Time filter

Source Type

Shan M.J.,East China University of Technology
Advanced Materials Research | Year: 2014

In this paper we construct model in computer forensics by using Benford's Law, which is one of three famous laws in statistics in linguistics. Especially, we use Benford's Law to analyze data in file analysis and Anomaly detection. We illustrate that Benford's Law is able to supply the strategy for data analysis. The future work, Benford's Law will be the theoretical rule for intelligent compression of mass data. © (2014) Trans Tech Publications, Switzerland. Source

Zhang H.,Zhejiang University of Technology | Luo Y.-Y.,East China University of Technology
Meitan Xuebao/Journal of the China Coal Society | Year: 2012

Under the guidance of the simulation of antigen-antibody recognition in biological mechanisms of the immune system, based on the artificial immune algorithm, a prediction model for slope stability was introduced. The slope stability sample set was defined as antigen set, and the influence factors of slope stability were defined as the antibody. Through reiteration of genetic manipulation on the antigen gene segment, the antibody set that can perform slope stability well was developed. The affinity between prediction sample set and antibody set were calculated, and the KNN algorithm was used to predict the sample stability. The self-adaptive artificial immune algorithm was also employed to improve the model effectiveness and reliability. The case study confirms that self-adaptive artificial immune algorithm has a more accurate prediction than basic artificial immune algorithm, proving that the self-adaptive approach is effective. The new method can avoid from building complex non-linear function between influence factors and stability, effectively reduce the modeling complexity and has better adaptability. Source

Yang Z.,Jiangsu Xuzhou Construction Machinery Research Institute | Shi D.,East China University of Technology | Wen B.,Yanshan University | Melnik R.,Wilfrid Laurier University
Journal of Alloys and Compounds | Year: 2012

Structural, elastic and electronic properties, as well as heats of formation, of seven Ca-Zn intermetallic compounds have been studied by using first principles methods. It was found that with increasing Zn concentration, the bulk moduli and shear moduli of Ca-Zn intermetallic compounds increase monotonically. Our results also indicate that Ca 3Zn, Ca 5Zn 3, and CaZn are ductile, while CaZn 2, CaZn 5, CaZn 11, and CaZn 13 are brittle. Furthermore, calculations of the electronic properties and heats of formation indicate that seven Ca-Zn intermetallic compounds, considered in this work, are all conductors and thermodynamically stable. © 2012 Elsevier B.V. Source

Tan H.,Zhejiang University | Wu J.,Zhejiang University | Huang D.,East China University of Technology | Gao C.,Zhejiang University
Macromolecular Bioscience | Year: 2010

PLLA microspheres were aminolyzed in hexanediamine/propanol solution to introduce free amino groups on their surface, which were further transferred into aldehyde groups by a treatment of glutaraldehyde. Chitosan-graft-lactose was then covalently coupled via Schiff base formation. Morphological variation and chitosan-graft-lactose immobilization were characterized. In vitro culture of rabbit auricular chondrocytes demonstrated that the PLLA microcarriers could effectively support the cell attachment and particularly induce cell aggregation on their surface. The formed cell aggregates/microcarriers composite showed higher viability and extracellular matrix production. Thus, the PLLA microcarriers can be potentially used as an injectable delivery system for cartilage repair. (Figure Presented) © 2010 WILEY-VCH Verlag GmbH & Co. KGaA. Source

Shan M.J.,East China University of Technology
Applied Mechanics and Materials | Year: 2014

This paper studies Mobile Payment App from Mobile payment and Application. We analyze the data security risks hidden in this payment model. Give the corresponding solutions. Finally, look forward the research direction of Mobile Payment App security. © (2014) Trans Tech Publications, Switzerland. Source

Discover hidden collaborations