Applied Mechanics and Materials
Vol. 391
Vol. 391
Applied Mechanics and Materials
Vol. 390
Vol. 390
Applied Mechanics and Materials
Vol. 389
Vol. 389
Applied Mechanics and Materials
Vol. 388
Vol. 388
Applied Mechanics and Materials
Vol. 387
Vol. 387
Applied Mechanics and Materials
Vols. 385-386
Vols. 385-386
Applied Mechanics and Materials
Vols. 380-384
Vols. 380-384
Applied Mechanics and Materials
Vol. 379
Vol. 379
Applied Mechanics and Materials
Vol. 378
Vol. 378
Applied Mechanics and Materials
Vol. 377
Vol. 377
Applied Mechanics and Materials
Vol. 376
Vol. 376
Applied Mechanics and Materials
Vols. 373-375
Vols. 373-375
Applied Mechanics and Materials
Vol. 372
Vol. 372
Applied Mechanics and Materials Vols. 380-384
Paper Title Page
Abstract: This thesis discusses the method and theory about Ajax. And describe the process and method of applying Ajax in web OA system based on .NET.
2192
Abstract: This paper discusses about types of file structures in Linux, points out that EXT2 is the most commonly used file system in Linux, analyzes the disk layout, index point and directory structure of EXT2, and studies the method to access files in EXT2 by name, which makes the access faster and more efficient.
2195
Abstract: Linux is a comparatively safe operating system. This paper makes a research about the security policy for Linux, analyzing the principle and design idea of its identification and authentication mechanism, access control mechanism, Capability mechanism and security audit system. In this paper, the disadvantages of Linux system are pointed out and an improvement program is indicated so that the security performance of this system can be more effectively strengthened.
2200
Abstract: The clock synchronization is the foundation of other applications in the FC network to support the avionic system. This paper briefly elaborates the clock synchronization in the fabric topology which is widely used in FC. According to the implementation of the clock synchronization, the paper emphatically analyzes the error sources and influencing factors existed in the processing of the clock synchronization, moreover, puts forward the solutions for the corresponding errors. Finally, an example is provided to show the consequence of the error analysis.
2204
Abstract: With the rapid development of Internet, the current Internet Protocol IPv4 cannot meet the new requirements. Compared with IPv4, IPv6 has more advantages. Fruitful results have been borne in aspects of IPv6 protocol study and network construction in China. On the other hand, application and popularization of IPv6 is far from sufficient. In recent years, mobile devices have popularized very rapidly. More and more people use mobile devices, including smartphones and tablets, to surf online everywhere. If such a gigantic amount of mobile devices can access network with IPv6, it will be very important for application of IPv6. In this paper, we first analyze the market of mobile devices to determine the devices to be tested. Then we introduce how to construct test environment and test cases. After that, we illustrate the test procedure. Then we summarize how the mainstream mobile devices support IPv6. At the end of this paper, we look forward the future work.
2209
Abstract: Worms can spread quickly through the network and infect large number of vulnerable hosts in the initial stage causing great loss. The worms are tested and revised for many times aiming at avoiding being detected and eliminated by the security products, and the security software cant be updated immediately for the reason that it costs time to build the new patching before the patching is released. However, the virtual patching strategy can protect the vulnerable hosts from the attacks of the worms before the security products release the new real patching. A new propagation model of worms with virtual patching strategy is thus proposed in this paper for the first time. Through the analysis of the corresponding worm propagation model, its stability condition of worm-free equilibrium point is obtained. And through the numerical analysis, the effectiveness of the virtual patching strategy is shown. This model is more consistent with the actual situation of the worm propagation, and the virtual patching strategy will provide a new insight into the modeling of computer virus propagation.
2216
Abstract: Combat capability evaluation of weapons and equipment system is crucial to develop, scheme, manufacture and use weapons and equipment system in the future. This paper proposed a new frame base on CAS which can aim at the whole emergence of weapons and equipment system. It is proved that this method is effective by an example of XX destroyer combat capability of weapons equipment system.
2221
Abstract: This paper proposes a integration scheme for heterogeneous wired and wireless sensor networks. In the scheme, a complete solution is provided, in order to achieve enhanced flexibility, efficiency, and performance for the overall networked system. In addition, the hybrid networks integration scheme is able to combine the advantages of both wired and wireless solutions. From the theoretical and simulative perspectives, the paper analyzes the performance parameters, including the cost, the delay time and packet loss rate, and the analytical results show that the performance of the scheme is better than other interconnection techniques.
2226
Abstract: in order to achieve the publication and registration of composite services, a new method is proposed based on Petri net with semantic markups. It mainly includes composite services process orchestration, composing web services and choice structures, executable planning, information registration, and so on. In addition, its corresponding platform has also been developed, which will further verify the effectiveness of this method.
2231
Abstract: With the development of large-scale distributed computing, Stand-alone operating environment to meet the demand of the time and space overhead of massive data based on. There is more attention to how to design the distributed algorithm for efficient cloud computing environment. The MapReduce model cannot solve the issue. In this paper, the redesign of the computing model of MapReduce, ensure the existing calculation models compatible with the old MapReduce operation. At the same time, the framework used the message synchronization mechanism to implement state data changing interaction tasks in Parallel Layer. Compared to the original MapReduce operation, greatly reduces the processing time of the MapReduce iterative algorithm.
2237