{"title":"Analytical Solution of the Residual Stress when the Inflexion of the Retaining Ring is on the Top","authors":"Qiumei Liu, Jincai Chang, Junling Zheng, Shiqiu Zheng","doi":"10.1109/APWCS.2010.74","DOIUrl":"https://doi.org/10.1109/APWCS.2010.74","url":null,"abstract":"This paper adopts the theory of the axis symmetry column thin shell to analyses the instance that the retaining ring is on the top, and constructs a displacement function, then works out the analytical solution of the residual stress under this instance. This conclusion is very valuable in theory engineering.","PeriodicalId":354322,"journal":{"name":"2010 Asia-Pacific Conference on Wearable Computing Systems","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121989133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Query Transformation in Ontology-Based Relational Data Integration","authors":"Jinpeng Wang, Yafei Zhang, Z. Miao, J. Lu","doi":"10.1109/APWCS.2010.83","DOIUrl":"https://doi.org/10.1109/APWCS.2010.83","url":null,"abstract":"The emergence of the Semantic Web brings new paradigm shift of computing in data integration research where data is heterogeneous and distributed. Ontology-based heterogeneous relational data integration has recently attracted many diverse contributions, since most of the information is still stored in relational databases. This paper focuses on the query transformation problem in such an integration scenario. To bridge the semantic gap between the express power of SPARQL and SQL, we describe the semantic of SPARQL graph patterns using relational algebra, which is intended to bring formality and generality to manipulability of SPARQL query. The semantic equivalence of this SPARQL relational algebra is further discussed and a SPARQL to SQL query transforming algorithm is presented.","PeriodicalId":354322,"journal":{"name":"2010 Asia-Pacific Conference on Wearable Computing Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122096443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Sensitive Computation in Trustworthy Computing","authors":"Xiafei Yuan, Feng-Ming Liu, Xi-Yu Liu","doi":"10.1109/APWCS.2010.52","DOIUrl":"https://doi.org/10.1109/APWCS.2010.52","url":null,"abstract":"Trust is a very significant commodity in distributed networks the same as in social network. The dynamic and ephemeral nature of distributed networks environments is especially important to compute the peer trustworthy. So, the decision whether or not to trust a peer can depend on many contextual factors. We outline a context-sensitive computation approach for considering the impact of context information on the trustworthy computing. We show that the contexts of peer and mediating networks can have influence on the degree of trust the trustor assigns to the trustee. We define fitness law to capture context-sensitive trust, as well as propose trustworthy computing functions. We illustrate the usage with fitness law that determines trust of context information.","PeriodicalId":354322,"journal":{"name":"2010 Asia-Pacific Conference on Wearable Computing Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Routing Topology Identification Based on Multiple Sources End-to-End Measurements","authors":"Guangli Tian, Wandong Cai","doi":"10.1109/APWCS.2010.88","DOIUrl":"https://doi.org/10.1109/APWCS.2010.88","url":null,"abstract":"This paper focuses on the multiple source, multiple destination network tomography problem. The main contributions are as follows. First, the performance stable delay difference measured by the back-to-back packet pair with different size is used firstly as path metrics to identify the topology. Second, this paper proposes a novel probing meathead to infer the hop count of the shared path for each 1-by-2 component and each 2-by-1 component. Third, with the novel methodology, we firstly resolve the key problem of routing topology identification by multiple sources network tomography. The accuracy and efficiency of methodology is validated by the simulation results.","PeriodicalId":354322,"journal":{"name":"2010 Asia-Pacific Conference on Wearable Computing Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Representation of Virtual Cultural Heritage Based on Key Events","authors":"Zheng Zhong, Ling Zhang, Chuanming Sun","doi":"10.1109/APWCS.2010.100","DOIUrl":"https://doi.org/10.1109/APWCS.2010.100","url":null,"abstract":"In order to enhance the realism and vivid nature of stories in virtual cultural heritage, an Agent model is used to represent each character in virtual environment. A simple transition structure is designed to meet the needs of narrative representation in virtual environment based on key events description. It can achieve automatic and interactive events generation and their transition. And the story generated modes is adopted to construct story scripts. Finally, this method is applied to reorganize many character’s models and their behaviors of the Tujia wedding show in Virtual Badong. The result shows that it can enhance visitors’ immersion in virtual cultural heritage, make them understand cultural heritage, and increase the breadth and depth of cultural dissemination effectively.","PeriodicalId":354322,"journal":{"name":"2010 Asia-Pacific Conference on Wearable Computing Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130199057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Analysis of Several Common Easily Confused Basic Concepts in Unary Function Calculus","authors":"Zhao Chen Xia, Yu Ying, Xiao Cui Yu, Chen Wei Li","doi":"10.1109/APWCS.2010.80","DOIUrl":"https://doi.org/10.1109/APWCS.2010.80","url":null,"abstract":"In this paper, some counter-examples are given to analyze deeply several common easily confused basic concepts and theories in unary function calculus. Through the examples, it can seen that we must truly understand the basic concepts of advanced mathematics. In order to learn higher mathematics better; it needs us to have a deep understanding about the concept in unary function calculus. In this paper, a number of counter-examples are given to intensify these basic concepts and theories, and the authors gives some explanations for the concept of several common mistakes.","PeriodicalId":354322,"journal":{"name":"2010 Asia-Pacific Conference on Wearable Computing Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method of Risk Assessment Based on Classified Security Protection and Fuzzy Neural Network","authors":"Chaoju Hu, Chunmei Lv","doi":"10.1109/APWCS.2010.103","DOIUrl":"https://doi.org/10.1109/APWCS.2010.103","url":null,"abstract":"Risk assessment of information security is an important assessment method in the process of detecting potential threats and vulnerabilities. Select methods of risk assessment based on the requirements and the security level of organizational or enterprise information system. The general assessment methods simply calculate the risk value, In this paper, we propose a risk assessment model based on classified security protection. We also build a modle combined fuzzy theory and BP neural network, so that the learn capability and the expression capability can be improved. Firstly, we form a risk elements set according to the classified criteria for security protection. Secondly, we quantitate the risk factors with fuzzy theory. Thirdly, we take the results the output of multi-level fuzzy system as the input of BP neural network. According to experiment testing, the risk evaluation model can estimate risk level of the information security accurately and real-timely.","PeriodicalId":354322,"journal":{"name":"2010 Asia-Pacific Conference on Wearable Computing Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124358216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Solution of LED Large Screen Display Based on Wireless Communication","authors":"Deng Chunjian, Liu Wei, Zou Kun, Yang Liang","doi":"10.1109/APWCS.2010.24","DOIUrl":"https://doi.org/10.1109/APWCS.2010.24","url":null,"abstract":"Display information of some LED large screen displays such as mobile offline LED display, bus LED display, can not be transmitted easily or directly from control PC for the limitation, inconvenient installation of communication wire. The paper gives methods for the combination of LED large screen display control technology and wireless data transmission technology, laying emphasis on the realization method of wireless display data transmission, presenting dual RAM buffer structure and ping-pong control circuit to realize the storage of display data, presenting display data scanning interface to enhance the driver capability of scanning signals. The solution makes display information configuration flexible and reduce the inconvenience due to the reasons such as inconvenient installation of communication wire.","PeriodicalId":354322,"journal":{"name":"2010 Asia-Pacific Conference on Wearable Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121871624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}