Advanced Materials Research
Vol. 1001
Vol. 1001
Advanced Materials Research
Vol. 1000
Vol. 1000
Advanced Materials Research
Vols. 998-999
Vols. 998-999
Advanced Materials Research
Vol. 997
Vol. 997
Advanced Materials Research
Vol. 996
Vol. 996
Advanced Materials Research
Vol. 995
Vol. 995
Advanced Materials Research
Vols. 989-994
Vols. 989-994
Advanced Materials Research
Vol. 988
Vol. 988
Advanced Materials Research
Vols. 986-987
Vols. 986-987
Advanced Materials Research
Vols. 984-985
Vols. 984-985
Advanced Materials Research
Vol. 983
Vol. 983
Advanced Materials Research
Vol. 982
Vol. 982
Advanced Materials Research
Vol. 981
Vol. 981
Advanced Materials Research Vols. 989-994
Paper Title Page
Abstract: Software evolution process model (EPM) is a knowledge-intensive process which is described in EPDL(Software Evolution Process Description Language) and modelled by semi-formal approach based on EPMM(Software Evolution Process Meta-Model). In order to support process improvement and process automation, the execution model is represented by logic programming. Activity in EEM (EPM’s execution model) is not implemented until its needing all kinds of resources are satisfied by system execution environment. The paper discussed the representations of all kinds of resources in EEM and their structures are proposed. The preparation resources method is presented in order to execute the EEM automatically. The converter program is realized and the correct results have presented to prove the correctness of the method.
4851
Abstract: This paper Based on the composition, types, functions and applications in the field of geographic information systems, analyzes the advantages of GIS technology in environmental impact assessment. From the project environmental impact assessment (EIA) of the limitations of departure, outlining the current status of the EIA study, while an overview of the geographic information system (GIS) functionality and applications, focusing on the status of the application of environmental impact assessment in the field of geographic information systems Necessity and Prospect. And use some of the existing management and analysis of environmental monitoring information system based on GIS examples further illustrate the application of GIS in Environmental Monitoring Data Management Analysis, give full play to the advantages of GIS spatial information processing and comprehensive analysis of expression, making the environmental monitoring data more effective.
4855
Abstract: In the analysis of the development and the functional requirement of the network-based maintenance training system, combining the long-distance maintenance service and virtual reality technology, the long-distance maintenance service based on Browser\Server has been founded, and the system architecture, key technologies and implementation methods have also been researched and discussed. The system will provide a powerful technical support platform for carrying out long-distance maintenance service.
4861
Abstract: The article discusses the issues related to the on-chip network topology, analyzes the XBFT topology, improves its structure in power consumption. Authors designed a simulation program that by analyzing the topology routing hops to roughly determine the power consumption of routing topology and for the preparation of modified XBFT roughly determine the topology of the routing topology by analyzing the power consumption topology routing hops the simulation program, Finally, the results from the running of 6 simulation program that extracted and these results were analyzed. The result shows that the improved topology saved about 20% of the number of routing hops.
4865
Abstract: Database grid service provides users with a unified interface to access to distributed heterogeneous databases resources. To overcome the weakness of collaborative services ability in different grid portal, a new grid portal architecture based on CSGPA (Collaborative Services Grid Portal Architecture), is proposed. This paper aims to enhance the performance of PSO in complex optimization problems and proposes an improved PSO variant by incorporating a novel mutation operator. Experimental studies on some well-known benchmark problems show that our approach achieves promising results.
4869
Abstract: There are many factors that can affect network performance, such as delay, packet loss and capacity utilization. A Wireless-Optical Broadband Access Network (WOBAN) is gaining more attention because its good performance and merits such as reliability, robustness and high capacity as well as flexibility. In this paper, we proposed the Flow Limited and Risk Aware Routing Algorithm (FLRAR), which takes capacity utilization and link failure into account. And we also used Link Success Rate (LSR) to detect the link failure and redirect the related packets. The research results show that the process of information fusion has abilities of adapting and self-learning.
4873
Abstract: Because the traditional linear vectorization methods have some shortcomings including processing data slowly, being sensitive to noises and being easy to be distorted. Fuzzy rules and its inference mechanism are the assurance of achieving feature fusion. However, the self-learning function of FNN could train its weights; it is difficult to optimize fuzzy rules. Besides, the common FNN training algorithms have low constringency speed and are liable to run into the local optimization.PSO algorithm has high convergence speed and it is simpler on the operation and is more potential on optimizing FNN. Thus, PSO algorithm could be adapted to train FNN weights, and prune the redundancy links, optimize fuzzy rules base. In the paper we present an improving immune genetic algorithm based on chaos theory. The over-spread character and randomness of chaos can be used to initialize population and improve the searching speed, and the initial value sensitivity of chaos can be used to enlarge the searching space. To avoid the local optimization, the algorithm renews population and enhances the diversity of population by using density calculation of immune theory and adjusting new chaos sequence.
4877
Abstract: The social engineering techniques such as flattery, persuade, induce, disguise, threat, obedience and infiltration was summarized. The main methods and steps of social engineering research and the main six aspects contents such as social engineering technology analysis, social engineering case survey were also put forward. Finally, a model of social engineering attack based on complex network is built and some prevention methods aiming to social engineering attack were presented.
4881
Abstract: Network security situation awareness is an effective way to analysis security situation of complex network.The concept and model of network security situational awareness was introduced.A new model of network security situation awareness was proposed. Considering the characteristics of multi-source information in network security research, a security situation awareness algorithm based on information fusion was adopted. This algorithm advanced modified D-S evidence theory, gets the values of security situation awareness of network by data source level fusion, host-level fusion and system-level fusion. The results can reflect the general security state of network.
4885
Abstract: With increasing integration of mobile communication and internet technology, mobile e-commerce is begining to becomet useful supplement of traditonal e-commerce and shows strong vitality and development potential, relying on superiority in technology and application. The paper presents current situation of mobile e-commerce in 3G era, analyzes the problems, and puts forward corresponding strategies and rational suggestion.
4889