by new definitions of dimensionless variables and Laplace transformation. Comparison curves of dimensionless moving boundary under different values of dimensionless Threshold Pressure Gradient (TPG) are plotted from newly proposed exact analytical solutions. An example is used to demonstrate pressure distribution in different positions with different TPG. It is shown that for the constant flow rate condition, the moving boundary extends to infinite in porous media with increasing production time. Steeper pressure curve is observed in larger TPG, which also exhibits greater pressure drop gradient and shorter pressure propagation distance at the same production time.
515
Abstract: The formwork and scaffold leasing companies become one of important links in the industry supply chain. The sustainable development of the company requires the alliance and the further cooperation between the leasing companies. This thesis attempts to study how to decrease the alliance cost and to achieve reasonable cost allocation through linear programming and cooperative games in a sense of transportation cost allocation. Furthermore, the thesis puts forward the data processing method of minimizing the ratio difference of cost saving. Based on this study, it can be concluded that the method is more rational for cost allocation.
520
Abstract: Software security is facing enormous challenges with the rapid development of attacking technology.Obsolete software protection methods can no longer meet the needs of modern software security. In this paper,we proposed a software protection mechanism based on virtual machine which can compile the x86 assembly instructions into virtual instructions.The execution of instructions will be completed in the virtue machine so this mechanism can resist the attack of reverse analysis,meanwhile, the rights of software developers and intellectual property will be protected. furthermore, we design a random instruction generation algorithm to make the code of instructions haphazard, so that the protective ability of VM can be enhanced. We use some experiment to illustrate its superiority and the experimental results indicated that the protective effect of the proposed mechanism is excellent.
525

Showing 101 to 110 of 114 Paper Titles