1. Trang chủ
  2. » Thể loại khác

Information technology and computer application engineering

835 380 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 835
Dung lượng 40,66 MB

Nội dung

Editors Liu Sung Yao presented at the International Conference on Information Technology and Computer Application Engineering, held 27-28 August 2013, in Hong Kong, China Specific topics under consideration include Control, Robotics, and Automation, Information Technology, Intelligent Computing  and Telecommunication, Computer Science and Engineering, Computer Education and Application and other related topics This book provides readers a state-of-the-art survey of recent innovations and research worldwide in Information Technology and Computer Application Engineering, in so-doing furthering the development and growth of these research fields, strengthening international academic cooperation and communication, and promoting the fruitful exchange of research ideas This volume will be of interest to professionals and academics alike, serving as a broad overview of the latest advances in the dynamic field of Information Technology and Computer Application Engineering an informa business Information Technology and Computer Application Engineering This proceedings volume brings together some 189 peer-reviewed papers Information Technology and Computer Application Engineering Editors: Hsiang-Chuan Liu Wen-Pei Sung Wenli-Yao INFORMATION TECHNOLOGY AND COMPUTER APPLICATION ENGINEERING This page intentionally left blank PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER APPLICATION ENGINEERING (ITCAE 2013), HONG KONG, P.R CHINA, AUGUST 27–28, 2013 Information Technology and Computer Application Engineering Editors Hsiang-Chuan Liu Department of Biomedical Informatics, Asia University, Taichung, Taiwan Wen-Pei Sung National Chin-Yi University of Technology, Taiping City, Taiwan Wenli-Yao Control Engineering and Information Science Research Association (CEIS), Chongqing University, Chongqing, P.R China Selected, peer-reviewed papers of the 2013 International Conference on Information Technology and Computer Application Engineering CRC Press/Balkema is an imprint of the Taylor & Francis Group, an informa business © 2014 Taylor & Francis Group, London, UK Typeset by MPS Limited, Chennai, India Printed and bound in Great Britain by CPI Group (UK) Ltd, Croydon, CR0 4YY All rights reserved No part of this publication or the information contained herein may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, by photocopying, recording or otherwise, without written prior permission from the publishers Although all care is taken to ensure integrity and the quality of this publication and the information herein, no responsibility is assumed by the publishers nor the author for any damage to the property or persons as a result of operation or use of this publication and/or the information contained herein Published by: CRC Press/Balkema P.O Box 11320, 2301 EH, Leiden, The Netherlands e-mail: Pub.NL@taylorandfrancis.com www.crcpress.com – www.taylorandfrancis.com ISBN: 978-1-138-00079-7 (Hardback) ISBN: 978-1-315-81328-8 (eBook PDF) Information Technology and Computer Application Engineering – Liu, Sung & Yao (Eds) © 2014 Taylor & Francis Group, London, ISBN 978-1-138-00079-7 Table of contents Committees Preface XV XVII A new hybrid architecture framework for system of systems engineering in the net centric environment P.L Rui & R Wang Applications of semi-supervised subspace possibilistic fuzzy c-means clustering algorithm in IoT Y.F Zhang & W Zhang Low speed operation analysis of PMSM DTC Z.K Zhang & L He 11 Finite-time receding horizon control for Markovian jump linear systems with partly unknown transition probabilities J.W Wen & J Liu 15 Equivalent interpolation algorithm for NIRS data Y Jiang, X Li & X Jin 21 Improvement and implementation of the MD5 algorithm based on user security G.Z Liu & H.X Qi 25 Worm detection research based on biological immune principle and FCM algorithm G.Z Liu, H.M Kang & H.X Qi 29 Fusion of multifocus based on NSCT and NMF Z.J Luo & S Ding 33 System design of detection device for special cigarette filter T.J Li, D.Q Yang, Q Li & G.X Liao 37 The ant colony optimal algorithm based on neighborhood search to solve the traveling salesman problem H.L Pang, Y.H Li & X.M Song 41 Design and implementation of FORTRAN to C Translator based on Perl scripts G.M Peng, Y.J Shen, Z.M Yi & G.D Zhang 45 Application of computer simulation technique in field waterflood system B.X Fan, G Wu, S Zhang, G.J Zhang, H Sun, X.D Han & W.Y Xie 49 The thinking of the introduction of computer technology course L Deng, X.F Jiang & J.R Liu 53 Discussion on the method of Matlab Web application development S Gao 57 Adaptive terminal sliding mode control for AC servo system based on neural network Y.F Wu, D.W Ma & G.G Le 61 Research and application of information security evaluation in website C.J Si 65 Knowledge management approach for serious game development based on user experience Q.Q Wu, X.X Zhang, Y.Y She, Y.Y Bi & B.R Yang 69 The non-fragile controller design based on Lyapunov theory C.W Yang, J Chen & X.F Zhang 75 V Exploration and development of text knowledge extraction L.P Zhu, H.Q Li, S.Y Wang & C Li 79 Design of interactive spoken English teaching platform in MCALL model Q Zhao & D Chen 85 Suboptimal controller design for aircraft based on genetic algorithm Y.C Li 89 On the dilemma and way out for the cultivation of the cultural consciousness in contemporary China Y.F Deng & W.J Hu 93 The analysis of the development of China news media’s soft power X.C Deng & X.Y Yao 97 Modeling for joint operation information cognitive chain based on information life cycle M Yang, M.L Wang & M.Y Fang 101 Design of remote education system based on agent L.F Wang 105 Crank train multi-body dynamic and finite element analyses for one-cylinder engine Y Wang & J Wang 109 An invariance principle of SLLN for G-quadratic variational process under capacities X.Y Chen 113 The superiority of adaptive fuzzy PID control algorithm in sintering furnace temperature control Y.J Ji & H.R Jia 119 Design and implementation of the control system to ovenware furnace based on MOCVD equipment C Li, C.M Li & Y.N Zhang 123 Application of intellectual control treatment for grinding process based on expert knowledge base C Li, Y.N Zhang & H.Z Dai 127 Algorithm and implementation of digital PID based on MCGS-DDC Y.P Lu & T.L Song 131 Modeling and control of solar powered HALE UAV W.N Zhao, P.F Zhou & D.P Duan 135 The greatest common factor about bivariate polynomials Y.L Xu & J Xiao 139 Digital video communication platform based on cloud computing technology H Liu 143 The computational model of the airfield capability based on system dynamics Y.X Li, X.X Liu, Y Guo, H Hao & Y.P He 147 Business strategy for Shaw Communications Inc Y Li 151 Research on training modes of vocational values for maritime students based on online web technology Z.X Cai & B.H Zhu 155 An adaptive context management framework for supporting context-aware applications with QoC guarantee N Xu, W.S Zhang, H.D Yang, X.G Zhang & X Xing 159 Performance analysis of missile-borne SAR moving target parameter estimation by using Wigner-Ville Hough transform Y Liu, D.R Chen & L Chen 165 A matching model of cloud service between information resources supply and demand for networked manufacturing X.Z Feng & B Wang 169 VI A review of the agile and geographically distributed software development M Yin & J Ma 173 Developing an application model based on business-oriented L.W Li, Z Liu, H.L Wei, C Yang, J.H Sun & J Sheng 177 A review of abrasive flow machining research L.F Yang, X.R Zhang & W.N Liu 181 Virtual design in feeding device of precoated laminating machine X.H Wang, Y.S Qi & Y.T Li 185 Research on the visual statement method for the passenger train plan based on GIS and system development H.F Zhu, D.W Li & X.J Li 189 Research on the transmission line construction risk control and management information system J Luo, Y.H Wang & X.W Du 193 Recursive algorithm for circle anti-aliasing Y.L Jia, J Gao & B.Y Li 197 Study of multi-resolution modeling framework in joint operations simulation C.Y Kong & L.J Xing 201 A novel approach of providing feedbacks at where a mistake occurs during solving math word problems Y.Z Qu & K Morton 205 Development of a fast vibratory filtering algorithm via neural synaptic properties of facilitation and depression and its application on electrocardiogram detecting W Gao, F.S Zha, B.Y Song & M.T Li 211 Research and optimization on methods for reciprocal approximation H Xia, G.B Wang & B.C Xiao 215 Software trustworthiness modeling based on Interactive Markov Chains H.C Peng & F He 219 Research on urban mass transit network passenger flow simulation on the basis of multi-agent H.F Yu, Y Qin, Z.Y Wang, B Wang & M.H Zhan 225 Design of fault diagnosis system for coal-bed methane gathering process and research on the fault diagnosis for compressors J Su, J.H Yang, W Lu, Y Wang & Z.F Lv 231 TVBRT: A time-varying multivariate data visualization method based on radial tree G.X Qian, N.W Sun, C Zhang, H.F Liu, W.M Zhang & W.D Xiao 237 Effects of branch length and terminal impedance in multi-branch power line channel Y.H Zheng, G.Y Luo, B.Z Zhang, Q Yu & Y.L He 245 Development of android software update system based on web service R Wang, X.D You & Q.N Chang 249 Spatial-temporal patterns analysis of property crime in urban district based on Moran’s I and GIS W Ma, J.P Ji, P Chen & T.T Zhao 253 Adding attributes to access delegation Y Li, G Liu & H.W Wang 259 Unexpected passenger flow propagation in urban rail transit network based on SIR model M Du, Y Qin, Z.Y Wang, X.X Liu, B Wang, P Liang & M.H Zhan 263 Research on optimization of resource scheduling based on hybrid chaos particle swarm optimization T Wang, F.L Zhang & G.F Li 267 New optimal assignment algorithm based on marginal association probability B Sun, Q Gao & X.P Zhou 273 VII Design and implementation of data transformation scheme between STEP and XML in CIMS environment M Zhou, J.H Cao & G.Z Jiang An integrated framework for software product line in the collaborative environment Z.Y Duanmu & H Xu Exploring Energy-Balancing Adaptive Clustering Algorithm (EBACA) in Wireless Sensor Networks (WSN) Z.Y Li 277 281 285 Face recognition using a hybrid algorithm based on improved PCA X Tian & M Tian 289 Exploration on practice teaching of information and computing science refering to the idea of CDIO G.H Wang, Y.Q Zhao & X.H Zhang 293 Mobile polymorphic application based on cloud computing architecture V.L Wu & C.H Shao 297 Path tracking based on H∞ suboptimal filter and fuzzy control Y.J Wei, X.H Yang, W.J Huang & M.H Lin 303 Study hierarchical query technology based on ORACLE H Ding, C Zhao, Y Zhang & M Wang 307 Design and implementation of browser/server-based intelligent decision support system for farm machinery selection R.X Zhu & J.Y Ju 311 Analysis on earth fault and propagation characteristic of electric fire X.M Wang, C.Z Zhao & W Gao 315 Identification of motor imagery parameters from EEG using SVM B.L Xu, X.X Yin, Y.F Fu, G Shi, H.Y Li & Z.D Wang 319 Pervasive real-time multi-parametric and multi-patient tele-monitoring system G Sannino & G.D Pietro 323 Phrase table filtration based on virtual context in phrase-based statistical machine translation Y Yin, Y.J Zhang & J.A Xu 327 The method of extracting forest leaf area index based on Lidar data Z.W Huang, S.G Wu & J Huang 331 The research on fire spreading based on multi-agent system Z.W Huang, X Chi & L Qiu 335 High-performance TV video noise reduction using adaptive filter S.C Hsia & C.L Tsai 339 Research on forecasting and pre-warning methods of social security incidents T.T Zhao, Y Zhao, Y.L Han & W Ma 343 Mixed duality of multi-objective programming H.M Miao & X.Y Li 349 An efficient human face tracking method based on Camshift algorithm T Li, T Zhang, W.D Chen & X.H Zhang 353 The analysis of anti-noise performance of BOC modulation system Y.F Jia & X.D Song 357 Integration platform of services and resources for water resources and environment management S.Y Li & J.H Tao 361 The research of project teaching method in software development technology course J.R Liu & S Jiang 365 Processing path study of laser cutting for sheet H.Q Liang & H.F Kong 369 VIII Research on target acquisition requirements to a guidance radar of anti-missile weapon system Q Sun, J.F Tao & J.L Ji 373 Research on target tracking technologies to a guidance radar of anti-missile weapon system Q Sun, J.L Ji & Y Sun 377 Matlab-based small scale helicopter simulator I Salloum, A Ayoubi & M.R Khaldi 381 Design of power harmonic data acquisition system based on network N Ma, J Wang, X.J Huang & L.L Xia 385 A method of on-road vehicle detection based on comprehensive feature cascade of classifier X.L Li, D.G Xiao, C Xin & H Zhu 389 A loop shaped fractal antenna W.Q Luo & Y Feng 395 Estimation of parameter in a new discrete distribution analogous to Burr distribution G Nanjundan & T Raveendra Naika 399 Application of artificial neural network on objective wearing pressure comfort evaluation model X.L Meng, W.L Wang, K Liu & W Zhu 403 Heap adjustment algorithms based on complete binary tree structure and based on array Y Hu 407 A dynamic trusted measuring model based on optimum cycle Y Tian, Q Pan & F Wang 413 Hierarchical ALS algorithm with constraint used in UBSS H.Y Leng, M.J Zhang & W.Q Guo 417 The design and implementation of University Educational Administration System with high availability D.W Guo, Y.N Wu, J.J Jin & Z.Y Zou 421 Fuzzy congruence and its application in fuzzy clustering M Lagzian & A.V Kamyad 425 Modification proposal security analysis of RFID system based on 2nd generation security tag M.Z Lu 427 Analyze the interval of street trees on campus based on the concept of low carbon— As a case of Guangxi University H Li, Y Luo, X Yang, X.S Lu & L.D Li 431 Digital filter window function method design based on MATLAB FDA Tool X Zhao & S Ren 435 Window function method design and realization of high-pass digital filter based on MATLAB SPTool A.D Qu & J Min 439 Mathematical standard of MUSIC approach for multiple emitter location B.F Sun 443 Research on teaching evaluation system modeling based on UML X.F Zhao 447 GPU-based multi-view stereo reconstruction B.L Wang, Y.F Jiang, Z Peng & S.C Yu 451 Found the uncertainty knowledge whitch exists in the distribution of plant based on λ operator stack structure S.Y Song Band-pass digital filter window function method design and realization based on MATLAB SPTool X Zhao & S Ren The new lightweight encryption mechanism for large media signal processing system in global content delivery network J Heo, C Park, K Kim & K Ok IX 455 459 463 the said sub-domain and sending the connectivity notice to the corresponding central node After the fault restarts, the leaf node maintains the original state if the time for the automatic judgment of the fault period is a short-time restart, and it turns into the idle node if the restart takes long more suitable for the actual project concerning the network invulnerability can be found, and that some references can be provided for the research on the NMS invulnerability in complex network environment REFERENCES CONCLUSION Based on the logical network management center, this paper puts forward an independent self-organizing domain strategy, which can not only further abstract mathematical models to simulate and verify the feasibility, but also can be used to guide the establishment of the self-organizing environment with the multi-level network management system distribution, which thus enhances the NMS survivability The next step is to design a distributed selforganizing agreement prototype and adopt the network emulator OPNET for further simulation tests with the hope that through these efforts the protocol standards Koroma J, Li W A Generalized Model for Network survivab1ity[c] The 2003 Conference on Diversity in Computing (TAPIA’O3), Atlanta, Georgia, USA 2003 Ellison R, Linger R Survivable Network System Analysis: a Case Study [J] Software, 1999, 16(4): 70–77 Jha S, Wing M Survivability Analysis of Networked Systems[c] ICSE 2001, Toronto, 2001 Ye Yousun Analysis of military communication network and system integration [M] National Defence Indystry Press, 2005: 46–49 Krings A W, Azadmanesh A A Graph Based Model for Survivability Applications[J] European Journa1 of Operational Research, 2005, 164(3): 680–689 Traldi L Commentary on: Reliability polynomials and link importance in Networks[J] IEEE Trans Reliability, 2000, 49(3): 322 802 Information Technology and Computer Application Engineering – Liu, Sung & Yao (Eds) © 2014 Taylor & Francis Group, London, ISBN 978-1-138-00079-7 Research on defensive posture for distributed simulation M.L Liu, J Zhang & Bo Yun Liu Scientific Institution, Naval University of Engineering Wuhan, China ABSTRACT: Aim at the vulnerability of simulation networks, a concept of dynamic defensive posture in distribute simulation networks was examined A concept of defensive posture has been proposed that it is provided by knowledge of whether and how simulation networks resources are vulnerable to attack The constituent elements of defensive posture were discussed Finally, a variety of research problems for which the solutions would contribute significantly to our ability to identify a network’s defensive posture was proposed Keywords: Defence; network; Distributed Simulation INTRODUCTION The distributed simulation networks are complex and dynamic environments With the rapidly development of the relationship and interdependence of those applications, and other factors make network difficult to understand, even if they have been carefully designed This is particularly true with respect to the security of the network, for it is often not clear whether security is strengthened or weakened by changes in the network configuration and the security often be neglected when operations come to be the most attention point This paper introduces the concept of network defensive posture of distributed simulation Roughly speaking, to know the defensive posture of the network is to know which elements of the network are exposed to potential attack by a malicious agent, and the extent to which such an attack would affect the network’s operation A defensive posture analysis system is an application that can determine the network’s defensive posture 1.1 Background A simulation administrator needs to understand network security, and how network management decisions affect that security at the phase of system design The complexity of large networks is a typical model of large-scale of simulation, however, in which user activities, security policies, local configurations, and software vulnerabilities interact, makes it difficult for the administrator to know what is happening on the network, much less understand the significance of the activity Generally, the operation security problem is often result of the corresponding low-level detail problems 1.2 Security view Security view is a concept that has found application in many different areas In the context of network security management, the security view consists in a valid interpretation of the meaning of network activity, an understanding of its likely consequences for the provision of network services and enforcement of security policies, and the capacity to make informed network management decisions This requires a tightly coupled knowledge of network management, network security information and simulation security operations, including knowledge of the network infrastructure and vulnerabilities The primary aim is to be aware not just of the low-level details of network events, but of their high-level impact on the operations and services which the network supports To have security view is to have a clear and correct picture of the network’s state as it evolves in time and an understanding of how that state affects network services 1.3 Critical resources An essential element of security view is knowledge of the critical resources on the simulation network Critical resources are defined relative to the missions or operations which the simulation is supporting which include database, RTI, computer network etc They are the resources without which one or more important services or capabilities would be compromised The assessment of critical resources would likely realize as assigning a value to each of the network elements, where the value reflects its importance in supporting the simulation mission 1.4 Vulnerability of simulation network The set of network resources vulnerable to an attacker starting from a particular point in the network defines the partial network exposure relative to that point The step-by-step description of how the attacker can carry out the attack is called an attack path The total exposure is specified by giving all vulnerable targets and 803 the possible attack paths to those targets It is important to understand that attacks can consist of more than one stage: the attacker may move through multiple hosts and exploit multiple vulnerabilities or configuration problems before finally reaching the target Also, such multi-stage attacks may in general originate from any point inside or outside the network 1.5 Defensive posture The defensive posture of a network is the set of exposed, critical resources on the network It combines knowledge of the critical resources with the exposed resources From an operational point of view, the defensive posture is a current, prioritized catalogue of existing security weaknesses requiring attention It is important to understand the relationship of defensive posture to risk, for they are not identical Defensive posture states which of the organization’s most critical assets are vulnerable to attack, but it does not say how probable an attack would be Risk, on the other hand, folds into defensive posture an estimate of the probability of a particular attack being launched against the network Risk is often used to prioritize vulnerability instances An attack could be possible against a critical asset, but if the probability of the attack is low the actual risk to the network is low, and the network operator may decide to focus his efforts on other problems A problem with using risk to prioritize is that often the probability of an attack is difficult to specify precisely There are cases where the probability of a particular attack is known to be high, such as, the use of risk introduces an intrinsic uncertainty to the prioritized list of threats against the network, possibly distorting that list if the probabilities are estimated wrongly By contrast, defensive posture is assessed by combining knowledge of which assets are most important with an analysis of whether and how those assets could be attacked 2.1 EXPLOREA DEFENSIVE POSTURE Define the most critical resources The simulation is explored to provide services and information in support of some set of goals or missions For a particular set of goals, it is reasonable to expect that certain assets whether services, information, or devices will be critical to success The criticality of each asset is always defined relative to the goals and priorities of the mission For instance, a equipment simulation has the different critical resources of a battle simulation A significant challenge for a defensive posture analysis system is to accept a high-level, prioritized description of the mission’s requirements, and map that description onto lower-level network services, information, and devices 2.2 Find out the expoure resources The exposure is the set of assets that are vulnerable to attack, and is always defined relative to a particular starting point After all, an attacker who starts with administrator privileges on a central network server canlikelyattackmoretargetsthananunprivilegedattackerontheInternet We should be able to specify which assets are accessible to an attacker who begins at any particular location, whether inside or outside the network A full specification of location may also include the attacker’s privileges, since privileges can affect the attacker’s reach The exposure includes not only those assets directly accessible to the attacker, but also those which can be reached by multiple steps or stages There three issues should be considerate: * From which network locations is asset exposed to attack? * How could asset be compromised by an attacker at a particular location? * Which safeguards are protecting asset? 2.3 Pitch the most critical and expoure resources Defensive posture identifies the exposed, critical resources on the network When the two issues are brought together, the most critical assets vulnerable to attack must be confirmed Given a list of network mission priorities, the steps will be as follows: (a) Determining the most critical assets (b) Whether and how they are vulnerable to attack (c) Produce an ordered list of exposed, critical assets The ranking of critical assets may be ordered simply based on the criticality of the vulnerable asset, or according to some more elaborate scheme that also considers other factors, such as attack complexity, directness, probability of success, and so forth The precise mixture of criteria by which a list of attacks should be ranked has yet to be determined, but certainly the criticality of the targeted asset will be the central, if not sole, consideration Not only the problem discussed upon should be clarified, but also the consequences of a given attack must be research If a particular asset is vulnerable to attack, the impact of a successful attack would be answered The impact is one important criterion relevant to assessing the severity of the attack An attack that completely compromises an essential service, or even affects other services running from the same hardware, for instance, is more severe than one which partially compromises the service An outstanding problem, however, is how to precisely specify both the type and extent of impact One way to characterize the type is in terms of confidentiality, integrity, and availability If a asset is a sensitive file, the attacker would be able to read it , change it, or even delete it, It is often less clear, however, what compromising confidentiality or integrity means for a service or a device As for the extent of impact, it is again not clear how this can be described precisely enough to be meaningful, but generically enough to be implemented in an automated system This is a matter requiring further clarification 804 provide, and the interdependencies among these services; it includes knowing the access controls present on files and applications, and the access permissions granted to users; it involves knowing the configuration of network firewalls and routers, so as to determine the network connectivity and allowed traffic flow This information must be collected and used to construct a network model on which analyses, such as searches for attack paths, can be performed 3.3 Figure Flow diagram of the defensive postrue ELEMENTS OF DEFENSIVE POSTURE As the figure1 shown, the output of this diagram is defensive posture It is easy to see that to confirm a defensive posture, the input knowledge of the operational requirements, IT infrastructure (ITI), network safeguards, known software vulnerabilities are needed 3.1 Operations requirements The operations requirements are high-level, prioritized descriptions of the services and information the network must support or provide They are specified by a force commander, and are derived from the mission of the organization or group using the network They may be dynamic For instance, the commander may require VoIP services and encrypted email services with high priority and access to an image server with medium priority, for the duration of a mission, and also require video conferencing services with high priority on the morning of one particular day In practice, the operations requirements would probably be defined by providing a template of available services to the force commander, and having him indicate which are needed, when they are needed, and with what priority He, or the network commander who decides which network resources can best meet the requirements, should also indicate which services require redundancy in case of failure The commander should been couraged to be soberly realistic about prioritization of network services to avoid having everything marked as high priority 3.2 IT infrastructure (ITI) The IT infrastructure (ITI) is a crucial element needed to determine the defensive posture To accurately identify the network’s exposed resources; a thorough model of the network’s structure and state is needed Knowing the ITI involves knowing how many hosts are on the network, their connectivity, what operating systems and software each host has installed, and how that software is configured; it involves knowing what servers are present on the network, the services they Software vulnerabilities The software include two aspects: one is the platform of the host in a simulation networks, the other is the operation system of a simulation Some attacks against a network proceed by exploiting one or more vulnerabilities present in software on the network These vulnerabilities are typically the result of defects in the design of the software, and, if exploited by a sufficiently capable attacker, may permit the attacker to obtain unauthorized access to hosts, adversely affect network performance, or otherwise compromise the confidentiality, integrity, and availability of network resources Ideally, no such vulnerabilities would be present on the network, but realistically this ideal is unattainable New vulnerabilities in deployed software are always being discovered, and there will often be a gap between the announcement of vulnerability and the availability of a patch Even after a patch become available, administrators are sometimes prevented from applying it immediately If the organization’s policy permits users to install their own software, it would expect that users will frequently fail to keep their applications patched 4.1 CONCLUSION Network modeling The model of the network is the foundation for the analysis of exposed and critical resources and is, of course, a critical part of a defensive posture model Several important questions must be addressed in the design of the model: What elements of the network must be modeled, and what elements can be ignored? At what level of granularity should the network be modeled? The answers to these and related questions will depend on the range of attacks that the model attempts to identify A minimal model would likely include privilege escalation attacks; a more comprehensive model might also include denial of service attacks, eavesdropping and sniffing attacks on data in transit, or data tampering; more complex still would be models of social engineering attacks, or attacks on the physical network infrastructure A good model would also permit the network administrator to evaluate the effects of changes to the network configuration before the changes are actually made; alterations could be made in the model, and the security consequences evaluated prior to deployment 805 4.2 Asset valuation schema Essential to a quantitative assessment of asset criticality, and potentially also to assessment of a successful attack’s impact on the network, is some means of assigning value to the network assets The value in question, whether expressed numerically or categorically (for example, on a High-Medium-Low scale), should indicate the level of support the asset provides to the meeting of the network’s current priorities It may also indicate the nature of the support provided, or, equivalently, the negative impact on the network that would result from the asset’s loss or compromise This impact measure would likely be specified in terms of the conventional metrics of confidentiality, integrity, and availability 806 Information Technology and Computer Application Engineering – Liu, Sung & Yao (Eds) © 2014 Taylor & Francis Group, London, ISBN 978-1-138-00079-7 A consideration on infrastructure of distributed simulation M.L Liu, J Zhang & Bo Yun Liu Scientific Institution, Naval University of Engineering, Wuhan, China ABSTRACT: In a distributed simulation ,there are a lot of simulations which are produced by pure-visual, semipracticality etc The infrastructure of the system would be considerate for the running, reuse and integration The High Level Architecture (HLA) is a distributed simulation architecture designed to facilitate interoperability and promote software reuse within the Modeling & Simulation (M&S) community In HLA, Federates communicate via a distributed middleware called the Run-Time Infrastructure (RTI) The HLA specifies the interface between each federate and the RTI but does not specify how the RTI is implemented This paper discusses the technical, political and economic considerations one must weigh when selecting a HLA RTI implementation, which play an important role in domain of management of distributed simulation Keywords: HLA; infrastructrue; Distributed Simulation; RTI INTRODUCTION library encapsulates the complexities of inter-federate communication This paper discusses the technical, political and economic considerations one must weigh when selecting an RTI implementation for a HLA compliant distributed simulation Researching into these issues was the high-level initiated work in a large project, which play a general role in other projects: Visual battle Environments, 3D modeling, and effecting etc What must be considerate for achieving data transport to realize the function upon has been presently engaged in a joint HLA/RTI selection process 1.1 Background The HLA is a distributed simulation architecture designed to facilitate interoperability and promote software reuse within the M&S community The HLA was originally defined by the U.S DMSO and is now an IEEE standard (IEEE 1516) In the HLA, the unit of software reuse is the federate A group of communicating federates at run-time is called a federation Federates communicate with each other via a distributed middleware called the RTI The RTI provides the services that allow federates to manage the federation’s global state Contrary to popular belief, the RTI is not a centralized software entity that federates plug into Rather, each federate communicates with its own local copy of the RTI software library (called the Local Run-time Component, or LRC) The LRCs then communicate amongst themselves to coordinate the execution of the federation Thus, the RTI 1.2 Related works The HLA specifies the interface between a federate’s simulation logic and the RTI library More precisely, HLA defines two interfaces: the RTI ambassador interface and the federate ambassador interface The RTI ambassador interface is implemented by the LRC and defines the services that the federate can invoke on the RTI The federate ambassador interface is implemented by the simulation logic and defines the events that the RTI can signal to the federate The HLA does not, however, specify how the LRC is implemented The RTI vendor is free to choose how the LRC is organized internally as well as the inter-LRC communication protocol Thus, all federates within a federation must agree to use the same RTI library To complicate matters, there are two interface specifications currently in use The first is the DMSO specification we referred to as 1.3-NG The second is the newer 1516 specification, defined by the IEEE 1516 standard and based on the 1.3-NG interface Federates can conform to either or both standards, and likewise, RTI libraries can conform to either or both In order for federates to communicate with an RTI, however, all must support the same interface specification Several RTI implementations exist that conform to either the 1.3-NG or 1516 interfaces (or both) It is therefore natural to wonder which RTI implementation best suites the needs of a particular community 807 The rest of the paper is organized as follows: Section discussed the technical factors In section3 and section4, the political and economic factors, respectively, Conclusion is mentioned in section TECHNOLOGICAL CONSIDERATIONS 2.1 Challenges by RTIs There is no single RTI implementation suitable for all federations Different RTI vendors build their RTI with different design goals For example, some may provide a more efficient time management implementation and are thus better suited to constructive rather than virtual simulations In general, one should approach the decision of which RTI to use on a per federation basis It is important to understand that, in general, the choice of RTI library used by a particular federate is a compiletime decision That is, switching to another RTI library will require recompilation of the federate As the practical experience, the factors that must be weighted when choosing the RTI is follows: * * * * * * The reusing of a existed simulation The need to develop new federates The required level of federation performance Choice of Federation Object Model (FOM) Choice of computing platform Choice of development tools The degree to which the above factors are relevant varies considerably In fact, some of these factors have little or no bearing on the RTI selection process but are discussed nonetheless to dispel potential misconceptions Each such issue is discussed further in the following sections 2.2 but those that provide some programmable way to access and/or alter the simulation’s state This type of simulation component must be encapsulated in a federate that exposes the simulation’s state as one or more HLA objects/interactions Some of these HLAwrappers already exist for simulation frameworks such as The choice of RTI is inconsequential since the HLA-wrapper is just another federate that needs no knowledge of the RTI’s implementation 2.3 Federate development The choice of RTI can have a large impact on the development speed of new federates The original RTI implementations were largely considered as a black boxes – the federate developer could not examine the RTI’s state at runtime Later implementations addressed this problem with various debugging/monitoring tools that report the RTI’s internal activities (publications, subscriptions, object updates/reflections, interaction sends/receives, lookahead values, etc.) Such tools can be either open or closed Closed tools provide a user interface that presents the relevant information Open tools provide the ability to plug custom code into the RTI to both monitor and affect the behaviour of the RTI Open tools enable more advanced diagnostics to be performed on a federation at run-time 2.4 Performance As previously discussed, no two RTI implementations are equal It is therefore natural to wonder which RTI performs best in a given simulation For example: * Which RTI is most efficient when executing over a wide area network? * Which RTI most efficiently implements the Data Distribution Management (DDM) service group? * Which RTI provides the lowest latency communication? Reusing of existing simulation components The following distinguishes between three types of simulation components that one may wish to reuse within a federation * Distributed Interactive Simulation (DIS) compliant simulations * Federates that comply with the IEEE 1516 interface * Simulations that are neither DIS nor HLA compliant but provide a programmable interface DIS simulations require what is commonly referred to as a DIS-to-HLA bridge (or gateway) This is a software component that translates between the DIS Protocol Data Units (PDUs) and HLA objects/interactions The second situation is a better/easier solution that requires no source code changes is to choose an RTI implementation that supports both interfaces Some RTI vendors choose to package this as a separate product while others provide this capability as part of the RTI itself The final category of simulation components that may be required to participate in a HLA federation are those that may be neither DIS nor HLA compliant, It is important to distinguish between RTI performance and federation performance In general, the former is a subset of the latter That is, there are several factors that can affect a federation’s performance that are not directly linked to the selected RTI For example, a time regulating federate performing an expensive computation will slow the execution of all time constrained federates In this case, improving the performance of the federation requires faster hardware for the computationally expensive federate or a redesign of the federate itself (perhaps replacing the expensive computation with an acceptable approximation) 2.5 FOM The Federation Object Model (FOM) defines the vocabulary of data exchange within a federation All federates participating within the same federation must support the same FOM 808 There is a misconception amongst many researchers entering the world of HLA simulations that the choice of FOM is somehow linked to the choice of RTI implementation While its true that a federation must agree on a single FOM, all RTIs can process all FOMs Unfortunately, the standard of fom has great different amoung the various standards of RTI/HLA version, That is, the file format of each differs so an RTI implementation may only recognize the file format that corresponds to the interface it supports However, the differences between the formats are largely syntactic and easily convertible The issue of FOM-agility is often brought up when discussing RTIs FOM-agility is defined as the ability of a federate designed for one FOM to be reused in a federation using another semantically equivalent yet syntactically distinct FOM That is, relevant objects/interactions in the new federation must somehow be mapped to objects/interactions understood by the reused federate FOM-agility can be supported at different levels – one of which is at the RTI itself Some RTI implementations support a plug-in architecture that allows the federate to supply a translation layer to accomplish the necessary FOM mappings However, FOM-agility is not a direct factor in choosing an RTI 2.6 Computing platform POLITICAL CONSIDERATIONS As part of the RTI selection process, consideration of the political issues is also necessary Such issues are often implicit in the various software components used within an M&S environment along with issues such as availability, timeliness, interoperability, costing and standards compliance They are also heavily influenced by less objective matters, such as anecdotal experience and technological, personal and organizational biases While not necessarily “scientific”, it is important for decision makers to realize that they exist and that they can colour the perception of other factors in the decision process FINANCIAL CONSIDERATIONS The final, yet extremely important issue affecting RTI selection is that of economics When purchasing RTIs for federation development, one needs to consider that the pricing schemes adopted by vendors show significant variation The price of a RTI is mainly based on the federate that it can support, it is generally exist a basic price ,the higher the price, the more federate that the RTI can support So, before purchase a RIT, the following questions must be solved: A computing platform refers to the mix of hardware, operating system and programming language used to implement an application This paper distinguishes between three platform related issues: * How many federates are needed in a simulation * What about redundancy * Computing and compareing the various RTI’s totla price for the practical simulation, getting the optimiza purchase solusion * The implementation language of the RTI * The RTI’s supported hardware and operating systems * The RTI’s supported language bindings Thus when purchasing commercial RTIs, careful consideration should be given to a variety of factors that contribute to the cost of the package The most important factor in choosing an RTI is whether there is an implementation for your chosen hardware and operating system(s) In this case, the cross-platform nature of a Java-based RTI is advantageous since it can run without modification on any Java-enabled platform In a heterogeneous computing environment, it is important that the chosen RTI vendor support all your platforms since, as previously stated, federates within the same federation must use the same RTI implementation 2.7 Development tools The services provided by the RTI are both complex and low-level Third-party tools exist that both isolate and abstract the RTI’s functionality and provide a simpler application programming interface (API) to the federate developer While some RTI vendors also provide such tools, they are not (and should not) be dependent on that vendor’s RTI CONCLUSION This paper has outlined the three broad areas of concern that need to be considered in selection of technologies associated with the use of the High Level Architecture, or HLA In each of these areas, different specific issues were highlighted and briefly addressed It is again stressed that this paper is intended to serve as an initial overview and introduction to these various issues and is not a final compendium As obvious from the breadth and depth of the technical issues associated with distributed simulation technologies, further work in understanding and addressing the performance as well as technical flexibility and constraints associated with any specific HLA technologies, including RTIs, is warranted 809 This page intentionally left blank Information Technology and Computer Application Engineering – Liu, Sung & Yao (Eds) © 2014 Taylor & Francis Group, London, ISBN 978-1-138-00079-7 Analysis on warpage of support structure of computer hard disk for optimum processing by precision injection molding Yung Ning Wang & Her Shing Wang Department of Industrial Engineering & Management, National Taipei University of Technology, Taipei, Taiwan Wen Tsung Ho Department of Business Administration, Takming University of Science and Technology, Taipei, Taiwan Yi Lin & Yung Kang Shen Department of Business Administration, Takming University of Science and Technology, Taipei, Taiwan Graduate Institute of Industrial and Business Management, National Taipei University of Technology, Taipei, Taiwan School of Dental Technology, College of Oral Medicine, Taipei Medical University, Taipei, Taiwan ABSTRACT: This study emphasizes on warpage of support structure of computer hard disk for optimum processing by precision injection molding Firstly, the authors use Moldflow software to analyze the runner’s balance on multi-cavities for the support structure of computer hard disk Then this study accords to these data to manufacture the real mold This study uses different processing parameters (injection speed, injection pressure, mold temperature, packing time and melt temperature) to fabricate support structure of computer hard disk using precision injection molding The authors use Taguchi method to find out which factor is more important for warpage of support structure of computer hard disk The results show that the most important factor for warpage of support structure is followed by packing time, injection speed, melt temperature, packing time and the last one is the injection pressure Keywords: Warpage, Precision injection molding, Numerical simulation, Optimum processing INTRODUCTION structure of computer hard disk for mass producing was determined Precision injection molding is used to manufacture micro structures and is among the most common and versatile methods of mass-producing complex plastic parts Sul et al [1] demonstrated that the mold temperature is the key processing parameter in injection molding Shen et al [2] applied micro-injection molding and micro-injection compression molding to form light-guiding plate microstructures Their test results showed that mold temperature was the main factor in both processes Wan et al [3] studied of the window frame manufacturing by injection molding was carried out with aid of Moldflow analysis The results showed that natural fiber composite was suitable to fabricate window frame This study fabricated support structure of computer hard disk from plastic The ABS+PC material that performed best was then used to fabricate previous product by precision injection molding The processing windows for support structure of computer hard disk are discussed The aim of this study was to determine the minimum warpage of support structure by precision injection molding using Taguchi method Finally, the optimal processing method of support EXPERIMENTAL METHOD The original support structure of computer hard disk shows on Figure A two-plate mold is utilized during precision injection molding The mold cavities of previous part are fabricated by computer numerical control (CNC) process The mold material is NAK-80 The inlet gate of the two-plate mold has a sidewall pin gate All experiments use a injection molding machine (220S;ARBURG, Germany).The machine controlling mold temperature is a 300S (REGLOPLAS, Switzerland) This study uses the ABS+PC-C120 HF (GE, USA) material to fabricate the support structure of computer hard disk via precision injection molding In this research, the authors want to find the optimal processing window for the support structure of computer hard disk The processing parameters are injection speed (A), injection pressure (B), mold temperature (C), packing time (D), and melt temperature (E) Table shows the process parameter values for the ABS+PC material using precision injection molding 811 Figure The dimensions of support structure of computer hard disk Table Processing parameters for ABS+PC Level Parameter Level Level Level Level A Injection speed (mm/sec) B Injection press (MPa) C Mold temp (◦ C) D Packing time (Sec.) E Melt temp (◦ C) 97 55 60 215 98 60 70 220 99 65 80 225 100 70 90 230 Because the types and values of processing parameters are too much, this research uses the Taguchi method to get the optimal processing conditions for minimum warpage of the support structure of computer hard disk (L16 orthogonal array) Analysis of warpage of support structure is the primary task on this study This research uses the optimal processing to find the relationship between processing parameters and warpage of support structure of computer hard disk A three-dimension (3D) laser scanner LSH-II-150 (Hawk, Nextc, England) is used to determine the warpage of support structure of computer hard disk NUMERICAL METHOD This study uses Moldflow software to simulate the warpage of support structure of computer hard disk The governing equations for mass, momentum, and energy conservation for a non-isothermal, generalized Newtonian fluid are continuity equation, momentum equation and energy equation Boundary and initial conditions: In this study, the governing equations are solved using the control volume finite element method For details of numerical simulations, see Shen et al [4] The 3D mesh in Moldflow analysis is utilized to examine the support structure of computer hard disk The mesh is four-node tetrahedral element The model has 10500 meshes and 9512 nodes for the support structure Calculation time for this case is about 357 seconds A personal computer (PC) that has a Pentium 2.8 G CPU, G memory, and 120 G hard drive is used The Moldflow software is the 5.0 version RESULTS AND DISCUSSION The warpage analysis for L9 case on numerical simulation reveals on Figure The maximum warpage demonstrates on the ends of support structure The value is 0.4849 mm 812 Figure Measurement values (L1∼L8) Figure Warpage analysis for L9 case on numerical simulation Figure Measurement values (L9∼L16) Figure Variation of the S/N ratio with factor level for warpage of support structure Figure indicates that the S/N ratio of support structure by precision injection molding The optimal factor levels that can statistically result in the minimum warpage for precision injection molding are A4B3C1D3E1 These optimized factor levels represent an injection speed of 100 mm/sec, an injection pressure of 65 MPa, a mold temperature of 60◦ C, a packing time of sec and a melt temperature of 215◦ C The results also appear that the packing time is the most important factor of processing parameter, then is injection speed, then is melt temperature, then is mold temperature and injection pressure is the unimportant factor The higher injection speed and higher injection pressure can short the filling time of support structure on precision injection molding This situation also causes the melt temperature of plastic to increase and decrease the viscosity of melt plastic So the flow situation can be easy on cavity and this causes the smaller warpage of support structure Suitable difference between melt temperature and mold temperature let the smaller difference of temperature distribution of plastic on filling stage of precision injection molding This situation may lead the smaller warpage The suitable higher packing time can add up the more melt plastic going into the cavity of mold and supplement the shrinkage due to temperature difference of product This situation also can reduce the warpage of support structure of computer hard disk The measurement values of warpage of support structure (group 1, group 2) list on Figure and The results appear that the experiment of L11 has the minimum value and these indicate that the L11 has the good processing The average warpages of support structure are listed on Table for measurement and numerical simulation The results appear that the L11 condition has the minimum warpage whether experiment or numerical simulation The L11 processing conditions include the injection speed of 99 mm/sec, injection pressure of 65 MPa, mold temperature of 60◦ C, packing time of sec and melt temperature of 230◦ C The values of processing parameter are very close to the optimal processing L4 condition shows the maximum value of warpage of support structure for experiment and numerical simulation The L4 processing conditions include the injection speed of 97 mm/sec, injection pressure of 70 MPa, mold temperature of 90◦ C, packing time of sec and melt temperature of 230◦ C The values of processing parameter are far away the optimal processing Figure reveals that the warpage difference of support structure between experiment and numerical simulation The results reveal that the L14 has the maximum difference for experiment and numerical simulation and L11 has the minimum difference between experiment and numerical simulation This study appears the same results on warpage analysis whether experiment and numerical simulation 813 Table Warpage for measurement and numerical simulation Measurement Highest point Lowest point Difference Numerical simulation Highest point Lowest point Difference L1 L2 L3 L4 L5 L6 L7 L8 L9 L10 L11 L12 L13 L14 L15 L16 0.603 0.815 0.972 0.966 0.886 0.951 0.634 0.727 0.84 0.713 0.601 0.577 0.702 0.652 0.772 0.738 0.21 0.338 0.323 0.212 0.286 0.244 0.223 0.248 0.348 0.302 0.224 0.167 0.312 0.075 0.308 0.309 0.393 0.477 0.649 0.754 0.6 0.707 0.411 0.479 0.492 0.411 0.377 0.41 0.39 0.577 0.464 0.429 L1 L2 L3 L4 L5 L6 L7 L8 L9 L10 L11 L12 L13 L14 L15 L16 0.465 0.617 0.796 1.017 0.795 0.9 0.555 0.606 0.545 0.484 0.484 0.469 0.479 0.472 0.522 0.493 0.065 0.155 0.177 0.204 0.183 0.204 0.146 0.15 0.069 0.079 0.109 0.084 0.097 0.09 0.07 0.092 0.399 0.461 0.618 0.812 0.611 0.695 0.408 0.455 0.484 0.405 0.375 0.388 0.381 0.382 0.451 0.401 REFERENCES Figure Difference of warpage between experiment and numerical simulation CONCLUSIONS The goal of this research is to fabricate support structure of computer hard disk by precision injection molding The packing time is the most important factor of processing parameters for minimum warpage by precision injection molding The optimal factor levels in the minimum warpage by precision injection molding are predicted to be A4B3C1D3E1 [1] Y.C Sul, J Shah and L Lin: Implementation and analysis of polymeric microstructure replication by micro injection molding, J Micromech Microeng Vol 14 (2004), p 415–422 [2] Y.K Shen: Comparison of height replication properties of micro-injection molding and micro-injection compression molding for production of microstructures on lightguiding plate, Plast Rubber Compos Vol 36 (2007), p 77–84 [3] A.W.A.R Wan, T.S Lee and A.R Rahmat: Injection molding simulation analysis of natural fiber composite window frame, J Mater Process Tech Vol 197 (2008), p 22–30 [4] Y.C Chiang, H.C Cheng, C.F Huang, J.J Lee, Y Lin andY.K Shen, Warpage phenomenon of time-wall injection molding, Int J Adv Manuf Tech Vol 55 (2011) p 517–526 814 This page intentionally left blank Editors Liu Sung Yao presented at the International Conference on Information Technology and Computer Application Engineering, held 27-28 August 2013, in Hong Kong, China Specific topics under consideration include Control, Robotics, and Automation, Information Technology, Intelligent Computing  and Telecommunication, Computer Science and Engineering, Computer Education and Application and other related topics This book provides readers a state-of-the-art survey of recent innovations and research worldwide in Information Technology and Computer Application Engineering, in so-doing furthering the development and growth of these research fields, strengthening international academic cooperation and communication, and promoting the fruitful exchange of research ideas This volume will be of interest to professionals and academics alike, serving as a broad overview of the latest advances in the dynamic field of Information Technology and Computer Application Engineering an informa business Information Technology and Computer Application Engineering This proceedings volume brings together some 189 peer-reviewed papers Information Technology and Computer Application Engineering Editors: Hsiang-Chuan Liu Wen-Pei Sung Wenli-Yao .. .INFORMATION TECHNOLOGY AND COMPUTER APPLICATION ENGINEERING This page intentionally left blank PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER APPLICATION. .. Association Hong Kong Control Engineering and Information Science Research Association XV This page intentionally left blank Information Technology and Computer Application Engineering – Liu, Sung... conference focused on Computer Application Engineering and Information Science The conference will promote the development of Computer Application Engineering and Information Science, strengthening

Ngày đăng: 16/01/2018, 12:02

TỪ KHÓA LIÊN QUAN