Improvement of the Expert System Shell Pro/3 Sentence Input Function and Exploration of Batch Computers Security Assessment
|
|
- Clifton Andrews
- 6 years ago
- Views:
Transcription
1 Advanced Materials Research Online: ISSN: , Vol. 684, pp doi: / Trans Tech Publications, Switzerland Improvement of the Expert System Shell Pro/3 Sentence Input Function and Exploration of Batch Computers Security Assessment Qiming Cui 1, a, Shaogang Hu 1,b, Rui Zhao 1,c, Jun Liu 1,d, Shengwei Liu 1,e, Hongxing Liu 1,f, and Zhenqiang Fu 1,g 1 Liaoning Anshan Power Supply Company, ,Anshan, China a ospb2002@yahoo.com.cn, b huas201278@ yahoo.com.cn, c lnasfu@163.com, d kejixinxi@163.com, e liuwei @yahoo.com.cn, f lnlhx@tom.com, g fuzhenqiang1110@163.com Keywords: Expert System, Expert System Shell, Power Supply Company Desktop Terminal Computer, Visual Prolog, Pro/3 Abstract. Improvement of the expert system shell Pro/3 sentence record input function is introduced. The function of the Pro/3 inputting disposable a large quantities of sentence records corresponding to a sentence, i.e., batch inputting the sentence records, was implemented. The basic security condition assessment method of some desktop terminal computers in the power supply company was explored to achieve the expert system about these desktop terminal computers basic security condition assessment. Experimental results show that the batch inputting sentence records function is more effective and the desktop terminal computers basic security condition assessment expert system is feasible. Introduction With the constantly deepening of information technology and application, many managements and businesses of some power supply companies are increasingly inseparable from these companies's information network. Meanwhile, the information network becomes more complex, the information systems are used more deeply,and especially the desktop terminal computers are increasing largely. These show that the importance of the desktop terminal computers security management is prominent in the management of information network.for many power supply companies, the desktop terminal computers security involves the companies's information security and the operation of the business systems. Therefore, the desktop terminal computers security management must be strengthened. At present, the management of the desktop terminal computers mainly focuses on whether there exsits any illegal operation (such as a intranet is directly connected to the internet) event and conforms to the requirement of installing antivirus software on the desktop terminal computers and the registration rate of the desktop terminal computers, but not having a assessment system of the desktop terminal computers basic security situation.therefore,by exploring the application of the desktop terminal computers basic security assessment expert system based on the Pro/3 and previous work [1], the basic security statuses will be given in order to provide some references of the desktop terminal computers security management. The ultimate goal should strengthen the information security of the companies. The expert system shell Pro/3 The Pro/3 [2]is an expert system shell consisted of some knowledge models with some facts, logic rules and other knowledges. The knowledge models can be used for handling statistical and other operations on sets of facts, as well as reasoning of inexact rules with certainty factors,probabilities and fuzzy sets. The Pro/3 can be used as a backward chaining system, and also a forward chaining. Meanwhile, the Pro/3 is also a production system. In general,there exist four knowledge representations,namely sentences (or facts), sentence rules,inexact rules,fuctions in the Pro/3. All rights reserved. No part of contents of this paper may be reproduced or transmitted in any form or by any means without the written permission of Trans Tech Publications, (ID: , Pennsylvania State University, University Park, USA-10/05/16,18:25:26)
2 556 Advances in Applied Materials and Electronics Engineering II The design and implementation of the batch sentence records input function in the Pro/3 Basic idea.when inputting a new sentence, some records corresponding to the sentence are inputted one at a times in the sentence types and groups submenu of the sentence menu in the original Pro/3.If there exist a large number of the sentence records need to be input, this input efficiency will be very low.if a sentence is corresponding to a table record(or partly) in a database or a Excel sheet, the table or sheet content can be exported to a text file for future use.the File Process (used for the text file process) and New sentence(batch) (for inputting the batch sentence records) button function were added and the Enter new type and New sentences (changed into New sentence(one) ) button function were improved in the original Pro/3 in order to input the batch sentence records. The result is that not only the Pro/3 can be used for inputting the batch sentence records, but also for every times inputting a sentence record.the program files modified include the sentence.pro, the sentences.pro, the sentence.cl, the sentences.cl, the tedbutton.pro, and the tedbutton.cl,also add the tedp311 directory and files: the tedp311.pro, the tedp311.cl, the tedp311.pack, the tedp311.ph, and the tedp311.i. A example of involving the text file format.the file format named mtest2012.txt exported from a database table or a Excel sheet is as follows (here considering three types of data: string, real, integer): 2 ; the data line number in the text file, namely the total number of records, ; manual setting after exporting the text file; Stringvalue ; the first record, each record has three fields; Stringvalue ; the second record. The file format named test2012.txt generated by File Process button is as follows: 6 ; the total number of data records, manual setting; 3 ; the number of field in each record, manual setting; Stringvalue1 ; the first field value in the first record; ; the second field value in the first record; 6 ; the third field value in the first record; Stringvalue2 ; the first field value in the second record; ; the second field value in the second record; 8 ; the third field value in the second record. The basic steps of batch inputting sentence records.1) Export some available contents of a table in a database or a Excel sheet to the text file named mtest2012.txt, and manual add a total number of records in the mtest2012.txt file. 2) Eexecut the File Process function in order to create the test2012.txt file, and manual add the total number of data records and the number of field in each record in the test2012.txt file. 3) Perform the sentence types and groups submenu in the sentence menu, there are two cases: a) A definition of a new sentence such as computer has configuration. The first, select has in sentence groups column, computer in 1st entity argument column, and configuration in 2nd entity argument, then execute the Enter new type function so that a table form can be displayed(see Fig.1). The second, input a sentence record such as test 1, 1, 1, 1, 1 (any value of as long as the type corresponding to the type of domain column)in the value column in the table form,and press the Save New button, then the sentence computer has configuration is generated. The third, close the sentence types and groups window, again open it,select the computer has configuration,press the New sentence (batch) button,and input a boot record such as test2, 2, 2, 2, 2, 2 (similar to Fig.1), then all the records in the test2012.txt file automatically will be inputted to the records of sentence computer has configuration but the boot record. The sentence record of test, 1, 1, 1, 1, 1 can then be deleted manual. b) If a sentence already exists, then select it directly, and start the batch sentence records input operation by pressing the New sentence (batch) button.
3 Advanced Materials Research Vol Fig.1 The interface of sentence types and groups Fig.2 The sentences and the result of assessment The desktop terminal computers basic security assessment expert system Based on above work and using some index data in the desktop terminal computers management system, the expert system of the desktop terminal computers basic security assessment had been design and implemented.the basic idea of it is as follows: 1) At a given time point, some index data of the batch desktop terminal computers such as the virus behavior, the weak password,the patch installation, the blocking alarm, the equipment variation (such as a mobile storage medium) in the desktop terminal computers management system are captured by the data export function of the management system.these data are the accumulative values of all the index data at end of this time point. The sentences corresponding to these index data such as the computer has virus behavior, and the computer has weak password are created in the expert system(see Fig.2). The batch sentence records are then inputted respectively. 2) These index data in each sentence record are quantitatively processed by calling some functions based on the Pro/3[3],and its quantification processing rules are shown in the Fig.6, the Fig.7,and the Fig.8.During each assessment period, a highest value limit and a lowest limit of each index data,and some other options are given by a user.meanwhile, the expert system also consider maximum value and minimum constraint of whole index data.the sentences with quantified data are used for a ordered weighted averaging operation(see Fig.3) and then its result is processed together with a sentence computer within count constraints in a standard intersection operation (see Fig.4). The assessment result is shown a data table in the Fig.2. The deviceid column of the data table gives the identifications of some desktop terminal computers and the degree of assessment column gives the basic security assessment values of these desktop terminal computers.the higher the value, the worse the security degree or the security degree is relatively poor. The analysis of the expert system operation process The goal of the expert system is to derive a sentence computer are assessment.the Fig.5 is the rule tree of the sentence computer are assessment.the sentence is derived from the sentence computer has configuration.the deviceid of the computer has configuration is assigned to the subject computer of the computer are assessment. The predicate are assessment of the computer are assessment is assigned through its degree of assessment data elements by invoking a inexact rule sentence unsafe computer after a series of operation.while the unsafe computer is the result of the standard intersection operation between a sentence computer that match preference and the computer within count constraints (see Fig.4).The computer that match preference is completed in the ordered weighted averaging operation(see Fig.3). The computer within count constraints can be used in constrainting values of all the index data.the expert system takes 52 seconds to derive 7 sentences containing 847 records (a computer corresponding to 7 sentence records) and 4 inexact rules (including some question rules)in the forward inference operation on a PC(cpu:3.29Ghz, memory: 1.82Gb). The program processing flows of the New sentence (batch) and the New sentence(one) are shown in the Fig.9 and the Fig.10 respectively.
4 558 Advances in Applied Materials and Electronics Engineering II Fig.3 The operation of ordered weighted averaging Fig.4 The operation of standard intersection Fig.5 The rule tree of assessment Fig.6 The count<lowest count Fig.7 The count>highest count Fig.8 Lowest count<=the count<=highest count Fig.9 Batch process flow Fig.10 One process flow Conclusions The batch inputting method of sentence records in the Pro/3 was given and its function had been implemented. It can be obviously seen that the efficiency of inputting new sentence records is improved greatly by some testing,especially where there exist many sentences (including a large of data elements in each sentence) and each sentence corresponds to thousands of sentence records. The method and its feasibility of the desktop terminal computers basic security condition assessment in the power supply company were explored by implementing the desktop terminal computers basic security assessment expert system based on the improved Pro/3. Begin with,the relating index data are quantitatively processed in the expert system, and then the ordered weighted averaging and the standard intersection operation are executed, finally the expert system gives a number of the desktop terminal computers basic security assessment values.the assessment values provided are some references of that it can be used better understanding the desktop terminal computers basic security conditions of the company and more effectively doing the information security work.further work will include the optimization of the assessment model and expand the scope of the assessment. References [1] Qiming Cui, Shengwei Liu, Hongxing Liu, Zhihai Wang,in:Application Research of the Production System- type Expert System Shell Pro/3 under Smart Grid, IEEE PES ISGT ASIA 2012, IEEE Xplore. [2] Jens Hintze Holm:Pro/3 - A Production System-type Expert System Shell, Visual Prolog Application & Language Conference,Portugal,April,2006. [3] Jens Hintze Holm, Pro/3 expert system shell, Information on
5 Advances in Applied Materials and Electronics Engineering II / Improvement of the Expert System Shell Pro/3 Sentence Input Function and Exploration of Batch Computers Security Assessment /
A CNC equipment distributed monitoring system based on cloud computing technology RangYong Zhang a, Geng Ma b, GuangHe Cheng c
Advanced Materials Research Submitted: 2014-07-26 ISSN: 1662-8985, Vol. 1022, pp 392-395 Accepted: 2014-07-28 doi:10.4028/www.scientific.net/amr.1022.392 Online: 2014-08-28 2014 Trans Tech Publications,
More informationA Template-Matching-Based Fast Algorithm for PCB Components Detection Haiming Yin
Advanced Materials Research Online: 2013-05-14 ISSN: 1662-8985, Vols. 690-693, pp 3205-3208 doi:10.4028/www.scientific.net/amr.690-693.3205 2013 Trans Tech Publications, Switzerland A Template-Matching-Based
More informationDesign and Implementation of unified Identity Authentication System Based on LDAP in Digital Campus
Advanced Materials Research Online: 2014-04-09 ISSN: 1662-8985, Vols. 912-914, pp 1213-1217 doi:10.4028/www.scientific.net/amr.912-914.1213 2014 Trans Tech Publications, Switzerland Design and Implementation
More informationThe Application of Programmable Controller to Chip Design. Shihong Lan 1, Jian Zhang 2
Applied Mechanics and Materials Online: 2013-01-11 ISSN: 1662-7482, Vol. 273, pp 722-725 doi:10.4028/www.scientific.net/amm.273.722 2013 Trans Tech Publications, Switzerland The Application of Programmable
More informationResearch Institute of Uranium Geology,Beijing , China a
Advanced Materials Research Online: 2014-06-25 ISSN: 1662-8985, Vols. 971-973, pp 1607-1610 doi:10.4028/www.scientific.net/amr.971-973.1607 2014 Trans Tech Publications, Switzerland Discussion on Development
More informationThe Application Analysis and Network Design of wireless VPN for power grid. Wang Yirong,Tong Dali,Deng Wei
Applied Mechanics and Materials Online: 2013-09-27 ISSN: 1662-7482, Vols. 427-429, pp 2130-2133 doi:10.4028/www.scientific.net/amm.427-429.2130 2013 Trans Tech Publications, Switzerland The Application
More informationDesign of the Software for Wirelessly Intercepting Voices
Advanced Materials Research Online: 2014-05-23 ISSN: 1662-8985, Vols. 926-930, pp 2470-2473 doi:10.4028/www.scientific.net/amr.926-930.2470 2014 Trans Tech Publications, Switzerland Design of the Software
More informationStorage Model of Graph Based on Variable Collection
Advanced Materials Research Online: 2013-09-04 ISSN: 1662-8985, Vols. 765-767, pp 1456-1460 doi:10.4028/www.scientific.net/amr.765-767.1456 2013 Trans Tech Publications, Switzerland Storage Model of Graph
More informationSerial Communication Based on LabVIEW for the Development of an ECG Monitor
Advanced Materials Research Online: 2013-08-16 ISSN: 1662-8985, Vols. 734-737, pp 3003-3006 doi:10.4028/www.scientific.net/amr.734-737.3003 2013 Trans Tech Publications, Switzerland Serial Communication
More informationResearch of 3D parametric design system of worm drive based on Pro/E. Hongbin Niu a, Xiaohua Li b
Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vols. 712-715, pp 1107-1110 doi:10.4028/www.scientific.net/amr.712-715.1107 2013 Trans Tech Publications, Switzerland Research of 3D parametric
More informationA design of real-time image processing platform based on TMS320C6678
Advanced Materials Research Online: 2014-06-25 ISSN: 1662-8985, Vols. 971-973, pp 1454-1458 doi:10.4028/www.scientific.net/amr.971-973.1454 2014 Trans Tech Publications, Switzerland A design of real-time
More informationThe Analysis and Research of IPTV Set-top Box System. Fangyan Bai 1, Qi Sun 2
Applied Mechanics and Materials Online: 2012-12-13 ISSN: 1662-7482, Vols. 256-259, pp 2898-2901 doi:10.4028/www.scientific.net/amm.256-259.2898 2013 Trans Tech Publications, Switzerland The Analysis and
More informationApplication of CAD/CAE/CAM Technology in Plastics Injection Mould Design and Manufacture. Ming He Dai,Zhi Dong Yun
Advanced Materials Research Vols. 399-401 (2012) pp 2271-2275 Online available since 2011/Nov/22 at www.scientific.net (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.399-401.2271
More informationConstructing an University Scientific Research Management Information System of NET Platform Jianhua Xie 1, a, Jian-hua Xiao 2, b
Applied Mechanics and Materials Online: 2013-12-04 ISSN: 1662-7482, Vol. 441, pp 984-988 doi:10.4028/www.scientific.net/amm.441.984 2014 Trans Tech Publications, Switzerland Constructing an University
More informationThe Design of CAN Bus Communication System Based on MCP2515 and S3C2440 Jinmei Liu, Junhong Wang, Donghui Sun
Advanced Materials Research Online: 2014-05-21 ISSN: 1662-8985, Vol. 933, pp 516-520 doi:10.4028/www.scientific.net/amr.933.516 2014 Trans Tech Publications, Switzerland The Design of CAN Bus Communication
More informationRealization of Automatic Keystone Correction for Smart mini Projector Projection Screen
Applied Mechanics and Materials Online: 2014-02-06 ISSN: 1662-7482, Vols. 519-520, pp 504-509 doi:10.4028/www.scientific.net/amm.519-520.504 2014 Trans Tech Publications, Switzerland Realization of Automatic
More informationApplied mechanics and applied technology in fuel injection pump bench. Rotational speed measurement system design based on CPLD
Advanced Materials Research Online: 2014-03-24 ISSN: 1662-8985, Vol. 910, pp 316-319 doi:10.4028/www.scientific.net/amr.910.316 2014 Trans Tech Publications, Switzerland Applied mechanics and applied technology
More informationStudy on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li
Applied Mechanics and Materials Submitted: 2014-08-05 ISSN: 1662-7482, Vols. 651-653, pp 1953-1957 Accepted: 2014-08-06 doi:10.4028/www.scientific.net/amm.651-653.1953 Online: 2014-09-30 2014 Trans Tech
More informationResearch Of Data Model In Engineering Flight Simulation Platform Based On Meta-Data Liu Jinxin 1,a, Xu Hong 1,b, Shen Weiqun 2,c
Applied Mechanics and Materials Online: 2013-06-13 ISSN: 1662-7482, Vols. 325-326, pp 1750-1753 doi:10.4028/www.scientific.net/amm.325-326.1750 2013 Trans Tech Publications, Switzerland Research Of Data
More informationMarine fuel boiler system design platform. Hou Ying-ying
Advanced Materials Research Submitted: 2014-05-11 ISSN: 1662-8985, Vols. 986-987, pp 1218-1221 Accepted: 2014-05-19 doi:10.4028/www.scientific.net/amr.986-987.1218 Online: 2014-07-18 2014 Trans Tech Publications,
More informationDesign of PC Remote Monitoring System for Standby Generators Chuanhong Zhou 1,a,Jinjie Xiao 1,b, Wei Ren 1,c
Advanced Materials Research Submitted: 2014-06-03 ISSN: 1662-8985, Vol. 1039, pp 197-202 Accepted: 2014-07-14 doi:10.4028/www.scientific.net/amr.1039.197 Online: 2014-10-31 2014 Trans Tech Publications,
More informationPrivilege Separation in Browser Extensions Based on Web Workers
Advanced Materials Research Submitted: 2014-05-24 ISSN: 1662-8985, Vols. 989-994, pp 4675-4679 Accepted: 2014-05-30 doi:10.4028/www.scientific.net/amr.989-994.4675 Online: 2014-07-16 2014 Trans Tech Publications,
More informationResearch on the Application of Digital Images Based on the Computer Graphics. Jing Li 1, Bin Hu 2
Applied Mechanics and Materials Online: 2014-05-23 ISSN: 1662-7482, Vols. 556-562, pp 4998-5002 doi:10.4028/www.scientific.net/amm.556-562.4998 2014 Trans Tech Publications, Switzerland Research on the
More informationStudy and Design of CAN / LIN Hybrid Network of Automotive Body. Peng Huang
Advanced Materials Research Online: 2014-06-30 ISSN: 1662-8985, Vol. 940, pp 469-474 doi:10.4028/www.scientific.net/amr.940.469 2014 Trans Tech Publications, Switzerland Study and Design of CAN / LIN Hybrid
More informationDesign and Implementation of MP3 Player Based on FPGA Dezheng Sun
Applied Mechanics and Materials Online: 2013-10-31 ISSN: 1662-7482, Vol. 443, pp 746-749 doi:10.4028/www.scientific.net/amm.443.746 2014 Trans Tech Publications, Switzerland Design and Implementation of
More informationA Digital Menu System Based on the Cloud client Technology Lin Dong 1, a, Weibo Li 1, b, Ping He 2,c,Jia Liu 1,d
Applied Mechanics and Materials Online: 2012-11-29 ISSN: 1662-7482, Vol. 235, pp 389-393 doi:10.4028/www.scientific.net/amm.235.389 2012 Trans Tech Publications, Switzerland A Digital Menu System Based
More informationDesign and Implementation of Archives Query System Based on B/S Structure Lianfeng Zhao
Applied Mechanics and Materials Online: 2012-12-13 ISSN: 1662-7482, Vols. 241-244, pp 3098-3102 doi:10.4028/www.scientific.net/amm.241-244.3098 2013 Trans Tech Publications, Switzerland Design and Implementation
More informationUtilizing Restricted Direction Strategy and Binary Heap Technology to Optimize Dijkstra Algorithm in WebGIS
Key Engineering Materials Online: 2009-10-08 ISSN: 1662-9795, Vols. 419-420, pp 557-560 doi:10.4028/www.scientific.net/kem.419-420.557 2010 Trans Tech Publications, Switzerland Utilizing Restricted Direction
More informationResearch On DB2 Performance Testing Automation
Advanced Materials Research Online: 2013-09-18 ISSN: 1662-8985, Vols. 756-759, pp 2204-2208 doi:10.4028/www.scientific.net/amr.756-759.2204 2013 Trans Tech Publications, Switzerland Research On DB2 Performance
More informationKeywords: truck frame, parametric modeling, cross-section.
Key Engineering Materials Online: 2011-01-20 ISSN: 1662-9795, Vols. 460-461, pp 534-539 doi:10.4028/www.scientific.net/kem.460-461.534 2011 Trans Tech Publications, Switzerland A Research and Application
More informationThe Design of Distributed File System Based on HDFS Yannan Wang 1, a, Shudong Zhang 2, b, Hui Liu 3, c
Applied Mechanics and Materials Online: 2013-09-27 ISSN: 1662-7482, Vols. 423-426, pp 2733-2736 doi:10.4028/www.scientific.net/amm.423-426.2733 2013 Trans Tech Publications, Switzerland The Design of Distributed
More informationPath Planning with Motion Optimization for Car Body-In-White Industrial Robot Applications
Advanced Materials Research Online: 2012-12-13 ISSN: 1662-8985, Vols. 605-607, pp 1595-1599 doi:10.4028/www.scientific.net/amr.605-607.1595 2013 Trans Tech Publications, Switzerland Path Planning with
More informationThe Application of PLC in the automatic Packing Machine Control System Lixia Guo a, Zhengzhong Li b
Advanced Materials Research Online: 2013-09-04 ISS: 1662-8985, Vols. 765-767, pp 1813-1817 doi:10.4028/www.scientific.net/amr.765-767.1813 2013 Trans Tech Publications, Switzerland The Application of PLC
More informationConstruction of the Library Management System Based on Data Warehouse and OLAP Maoli Xu 1, a, Xiuying Li 2,b
Applied Mechanics and Materials Online: 2013-08-30 ISSN: 1662-7482, Vols. 380-384, pp 4796-4799 doi:10.4028/www.scientific.net/amm.380-384.4796 2013 Trans Tech Publications, Switzerland Construction of
More informationClustering Analysis based on Data Mining Applications Xuedong Fan
Applied Mechanics and Materials Online: 203-02-3 ISSN: 662-7482, Vols. 303-306, pp 026-029 doi:0.4028/www.scientific.net/amm.303-306.026 203 Trans Tech Publications, Switzerland Clustering Analysis based
More informationAN WIRELESS COLLECTION AND MONITORING SYSTEM DESIGN BASED ON ARDUINO. Lu Shaokun 1,e*
Advanced Materials Research Online: 2014-06-25 ISSN: 1662-8985, Vols. 971-973, pp 1076-1080 doi:10.4028/www.scientific.net/amr.971-973.1076 2014 Trans Tech Publications, Switzerland AN WIRELESS COLLECTION
More informationInformation Security Coding Rule Based on Neural Network and Greedy Algorithm and Application in Network Alarm Detection
2016 4 th International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2016) ISBN: 978-1-60595-412-7 Information Security Coding Rule Based on Neural Network and Greedy Algorithm
More informationPower Load Forecasting Based on ABC-SA Neural Network Model
Power Load Forecasting Based on ABC-SA Neural Network Model Weihua Pan, Xinhui Wang College of Control and Computer Engineering, North China Electric Power University, Baoding, Hebei 071000, China. 1471647206@qq.com
More informationKaiserstr. 10; Karlsruhe, Germany *corresponding Author
Applied Mechanics and Materials Online: 2013-09-03 ISSN: 1662-7482, Vol. 391, pp 118-122 doi:10.4028/www.scientific.net/amm.391.118 2013 Trans Tech Publications, Switzerland Time Efficient Testing of Hybrid
More informationThe RTP Encapsulation based on Frame Type Method for AVS Video
Applied Mechanics and Materials Online: 2012-12-27 ISSN: 1662-7482, Vols. 263-266, pp 1803-1808 doi:10.4028/www.scientific.net/amm.263-266.1803 2013 Trans Tech Publications, Switzerland The RTP Encapsulation
More informationCustomizing dynamic libraries of Qt based on the embedded Linux Li Yang 1,a, Wang Yunliang 2,b
Applied Mechanics and Materials Submitted: 2014-11-12 ISSN: 1662-7482, Vol. 740, pp 782-785 Accepted: 2014-12-02 doi:10.4028/www.scientific.net/amm.740.782 Online: 2015-03-09 2015 Trans Tech Publications,
More informationDepartment of Mechatronics Engineering, International Islamic University Malaysia Jalan Gombak, 53100, Kuala Lumpur, Malaysia
Advanced Materials Research Online: 2012-10-08 ISSN: 1662-8985, Vol. 576, pp 777-780 doi:10.4028/www.scientific.net/amr.576.777 2012 Trans Tech Publications, Switzerland Parallel Manipulator for Auto Tracking
More informationThe Design of Wireless Data Collector based on WIA-PA Ligang Li 1,2,a, Zhongfeng Wang 1,2,b, Jianlong Huang 1,2,c
Advanced Materials Research Online: 04-06-5 ISSN: 66-8985, Vols. 97-97, pp 79-794 doi:0.408/www.scientific.net/amr.97-97.79 04 Trans Tech Publications, Switzerland The Design of Wireless Data Collector
More information, ,China. Keywords: CAN BUS,Environmental Factors,Data Collection,Roll Call.
Advanced Materials Research Online: 2013-09-04 ISS: 1662-8985, Vols. 765-767, pp 1693-1696 doi:10.4028/www.scientific.net/amr.765-767.1693 2013 Trans Tech Publications, Switzerland The design of artificial
More informationOptimal Design of the Data Center Environmental Temperature Monitoring ZhiXiang Yuan 1,2, a, ShuangBo Lai 2,b, Ming Liu 1,c, HuiYi Zhang 1,2, d
Applied Mechanics and Materials Online: 2014-05-23 ISSN: 1662-7482, Vols. 556-562, pp 2810-2815 doi:10.4028/www.scientific.net/amm.556-562.2810 2014 Trans Tech Publications, Switzerland Optimal Design
More informationThe Design of the Sensor Node of IOT Based on SIM20 KUANG Xinghong 1, a,yao Zheyi 1, b, Huo haibo 1, c, Li junjun 1, d, Wu yanxiang 1, e
Advanced Materials Research Online: 2012-12-13 ISSN: 1662-8985, Vols. 605-607, pp 2375-2378 doi:10.4028/www.scientific.net/amr.605-607.2375 2013 Trans Tech Publications, Switzerland The Design of the Sensor
More informationA Compatible Public Service Platform for Multi-Electronic Certification Authority
Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,
More informationThe Analysis of the Loss Rate of Information Packet of Double Queue Single Server in Bi-directional Cable TV Network
Applied Mechanics and Materials Submitted: 2014-06-18 ISSN: 1662-7482, Vol. 665, pp 674-678 Accepted: 2014-07-31 doi:10.4028/www.scientific.net/amm.665.674 Online: 2014-10-01 2014 Trans Tech Publications,
More informationThe Computer-Assisted Design Method of Staggered-Tooth Milling Cutter for Manufacturing of the Complex Helical Surfaces Gheorghe Pleşu
Advanced Materials Research Online: 2014-10-01 ISSN: 1662-8985, Vol. 1036, pp 388-393 doi:10.4028/www.scientific.net/amr.1036.388 2014 Trans Tech Publications, Switzerland The Computer-Assisted Design
More informationResearch and Design of Laser Accurate Displacement Measurement System Xiaogang Wang 1, a, Yuewei Bai 1,b and Kai Liu 1,c
Advanced Materials Research Online: 2011-07-27 ISSN: 1662-8985, Vols. 301-303, pp 1289-1292 doi:10.4028/www.scientific.net/amr.301-303.1289 2011 Trans Tech Publications, Switzerland Research and Design
More informationResearch on Data Transmission and Information Integration Technology in the Distributed Wind Farm SCADA System
Applied Mechanics and Materials Online: 2014-03-24 ISSN: 1662-7482, Vols. 543-547, pp 2641-2646 doi:10.4028/www.scientific.net/amm.543-547.2641 2014 Trans Tech Publications, Switzerland Research on Data
More informationApplied Mechanics and Materials Vol
Applied Mechanics and Materials Online: 2014-02-27 ISSN: 1662-7482, Vol. 532, pp 280-284 doi:10.4028/www.scientific.net/amm.532.280 2014 Trans Tech Publications, Switzerland A Practical Real-time Motion
More informationWeb-Based Monitoring for Frequency Converters with USS Interface
Advanced Materials Research Online: 2014-06-25 ISSN: 1662-8985, Vols. 971-973, pp 1866-1869 doi:10.4028/www.scientific.net/amr.971-973.1866 2014 Trans Tech Publications, Switzerland Web-Based Monitoring
More informationEmbedded Smart Home System Based on ZigBee Song Chi
International Conference on Intelligent Systems Research and Mechatronics Engineering (ISRME 2015) Embedded Smart Home System Based on ZigBee Song Chi Liaoning Jidian Polytechnic North Gold and Jewelry
More informationShape Optimization Design of Gravity Buttress of Arch Dam Based on Asynchronous Particle Swarm Optimization Method. Lei Xu
Applied Mechanics and Materials Submitted: 2014-08-26 ISSN: 1662-7482, Vol. 662, pp 160-163 Accepted: 2014-08-31 doi:10.4028/www.scientific.net/amm.662.160 Online: 2014-10-01 2014 Trans Tech Publications,
More informationA Technique for Design Patterns Detection
A Technique for Design Patterns Detection Manjari Gupta Department of computer science Institute of Science Banaras Hindu University Varansi-221005, India manjari_gupta@rediffmail.com Abstract Several
More informationQuality Assessment of Power Dispatching Data Based on Improved Cloud Model
Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper
More informationEffect of Mesh Size of Finite Element Analysis in Modal Analysis for Periodic Symmetric Struts Support
Key Engineering Materials Online: 2011-01-20 ISSN: 1662-9795, Vols. 462-463, pp 1008-1012 doi:10.4028/www.scientific.net/kem.462-463.1008 2011 Trans Tech Publications, Switzerland Effect of Mesh Size of
More informationApplication of Three-dimensional Visualization Technology in Real Estate Management Jian Cui 1,a, Jiju Ma 2,b, Dongling Ma 1, c and Nana Yang 3,d
Applied Mechanics and Materials Online: 2014-07-04 ISSN: 1662-7482, Vols. 580-583, pp 2765-2768 doi:10.4028/www.scientific.net/amm.580-583.2765 2014 Trans Tech Publications, Switzerland Application of
More informationComputer Life (CPL) ISSN: Research on the Construction of Network and Information Security. Architecture in Campus
Computer Life (CPL) ISSN: 1819-4818 DELIVERING QUALITY SCIENCE TO THE WORLD Research on the Construction of Network and Information Security Architecture in Campus Zhaoyong Zhou 1, a, Xiaoli Zhang 1, Yuan
More informationChapter 2 Operating-System Structures
This chapter will discuss the following concepts: 2.1 Operating System Services 2.2 User Operating System Interface 2.3 System Calls 2.4 System Programs 2.5 Operating System Design and Implementation 2.6
More informationSelf-formation, Development and Reproduction of the Artificial System
Solid State Phenomena Vols. 97-98 (4) pp 77-84 (4) Trans Tech Publications, Switzerland Journal doi:.48/www.scientific.net/ssp.97-98.77 Citation (to be inserted by the publisher) Copyright by Trans Tech
More informationDesign and Implementation of CNC Operator Panel Control Functions Based on CPLD. Huaqun Zhan, Bin Xu
Advanced Materials Research Online: 2013-07-31 ISSN: 1662-8985, Vol. 722, pp 428-432 doi:10.4028/www.scientific.net/amr.722.428 2013 Trans Tech Publications, Switzerland Design and Implementation of CNC
More informationAn energy efficient communication routing Protocol based on LEACH for WSN
Advanced Materials Research Online: 2014-04-28 ISSN: 1662-8985, Vol. 905, pp 595-599 doi:10.4028/www.scientific.net/amr.905.595 2014 Trans Tech Publications, Switzerland An energy efficient communication
More informationResearch on Full-text Retrieval based on Lucene in Enterprise Content Management System Lixin Xu 1, a, XiaoLin Fu 2, b, Chunhua Zhang 1, c
Applied Mechanics and Materials Submitted: 2014-07-18 ISSN: 1662-7482, Vols. 644-650, pp 1950-1953 Accepted: 2014-07-21 doi:10.4028/www.scientific.net/amm.644-650.1950 Online: 2014-09-22 2014 Trans Tech
More informationKeywords: Interactive electronic technical manuals; GJB6600; XML markup language; Automatic control equipment
Applied Mechanics and Materials Submitted: 2014-06-11 ISSN: 1662-7482, Vols. 602-605, pp 1165-1168 Accepted: 2014-06-11 doi:10.4028/www.scientific.net/amm.602-605.1165 Online: 2014-08-11 2014 Trans Tech
More informationA virtual machine migration Algorithm Based on Network flow balance YangYu 1, a, ZhouHua 2,b, LiuJunHui 3,c and FengYun 4,d*
Advanced Materials Research Submitted: 2014-06-25 ISSN: 1662-8985, Vols. 1044-1045, pp 1028-1034 Accepted: 2014-08-11 doi:10.4028/www.scientific.net/amr.1044-1045.1028 Online: 2014-10-01 2014 Trans Tech
More informationPro/3 A Production System-type Expert System Shell
Pro/3 A Production System-type Expert System Shell Jens Hintze Holm Note that a few corrections including the PROLOG-representation of sentence rule 7 have been incorporated after the paper was presented
More informationImplementation of a General Role Permission Management Method. Based on Menu Items. QiMing Lou
Applied Mechanics and Materials Online: 2012-12-13 ISSN: 1662-7482, Vols. 241-244, pp 2822-2826 doi:10.4028/www.scientific.net/amm.241-244.2822 2013 Trans Tech Publications, Switzerland Implementation
More informationHousing Estates Information Management System Based on.net. Jianliang Min
3rd International Conference on Management, Education, Information and Control (MEICI 205) Housing Estates Information Management System Based on.et Jianliang Min College of Information Engineering, Jiangxi
More informationVAT/GST Analytics by Deloitte User Guide August 2017
VAT/GST Analytics by Deloitte User Guide August 2017 Contents What is VAT/GST Analytics? What is Qlik Sense? The Associative Model How to access Qlik Sense? Navigate through Qlik Sense A quick overview
More informationBeijing ,China. Keywords: Constitutive equation; Parameter Extraction; Iteration algorithm
pplied Mechanics and Materials Online: 2013-01-11 ISSN: 1662-7482, Vol. 281, pp 505-510 doi:10.4028/www.scientific.net/mm.281.505 2013 Trans Tech Publications, Switzerland new method based on interation
More informationDesign of a Wireless Laser Pointer Based on MCU
Applied Mechanics and Materials Online: 2013-08-30 ISSN: 1662-7482, Vols. 380-384, pp 3258-3261 doi:10.4028/www.scientific.net/m.380-384.3258 2013 Trans Tech Publications, Switzerland Design of a Wireless
More informationOff-Line Programming Design of Robots Based on DXF Files Zhaoxin Chen 1,a, Jiming Yi 1,b*, Jun Liu 1,c, Yanfeng Lin 2,3,d
Advanced Materials Research Submitted: 2014-06-12 ISSN: 1662-8985, Vol. 1039, pp 313-319 Accepted: 2014-07-14 doi:10.4028/www.scientific.net/amr.1039.313 Online: 2014-10-31 2014 Trans Tech Publications,
More informationCombining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating
Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,
More informationDRA AUDIO CODING STANDARD
Applied Mechanics and Materials Online: 2013-06-27 ISSN: 1662-7482, Vol. 330, pp 981-984 doi:10.4028/www.scientific.net/amm.330.981 2013 Trans Tech Publications, Switzerland DRA AUDIO CODING STANDARD Wenhua
More informationResearch and Application of Unstructured Data Acquisition and Retrieval Technology
2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Research and Application of Unstructured Data Acquisition and Retrieval Technology Zhenjiang Lei1,*, Lin Qiao2, Lina
More informationBee Inspired and Fuzzy Optimized AODV Routing Protocol
, pp.70-74 http://dx.doi.org/10.14257/astl.2018.149.15 Bee Inspired and Fuzzy Optimized AODV Routing Protocol B. Jahnavi, G. Virajita, M. Rajeshwari and N. Ch. S. N. Iyengar Department of Information Technology,
More informationTechnology White Paper of SQL Injection Attacks and Prevention
Technology White Paper of SQL Injection Attacks and Prevention Keywords: SQL injection, SQL statement, feature identification Abstract: SQL injection attacks are common attacks that exploit database vulnerabilities.
More informationDesign and Implementation of LED Display Screen Controller based on STM32 and FPGA Chi Zhang 1,a, Xiaoguang Wu 1,b and Chengjun Zhang 1,c
Applied Mechanics and Materials Online: 2012-12-27 ISSN: 1662-7482, Vols. 268-270, pp 1578-1582 doi:10.4028/www.scientific.net/amm.268-270.1578 2013 Trans Tech Publications, Switzerland Design and Implementation
More informationResearch on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,*
2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer
More informationPerceptive Experience Web Scan
Perceptive Experience Web Scan Technical Specifications Version: 2.2.x Written by: Product Knowledge, R&D Date: Wednesday, April 05, 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark
More informationResearch and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN
2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen
More informationA SYSTEM FOR PROGRAM EXECUTION IDENTIFICATION ON THE MICROSOFT WINDOWS PLATFORMS
A SYSTEM FOR PROGRAM EXECUTION IDENTIFICATION ON THE MICROSOFT WINDOWS PLATFORMS Yujiang Xiong Zhiqing Liu Hu Li School of Software Engineering Beijing University of Post and Telecommunications Beijing
More informationREST API Operations. 8.0 Release. 12/1/2015 Version 8.0.0
REST API Operations 8.0 Release 12/1/2015 Version 8.0.0 Table of Contents Business Object Operations... 3 Search Operations... 6 Security Operations... 8 Service Operations... 11 Business Object Operations
More informationSimulation Technology of Light Effect Based on Catia and Workbench Software HongXia Hu
Applied Mechanics and Materials Online: 2014-03-24 ISSN: 1662-7482, Vols. 543-547, pp 3218-3221 doi:10.4028/www.scientific.net/amm.543-547.3218 2014 Trans Tech Publications, Switzerland Simulation Technology
More informationSpeech Control System for Robot Based on Raspberry Pi
Advanced Materials Research Online: 2013-09-04 ISSN: 1662-8985, Vols. 791-793, pp 663-667 doi:10.4028/www.scientific.net/amr.791-793.663 2013 Trans Tech Publications, Switzerland Speech Control System
More informationEffective adaptation of hexahedral mesh using local refinement and error estimation
Key Engineering Materials Vols. 243-244 (2003) pp. 27-32 online at http://www.scientific.net (2003) Trans Tech Publications, Switzerland Online Citation available & since 2003/07/15 Copyright (to be inserted
More informationOpen Access The Three-dimensional Coding Based on the Cone for XML Under Weaving Multi-documents
Send Orders for Reprints to reprints@benthamscience.ae 676 The Open Automation and Control Systems Journal, 2014, 6, 676-683 Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving
More informationWorkbook Structure Analysis Coping with the Imperfect
Workbook Structure Analysis Coping with the Imperfect Bill Bekenn and Ray Hooper Fairway Associates Ltd. PO Box 846, Ipswich IP5 3TT UK info@fairwayassociates.co.uk ABSTRACT This Paper summarises the operation
More informationJournal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical esearch, 015, 7(3):175-179 esearch Article ISSN : 0975-7384 CODEN(USA) : JCPC5 Thread image processing technology research based on
More informationLine Net Global Vectorization: an Algorithm and Its Performance Evaluation
Line Net Global Vectorization: an Algorithm and Its Performance Evaluation Jiqiang Song 1, Feng Su 1, Jibing Chen 1, Chiewlan Tai 2, and Shijie Cai 1 1 Department of Computer Science of Nanjing University,
More informationN) manual. Eppendorf TrackIT. Operating manual 1.0
ckit ual N) manual Operating manual 1.0 Copyright 2016 Eppendorf AG, Germany. All rights reserved, including graphics and images. No part of this publication may be reproduced without the prior permission
More informationStudy on data encryption technology in network information security. Jianliang Meng, Tao Wu a
nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric
More informationAn Adaptive Threshold LBP Algorithm for Face Recognition
An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationN) manual. Eppendorf TrackIT. Operating manual 1.0
ckit ual N) manual Operating manual 1.0 Copyright 2013 Eppendorf AG, Hamburg. No part of this publication may be reproduced without the prior permission of the copyright owner. Trademarks Eppendorf and
More informationAn Integrated Face Recognition Algorithm Based on Wavelet Subspace
, pp.20-25 http://dx.doi.org/0.4257/astl.204.48.20 An Integrated Face Recognition Algorithm Based on Wavelet Subspace Wenhui Li, Ning Ma, Zhiyan Wang College of computer science and technology, Jilin University,
More informationDesign on Students Score Management System based on Asp.net Zhe Li1,a, Jiahui Wang2,b, Shuang Wei3,c
5th International Conference on Social Science, Education and Humanities Research (SSEHR 2016) Design on Students Score Management System based on Asp.net Zhe Li1,a, Jiahui Wang2,b, Shuang Wei3,c 1 College
More informationECMA-119. Volume and File Structure of CDROM for Information Interchange. 3 rd Edition / December Reference number ECMA-123:2009
ECMA-119 3 rd Edition / December 2017 Volume and File Structure of CDROM for Information Interchange Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International
More information