Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li
|
|
- Reynold Owen
- 5 years ago
- Views:
Transcription
1 Applied Mechanics and Materials Submitted: ISSN: , Vols , pp Accepted: doi: / Online: Trans Tech Publications, Switzerland Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques Yunzhi Li School of Management and Economics, Beiing Institute of Technology, Beiing, , China Keywords: Information system; Vulnerability; Partial differential equation; Quantitative criteria; Mathematical modeling; VB programming Abstract. The idea of mathematical modeling is used to establish the quantitative model of information system vulnerability assessment, and the model is solved by using the partial differential method. The algorithm is realized by using VB programming, and it obtains the quantitative solution of information system vulnerability. Quantitative assessment of information system security and risk is the difficulty of system vulnerability assessment, and it establishes the risk model of system by means of mathematics modeling idea. The risk model is divided into the actual risk and the potential risk. The paper uses VB programming software, and establishes a quantitative model of information system evaluation by combining with partial differential method, and the algorithm is carried out the eperimental verification by using the method of numerical simulation. Through the calculation, the mathematical modeling ideas can effectively obtain the vulnerability quantitative standard and the risk level of information system, which provides the technical reference for the research of information system security evaluation method. Introduction With the rapid development of the computer network in our country, the main business of more and more fields can t do without a computer, and all depends on the implementation of information system. However, with the security risks being more and more, the security of the applied system is getting more and more attention, so the system we used must go through the security risk assessment. The vulnerability assessment of information system is divided into the qualitative evaluation and the quantitative evaluation, where the quantitative evaluation is the difficulty of information vulnerability assessment [1,2]. With the idea of mathematical modeling, the quantitative criteria of the actual risk and the potential risk is used to build the model for information system vulnerability, and the use of VB software has successfully achieved the algorithm. Application of the Idea of the Mathematical Modeling in the Vulnerability Assessment of Information System The general risk calculation model has four aspects of factors, including risks, threats, vulnerabilities and assets. While information system, as a special risk system, mainly eists the actual risk and the potential risk [3]. Due to the two kinds of the risks have many influence factors, and it should establish mathematical models to get the quantitative criteria [4]. And it obtains the risk evaluation model through the degree of threat and the probability of security incidents occurred, as shown in Figure 1. Figure 1 shows the designed model of information system risk assessment. The hazard identification and the vulnerability assessment are used to carry on the quantitative evaluation on the security of system. Finally, the vulnerability inde of comprehensive evaluation is obtained by using the algorithm procedures. And the safety risk of the system is calculated according to the vulnerability evaluation standard. All rights reserved. No part of contents of this paper may be reproduced or transmitted in any form or by any means without the written permission of Trans Tech Publications, (ID: , Pennsylvania State University, University Park, USA-08/05/16,20:30:23)
2 1954 Material Science, Civil Engineering and Architecture Science, Mechanical Engineering and Manufacturing Technology II Fig. 1 The calculation model of risk Design of the Mathematical Model and the Algorithm of the Quantitative Assessment of Information System Vulnerability In the process of the quantitative vulnerability assessment of information system, it can refer to the general risk assessment calculation model, which can conveniently realize the quantitative vulnerability of information system [5,6]. In the general risk assessment model, the calculation principle of value at risk is as shown in formula (1). F = Y ( A, W, V ) = Y ( L( W, V ), F( I a, Va )). (1) Where Y represents the security risk function model of quantitative assessment system. A represents the security authentication system of information system. W represents the potential risk. V a and L represent the vulnerability of information system and the probability of security events occurred. In order to accurately quantify the vulnerability of information system, risk quantification can be written as the potential risk and the actual risk. It is as shown in formula (2). u i = ui + u i. (2) The security defense and vulnerability of the system itself are as shown in formula (3). φ = φ + φ. (3) The formula (1) and (2) are put into the continuous partial differential equations, and then it can get the differential equations as shown in formula (4). Dui φ u u i u l 2 ρ = + µ + δ i + ( ρu iu ). Dt i i 3 l (4) For the quantification of information system, it is mainly to solve the, and the specific formula of solution is as shown in the formula (5). Generally, it uses the method of Boussinesq hypothesis that the mean velocity gradient and the Reynolds stress are approimate as shown. u u i ui ρ uiu µ 2 = t + ( ρk + µ t ) δ i. (5) i 3 i Where it represents the risk parameters and the total energy quantitative equation of information system is as shown in formula (6). c pµ t T ( ρ E) + [ ui ( ρe + p)] = k + u i eff + S h t i + i t ( τ ). (6) Pr i Where (τ represents the quantitative standard. The standard can evaluate the level of the ) i eff safety risks for information system [7]. The program algorithm of security risk assessment is designed by using VB software. And the mainly used program is as follows. #include <stdio.h> void main() u i
3 Applied Mechanics and Materials Vols {int t=1,i=2; do {t=t*i;i++;} while (i<=5); printf("%d\n",t); } #include <stdio.h> void main() {int sum=0; scanf("%d",&i); while (i<=10) {sum=sum+i; i++;} printf("%d\n",sum);}... Eperimental Research on the Mathematical Modeling of Quantitative Vulnerability Assessment for Information System In order to validate the validity and reliability of the mathematical model and algorithm of the quantitative vulnerability of information system designed in the second section, VB programming software is used to design the mathematical model of quantitative vulnerability of information system [8,9]. The used VB program interface is shown in Figure 2. Figure 2 shows the open interface of VB6.0. VB has used the GUI system. GUI system can simply establish the application program, and also can develop quite complicated program, which is a combination of visual components based on the form. VB6.0 has a good compatibility with other softwares. Fig. 2 The interface of VB6.0 professional version Fig. 3 Calculation of the convergence curve Figure 3 shows the convergence curve through the calculation. It can be seen from the chart that when the iteration calculation is at the third step, it can have a stable converge, and it indicates that the algorithm of information system vulnerability assessment has a very good convergence, and the convergence speed of the algorithm is higher. Figure 4 shows a three-dimensional calculation curves of vulnerability assessment. It can be seen from the chart that the fusion of the vulnerability curves and the standard quantitative curve is better, which shows that this system doesn t eist great risk in the quantitative assessment of system, at the same time it is consistent with the safety standard. Table 1 Quantification table of information system vulnerability Vulnerability quantification Quantitative criteria Quantification results
4 1956 Material Science, Civil Engineering and Architecture Science, Mechanical Engineering and Manufacturing Technology II Fig. 4 3D calculation curves of vulnerability assessment Table 1 shows the quantitative results of information system vulnerability. It can be seen from the table that the use of the idea of mathematical modeling can effectively quantify the vulnerability of information system, and it can determine the level of information system vulnerability according to the quantitative standard [10,11]. According to the different levels, it can use different colors to label the quantitative results. Fig. 5 3D visualization of vulnerability evaluation Figure 5 shows the visualization results of the quantitative vulnerability of information system. It can be seen that it obtains the corresponding quantitative value of each risk evaluation, and it sets a quantitative standard line [12]. When it is larger than the standard line, the color will gradually appear to be red, which can have eye-catching tips for the operator, so as to have a good realization of the visualization of information evaluation. Summary With the use of the mathematical modeling principle of partial differential equations, the paper designed the quantitative vulnerability mathematical model of information system. The quantitative model included the quantification of the actual risk assessment and the potential risk assessment. The program algorithm of the model was implemented by using VB programming software. In order to verify the validity and reliability of the evaluation method, the information system was carried on the quantitative assessment analysis by using VB software. Through the calculation, it got the calculated residual convergence curve of the algorithm. It could be seen from the convergence results, the residual of the algorithm was smaller, then the accuracy was higher, and the speed of convergence was fast. Through the quantitative assessment of information system vulnerability, it managed to get the risk quantitative standards and the level of vulnerability eisting in the system, which provided technical support for the application of the idea of mathematical modeling in information system. In this paper we establish the cluster algorithm mathematical model of image processing, and introduce it into motion capture of consecutive frame, and use MATLAB programming to realize the function. In this paper, we introduce the X-ray photography technology into motion capture in track and field sports, and use the cluster algorithm to capture the motion continuously, and design using
5 Applied Mechanics and Materials Vols the clustering algorithm of image capture and image processing. We use the MATLAB to test the image effect captured by X-ray photography. Through calculation we find that image enhancement effect is obvious, and it reduces the error of motion capture. It provides a new method for computer image processing in track and field. References [1] Bo Jin, Jiaun Liu. Review on the intrusion detection technology [J]. Journal of East China University of Science and Technology, 2010(1): [2] Jianchun Jiang, Hengtai Ma. A survey of intrusion detection research on network security[j]. Journal of software, 2010(3): [3] Manun Lin, Hualin Qian. Intrusion detection system: principle, intrusion hiding and countermeasures [J]. Microelectronics & computer, 2012(1): [4] Yuanfang Pu, Wei Zhang, Shaohua Teng, Hongle Du. A cooperative network intrusion detection based on decision tree [J]. Journal of Jiangi Normal University: Natural Science Edition, 2010, 34 (3): [6] Houqing Lu, Feng Wang, Yisheng Song, et al. Targets damage assessment system based on compaign simulation [J]. Journal of PLA University of Science and Technology: Natural Science Edition, 2011, 10 (2): [7] Di Wu, Xiaogang Zhao, Fengian Zhu. Simulation study and realization of UAV Ad Hoc network in reencounter scenario [J]. Journal of system simulation, 2011, 20 (23): [8] Zhigao Luo, Binbin Fan, Xiaodong Guo, Xiang Wang, Ju Li. Analysis of the three-dimensional melting flow in inection cavity based on the wavelet finite element [J]. China mechanical engineering, 2010, 20 (10): [9] Xing Zhang, Changiang Shen. A new kind of control module design scheme of the trusted platform [J]. Geomatics and information science of Wuhan University, 2011, 33 (10): [10] Wei Wang, Neng Gao, Lina Jiang. Security demands analysis of cloud computing [J]. Information network security, 2012(30): [11] Huimo Wang, Yu Zhang. Research on the situation data model in oint operations simulation [J]. Acta Simulate Systematical Sinica, 2011, 20 (15): [12] Jun Liu, Zhe Li, Lei Yue. Design and implementation of the self- organization network simulation platform [J]. Computer science, 2011, 35 (1): 24-26, 30.
6 Material Science, Civil Engineering and Architecture Science, Mechanical Engineering and Manufacturing Technology II / Study on the Quantitative Vulnerability Model of Information System Based on Mathematical Modeling Techniques /
Customizing dynamic libraries of Qt based on the embedded Linux Li Yang 1,a, Wang Yunliang 2,b
Applied Mechanics and Materials Submitted: 2014-11-12 ISSN: 1662-7482, Vol. 740, pp 782-785 Accepted: 2014-12-02 doi:10.4028/www.scientific.net/amm.740.782 Online: 2015-03-09 2015 Trans Tech Publications,
More informationSimulation Technology of Light Effect Based on Catia and Workbench Software HongXia Hu
Applied Mechanics and Materials Online: 2014-03-24 ISSN: 1662-7482, Vols. 543-547, pp 3218-3221 doi:10.4028/www.scientific.net/amm.543-547.3218 2014 Trans Tech Publications, Switzerland Simulation Technology
More informationResearch Of Data Model In Engineering Flight Simulation Platform Based On Meta-Data Liu Jinxin 1,a, Xu Hong 1,b, Shen Weiqun 2,c
Applied Mechanics and Materials Online: 2013-06-13 ISSN: 1662-7482, Vols. 325-326, pp 1750-1753 doi:10.4028/www.scientific.net/amm.325-326.1750 2013 Trans Tech Publications, Switzerland Research Of Data
More informationThe Analysis and Research of IPTV Set-top Box System. Fangyan Bai 1, Qi Sun 2
Applied Mechanics and Materials Online: 2012-12-13 ISSN: 1662-7482, Vols. 256-259, pp 2898-2901 doi:10.4028/www.scientific.net/amm.256-259.2898 2013 Trans Tech Publications, Switzerland The Analysis and
More informationEffect of Mesh Size of Finite Element Analysis in Modal Analysis for Periodic Symmetric Struts Support
Key Engineering Materials Online: 2011-01-20 ISSN: 1662-9795, Vols. 462-463, pp 1008-1012 doi:10.4028/www.scientific.net/kem.462-463.1008 2011 Trans Tech Publications, Switzerland Effect of Mesh Size of
More informationConstructing an University Scientific Research Management Information System of NET Platform Jianhua Xie 1, a, Jian-hua Xiao 2, b
Applied Mechanics and Materials Online: 2013-12-04 ISSN: 1662-7482, Vol. 441, pp 984-988 doi:10.4028/www.scientific.net/amm.441.984 2014 Trans Tech Publications, Switzerland Constructing an University
More informationResearch on the Application of Digital Images Based on the Computer Graphics. Jing Li 1, Bin Hu 2
Applied Mechanics and Materials Online: 2014-05-23 ISSN: 1662-7482, Vols. 556-562, pp 4998-5002 doi:10.4028/www.scientific.net/amm.556-562.4998 2014 Trans Tech Publications, Switzerland Research on the
More informationShape Optimization Design of Gravity Buttress of Arch Dam Based on Asynchronous Particle Swarm Optimization Method. Lei Xu
Applied Mechanics and Materials Submitted: 2014-08-26 ISSN: 1662-7482, Vol. 662, pp 160-163 Accepted: 2014-08-31 doi:10.4028/www.scientific.net/amm.662.160 Online: 2014-10-01 2014 Trans Tech Publications,
More informationApplication of Three-dimensional Visualization Technology in Real Estate Management Jian Cui 1,a, Jiju Ma 2,b, Dongling Ma 1, c and Nana Yang 3,d
Applied Mechanics and Materials Online: 2014-07-04 ISSN: 1662-7482, Vols. 580-583, pp 2765-2768 doi:10.4028/www.scientific.net/amm.580-583.2765 2014 Trans Tech Publications, Switzerland Application of
More informationKeywords: Interactive electronic technical manuals; GJB6600; XML markup language; Automatic control equipment
Applied Mechanics and Materials Submitted: 2014-06-11 ISSN: 1662-7482, Vols. 602-605, pp 1165-1168 Accepted: 2014-06-11 doi:10.4028/www.scientific.net/amm.602-605.1165 Online: 2014-08-11 2014 Trans Tech
More informationApplied Mechanics and Materials Vol
Applied Mechanics and Materials Online: 2014-02-27 ISSN: 1662-7482, Vol. 532, pp 280-284 doi:10.4028/www.scientific.net/amm.532.280 2014 Trans Tech Publications, Switzerland A Practical Real-time Motion
More informationThe Analysis of the Loss Rate of Information Packet of Double Queue Single Server in Bi-directional Cable TV Network
Applied Mechanics and Materials Submitted: 2014-06-18 ISSN: 1662-7482, Vol. 665, pp 674-678 Accepted: 2014-07-31 doi:10.4028/www.scientific.net/amm.665.674 Online: 2014-10-01 2014 Trans Tech Publications,
More informationresult, it is very important to design a simulation system for dynamic laser scanning
3rd International Conference on Multimedia Technology(ICMT 2013) Accurate and Fast Simulation of Laser Scanning Imaging Luyao Zhou 1 and Huimin Ma Abstract. In order to design a more accurate simulation
More informationThe RTP Encapsulation based on Frame Type Method for AVS Video
Applied Mechanics and Materials Online: 2012-12-27 ISSN: 1662-7482, Vols. 263-266, pp 1803-1808 doi:10.4028/www.scientific.net/amm.263-266.1803 2013 Trans Tech Publications, Switzerland The RTP Encapsulation
More informationA Compatible Public Service Platform for Multi-Electronic Certification Authority
Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,
More informationSerial Communication Based on LabVIEW for the Development of an ECG Monitor
Advanced Materials Research Online: 2013-08-16 ISSN: 1662-8985, Vols. 734-737, pp 3003-3006 doi:10.4028/www.scientific.net/amr.734-737.3003 2013 Trans Tech Publications, Switzerland Serial Communication
More informationBeijing ,China. Keywords: Constitutive equation; Parameter Extraction; Iteration algorithm
pplied Mechanics and Materials Online: 2013-01-11 ISSN: 1662-7482, Vol. 281, pp 505-510 doi:10.4028/www.scientific.net/mm.281.505 2013 Trans Tech Publications, Switzerland new method based on interation
More informationDesign and Implementation of unified Identity Authentication System Based on LDAP in Digital Campus
Advanced Materials Research Online: 2014-04-09 ISSN: 1662-8985, Vols. 912-914, pp 1213-1217 doi:10.4028/www.scientific.net/amr.912-914.1213 2014 Trans Tech Publications, Switzerland Design and Implementation
More informationIntegration of information security and network data mining technology in the era of big data
Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The
More informationImplementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System
National Conference on Information Technology and Computer Science (CITCS 2012) Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System WANG Tian
More informationResearch on time optimal trajectory planning of 7-DOF manipulator based on genetic algorithm
Acta Technica 61, No. 4A/2016, 189 200 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on time optimal trajectory planning of 7-DOF manipulator based on genetic algorithm Jianrong Bu 1, Junyan
More informationA Digital Menu System Based on the Cloud client Technology Lin Dong 1, a, Weibo Li 1, b, Ping He 2,c,Jia Liu 1,d
Applied Mechanics and Materials Online: 2012-11-29 ISSN: 1662-7482, Vol. 235, pp 389-393 doi:10.4028/www.scientific.net/amm.235.389 2012 Trans Tech Publications, Switzerland A Digital Menu System Based
More informationResearch on Design and Application of Computer Database Quality Evaluation Model
Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the
More informationResearch on friction parameter identification under the influence of vibration and collision
Research on friction parameter identification under the influence of vibration and collision Qiang Chen 1, Yingjun Wang 2, Ying Chen 3 1, 2 Department of Control and System Engineering, Nanjing University,
More informationResearch on Full-text Retrieval based on Lucene in Enterprise Content Management System Lixin Xu 1, a, XiaoLin Fu 2, b, Chunhua Zhang 1, c
Applied Mechanics and Materials Submitted: 2014-07-18 ISSN: 1662-7482, Vols. 644-650, pp 1950-1953 Accepted: 2014-07-21 doi:10.4028/www.scientific.net/amm.644-650.1950 Online: 2014-09-22 2014 Trans Tech
More informationConstruction of the Library Management System Based on Data Warehouse and OLAP Maoli Xu 1, a, Xiuying Li 2,b
Applied Mechanics and Materials Online: 2013-08-30 ISSN: 1662-7482, Vols. 380-384, pp 4796-4799 doi:10.4028/www.scientific.net/amm.380-384.4796 2013 Trans Tech Publications, Switzerland Construction of
More informationA Data Classification Algorithm of Internet of Things Based on Neural Network
A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To
More informationQuality Assessment of Power Dispatching Data Based on Improved Cloud Model
Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper
More informationFace Recognition Based on LDA and Improved Pairwise-Constrained Multiple Metric Learning Method
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 5, September 2016 Face Recognition ased on LDA and Improved Pairwise-Constrained
More informationmanufacturing process.
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 203-207 203 Open Access Identifying Method for Key Quality Characteristics in Series-Parallel
More informationTest Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2
International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang
More informationResearch of Video Surveillance and Diagnosis System for Plant Diseases Based on DM6446 Wang Xiuqing 1, a Qie Xu 1, b Zhang Chunxia 1, c Zhao Na 1, d
Applied Mechanics and Materials Online: 2013-08-30 ISSN: 1662-7482, Vols. 373-375, pp 892-896 doi:10.4028/www.scientific.net/amm.373-375.892 2013 Trans Tech Publications, Switzerland Research of Video
More informationAN WIRELESS COLLECTION AND MONITORING SYSTEM DESIGN BASED ON ARDUINO. Lu Shaokun 1,e*
Advanced Materials Research Online: 2014-06-25 ISSN: 1662-8985, Vols. 971-973, pp 1076-1080 doi:10.4028/www.scientific.net/amr.971-973.1076 2014 Trans Tech Publications, Switzerland AN WIRELESS COLLECTION
More informationOrganization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology
, pp.49-54 http://dx.doi.org/10.14257/astl.2014.45.10 Organization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology Ying Xia, Shiyan Luo, Xu Zhang, Hae Yong Bae Research
More informationThe Application Analysis and Network Design of wireless VPN for power grid. Wang Yirong,Tong Dali,Deng Wei
Applied Mechanics and Materials Online: 2013-09-27 ISSN: 1662-7482, Vols. 427-429, pp 2130-2133 doi:10.4028/www.scientific.net/amm.427-429.2130 2013 Trans Tech Publications, Switzerland The Application
More informationOpen Access Research on the Prediction Model of Material Cost Based on Data Mining
Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining
More informationRealization of Automatic Keystone Correction for Smart mini Projector Projection Screen
Applied Mechanics and Materials Online: 2014-02-06 ISSN: 1662-7482, Vols. 519-520, pp 504-509 doi:10.4028/www.scientific.net/amm.519-520.504 2014 Trans Tech Publications, Switzerland Realization of Automatic
More informationParameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu 1,a, Yanhua Gu 2,b *, Xiaoyu Wang 3,b, Xiu Fang Zhang 4
5th International Conference on Advanced Engineering Materials and Technology (AEMT 205) Parameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu,a, Yanhua Gu 2,b
More informationAn Adaptive Threshold LBP Algorithm for Face Recognition
An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent
More informationNUMERICAL ANALYSIS OF WIND EFFECT ON HIGH-DENSITY BUILDING AERAS
NUMERICAL ANALYSIS OF WIND EFFECT ON HIGH-DENSITY BUILDING AERAS Bin ZHAO, Ying LI, Xianting LI and Qisen YAN Department of Thermal Engineering, Tsinghua University Beijing, 100084, P.R. China ABSTRACT
More informationTraffic Flow Prediction Based on the location of Big Data. Xijun Zhang, Zhanting Yuan
5th International Conference on Civil Engineering and Transportation (ICCET 205) Traffic Flow Prediction Based on the location of Big Data Xijun Zhang, Zhanting Yuan Lanzhou Univ Technol, Coll Elect &
More informationStudy on GA-based matching method of railway vehicle wheels
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(4):536-542 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Study on GA-based matching method of railway vehicle
More informationLocation of air-borne SAR imagery without GCPs and error analysis
International Conference on Remote Sensing, Environment and Transportation Engineering (RSETE 2013) Location of air-borne SAR imagery without GCPs and error analysis FAN Ning-jun, ZHAO Ling-jun, KUANG
More informationA new improved ant colony algorithm with levy mutation 1
Acta Technica 62, No. 3B/2017, 27 34 c 2017 Institute of Thermomechanics CAS, v.v.i. A new improved ant colony algorithm with levy mutation 1 Zhang Zhixin 2, Hu Deji 2, Jiang Shuhao 2, 3, Gao Linhua 2,
More informationResearch on the Wood Cell Contour Extraction Method Based on Image Texture and Gray-scale Information.
, pp. 65-74 http://dx.doi.org/0.457/ijsip.04.7.6.06 esearch on the Wood Cell Contour Extraction Method Based on Image Texture and Gray-scale Information Zhao Lei, Wang Jianhua and Li Xiaofeng 3 Heilongjiang
More informationThe Design of Distributed File System Based on HDFS Yannan Wang 1, a, Shudong Zhang 2, b, Hui Liu 3, c
Applied Mechanics and Materials Online: 2013-09-27 ISSN: 1662-7482, Vols. 423-426, pp 2733-2736 doi:10.4028/www.scientific.net/amm.423-426.2733 2013 Trans Tech Publications, Switzerland The Design of Distributed
More informationApplication Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography
, pp.37-41 http://dx.doi.org/10.14257/astl.2013.31.09 Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography Lanying Li 1, Yun Zhang 1, 1 School of Computer Science and Technology
More informationCHAOTIC ANT SYSTEM OPTIMIZATION FOR PATH PLANNING OF THE MOBILE ROBOTS
CHAOTIC ANT SYSTEM OPTIMIZATION FOR PATH PLANNING OF THE MOBILE ROBOTS Xu Mingle and You Xiaoming Shanghai University of Engineering Science, Shanghai, China ABSTRACT This paper presents an improved ant
More informationAero-engine PID parameters Optimization based on Adaptive Genetic Algorithm. Yinling Wang, Huacong Li
International Conference on Applied Science and Engineering Innovation (ASEI 215) Aero-engine PID parameters Optimization based on Adaptive Genetic Algorithm Yinling Wang, Huacong Li School of Power and
More informationAdaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision
Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Zhiyan Zhang 1, Wei Qian 1, Lei Pan 1 & Yanjun Li 1 1 University of Shanghai for Science and Technology, China
More informationA Network Disk Device Based on Web Accessing
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.6, June 2014, pp. 4387 ~ 4392 DOI: 10.11591/telkomnika.v12i6.5472 4387 A Network Disk Device Based on Web Accessing QunFang Yuan 1, Wenxia
More informationKaiserstr. 10; Karlsruhe, Germany *corresponding Author
Applied Mechanics and Materials Online: 2013-09-03 ISSN: 1662-7482, Vol. 391, pp 118-122 doi:10.4028/www.scientific.net/amm.391.118 2013 Trans Tech Publications, Switzerland Time Efficient Testing of Hybrid
More informationResearch on Evaluation Method of Product Style Semantics Based on Neural Network
Research Journal of Applied Sciences, Engineering and Technology 6(23): 4330-4335, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: September 28, 2012 Accepted:
More informationOptimal Design of the Data Center Environmental Temperature Monitoring ZhiXiang Yuan 1,2, a, ShuangBo Lai 2,b, Ming Liu 1,c, HuiYi Zhang 1,2, d
Applied Mechanics and Materials Online: 2014-05-23 ISSN: 1662-7482, Vols. 556-562, pp 2810-2815 doi:10.4028/www.scientific.net/amm.556-562.2810 2014 Trans Tech Publications, Switzerland Optimal Design
More informationEfficient Path Finding Method Based Evaluation Function in Large Scene Online Games and Its Application
Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 3, May 2017 Efficient Path Finding Method Based Evaluation Function in Large
More informationThe Design and Implementation of Disaster Recovery in Dual-active Cloud Center
International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) The Design and Implementation of Disaster Recovery in Dual-active Cloud Center Xiao Chen 1, a, Longjun Zhang
More informationResearch of 3D parametric design system of worm drive based on Pro/E. Hongbin Niu a, Xiaohua Li b
Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vols. 712-715, pp 1107-1110 doi:10.4028/www.scientific.net/amr.712-715.1107 2013 Trans Tech Publications, Switzerland Research of 3D parametric
More informationDesign and Application of the Visual Model Pool of Mechanical Parts based on Computer-Aided Technologies
Design and Application of the Visual Model Pool of Mechanical Parts based on Computer-Aided Technologies Xiaoying Dong, Xia Ye, Qinxian Jiang, Xianghua Zhang and Wei Bi School of Mechanical and Automobile
More informationResearch on Building Baseline of IT Risk Control and Its Application in IT Risks Management
Management Science and Engineering Vol. 8, No. 3, 2014, pp. 11-16 DOI: 10.3968/5520 ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net www.cscanada.org Research on Building Baseline of IT
More informationResearch on Algorithm Schema of Parametric Architecture Design Based on Schema Theory
International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) Research on Algorithm Schema of Parametric Architecture Design Based on Schema Theory Li Zhu 1, a, Nan Zhang
More informationJournal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical esearch, 015, 7(3):175-179 esearch Article ISSN : 0975-7384 CODEN(USA) : JCPC5 Thread image processing technology research based on
More informationRETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1907-1911 1907 Web-Based Data Mining in System Design and Implementation Open Access Jianhu
More informationAn energy efficient communication routing Protocol based on LEACH for WSN
Advanced Materials Research Online: 2014-04-28 ISSN: 1662-8985, Vol. 905, pp 595-599 doi:10.4028/www.scientific.net/amr.905.595 2014 Trans Tech Publications, Switzerland An energy efficient communication
More informationCitation for the original published paper (version of record):
http://www.diva-portal.org This is the published version of a paper published in Procedia Engineering. Citation for the original published paper (version of record): Zhang, D., Lu, J., Wang, L., Li, J.
More informationA New Method Of VPN Based On LSP Technology
2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing
More informationKeywords: Cloud computing, ZigBee, Smart home, Security cloud
2016 International Conference on Information Engineering and Communications Technology (IECT 2016) ISBN: 978-1-60595-375-5 Design of the Smart-home Security System based on Cloud Computing Yan Wang 1,a,
More informationApplication of CAD/CAE/CAM Technology in Plastics Injection Mould Design and Manufacture. Ming He Dai,Zhi Dong Yun
Advanced Materials Research Vols. 399-401 (2012) pp 2271-2275 Online available since 2011/Nov/22 at www.scientific.net (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.399-401.2271
More informationFuzzy Double-Threshold Track Association Algorithm Using Adaptive Threshold in Distributed Multisensor-Multitarget Tracking Systems
13 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing Fuzzy Double-Threshold Trac Association Algorithm Using
More informationDesign of Coal Mine Power Supply Monitoring System
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design of Coal Mine Power Supply Monitoring System Lei Shi 1, Guo Jin 2 and Jun Xu 3 1 2 Department of electronic
More informationThe Parameters Optimization of Fusion Winglet Based on Orthogonal Experiment Yue LUO 1, *, Qi WANG 1, Qi DU 1 and Hou-An DING 1
2016 International Conference on Control and Automation (ICCA 2016) ISBN: 978-1-60595-329-8 The Parameters Optimization of Fusion Winglet Based on Orthogonal Experiment Yue LUO 1, *, Qi WANG 1, Qi DU 1
More informationA Matlab/Simulink-based method for modelling and simulation of split Hopkinson bar test
ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 6 (2010) No. 3, pp. 205-213 A Matlab/Simulink-based method for modelling and simulation of split Hopkinson bar test Yongjian
More informationDesign and Implementation of LED Display Screen Controller based on STM32 and FPGA Chi Zhang 1,a, Xiaoguang Wu 1,b and Chengjun Zhang 1,c
Applied Mechanics and Materials Online: 2012-12-27 ISSN: 1662-7482, Vols. 268-270, pp 1578-1582 doi:10.4028/www.scientific.net/amm.268-270.1578 2013 Trans Tech Publications, Switzerland Design and Implementation
More informationResearch on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,*
2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer
More informationResearch Article. ISSN (Print) *Corresponding author Chen Hao
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 215; 3(6):645-65 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
More informationComprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority
IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:
More informationProblems and Countermeasures of Information Security of Electric. Power Enterprises in China
6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Problems and Countermeasures of Information Security of Electric Power Enterprises in China Haixun
More informationFeature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design
Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 6, November 2017 Feature-Guided K-Means Algorithm for Optimal Image Vector
More informationRemote monitoring system based on C/S and B/S mixed mode Kaibing Song1, a, Yinsong Wang2,band Dandan Shang3,c
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Remote monitoring system based on C/S and B/S mixed mode Kaibing Song1, a, Yinsong Wang2,band Dandan Shang3,c
More informationThe Research of Delay Characteristics in CAN Bus Networked Control System
Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming
More informationUtilizing Restricted Direction Strategy and Binary Heap Technology to Optimize Dijkstra Algorithm in WebGIS
Key Engineering Materials Online: 2009-10-08 ISSN: 1662-9795, Vols. 419-420, pp 557-560 doi:10.4028/www.scientific.net/kem.419-420.557 2010 Trans Tech Publications, Switzerland Utilizing Restricted Direction
More informationAnalysis of fluid-solid coupling vibration characteristics of probe based on ANSYS Workbench
Analysis of fluid-solid coupling vibration characteristics of probe based on ANSYS Workbench He Wang 1, a, Changzheng Zhao 1, b and Hongzhi Chen 1, c 1 Shandong University of Science and Technology, Qingdao
More informationAlgorithm research of 3D point cloud registration based on iterative closest point 1
Acta Technica 62, No. 3B/2017, 189 196 c 2017 Institute of Thermomechanics CAS, v.v.i. Algorithm research of 3D point cloud registration based on iterative closest point 1 Qian Gao 2, Yujian Wang 2,3,
More informationAn improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi Sun, Songjiang Li
3rd International Conference on Mechatronics and Industrial Informatics (ICMII 2015) An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi
More informationMulti-Objective Optimization of Gatling gun Tripod Based on Mesh. Morphing and RBF Model
Multi-Objective Optimization of Gatling gun Tripod Based on Mesh Morphing and RBF Model BINBIN HUA, RUILIN WANG, YONGJIAN LI, XIAOYONG KANG, HAO TIAN Department of Mechanical Engineering Shijiazhuang Mechanical
More informationRecovering the Communication of Power System Protection Quickly Via ZigBee Wireless Network for the Intelligent Protection Center Research
2016 International Conference on Material Science and Civil Engineering (MSCE 2016) ISBN: 978-1-60595-378-6 Recovering the Communication of Power System Protection Quickly Via ZigBee Wireless Network for
More informationDesign of the Software for Wirelessly Intercepting Voices
Advanced Materials Research Online: 2014-05-23 ISSN: 1662-8985, Vols. 926-930, pp 2470-2473 doi:10.4028/www.scientific.net/amr.926-930.2470 2014 Trans Tech Publications, Switzerland Design of the Software
More informationThe Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis
Journal of Materials, Processing and Design (2017) Vol. 1, Number 1 Clausius Scientific Press, Canada The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis Xueyi Bai1,a,
More informationThe Application of PLC in the automatic Packing Machine Control System Lixia Guo a, Zhengzhong Li b
Advanced Materials Research Online: 2013-09-04 ISS: 1662-8985, Vols. 765-767, pp 1813-1817 doi:10.4028/www.scientific.net/amr.765-767.1813 2013 Trans Tech Publications, Switzerland The Application of PLC
More informationarxiv: v1 [cs.cr] 31 Dec 2018
Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,
More informationAnalysis of the effect of target scattering on the operational effectiveness of seeker
2nd International Conference on Materials Science, Machinery and Energy Engineering (MSMEE 2017) Analysis of the effect of target scattering on the operational effectiveness of seeker Jun-chao Yuan1, a,
More informationPerformance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM
Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.
More informationFault Diagnosis of Wind Turbine Based on ELMD and FCM
Send Orders for Reprints to reprints@benthamscience.ae 76 The Open Mechanical Engineering Journal, 24, 8, 76-72 Fault Diagnosis of Wind Turbine Based on ELMD and FCM Open Access Xianjin Luo * and Xiumei
More informationIntuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning
Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning Meng Fei-xiang 1 Lei Ying-jie 1 Zhang Bo 1 Shen Xiao-yong 1 Zhao Jing-yu 2 1 Air and Missile Defense College Air Force Engineering
More informationDual-System Warm Standby of Remote Sensing Satellite Control System Technology
2016 3 rd International Conference on Materials Science and Mechanical Engineering (ICMSME 2016) ISBN: 978-1-60595-391-5 Dual-System Warm Standby of Remote Sensing Satellite Control System Technology Fei
More informationPrediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c
2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 215) Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai
More informationStudy and Design of CAN / LIN Hybrid Network of Automotive Body. Peng Huang
Advanced Materials Research Online: 2014-06-30 ISSN: 1662-8985, Vol. 940, pp 469-474 doi:10.4028/www.scientific.net/amr.940.469 2014 Trans Tech Publications, Switzerland Study and Design of CAN / LIN Hybrid
More informationA New Evaluation Method of Node Importance in Directed Weighted Complex Networks
Journal of Systems Science and Information Aug., 2017, Vol. 5, No. 4, pp. 367 375 DOI: 10.21078/JSSI-2017-367-09 A New Evaluation Method of Node Importance in Directed Weighted Complex Networks Yu WANG
More informationWavelength Estimation Method Based on Radon Transform and Image Texture
Journal of Shipping and Ocean Engineering 7 (2017) 186-191 doi 10.17265/2159-5879/2017.05.002 D DAVID PUBLISHING Wavelength Estimation Method Based on Radon Transform and Image Texture LU Ying, ZHUANG
More informationThe Design of CAN Bus Communication System Based on MCP2515 and S3C2440 Jinmei Liu, Junhong Wang, Donghui Sun
Advanced Materials Research Online: 2014-05-21 ISSN: 1662-8985, Vol. 933, pp 516-520 doi:10.4028/www.scientific.net/amr.933.516 2014 Trans Tech Publications, Switzerland The Design of CAN Bus Communication
More informationAn Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-745 Volume 10 Issue BioTechnology 014 An Indian Journal FULL PAPER BTAIJ, 10(), 014 [14449-14454] A simplified diagram multiplication method for displacement
More information