Applied Mechanics and Materials
Vol. 391
Vol. 391
Applied Mechanics and Materials
Vol. 390
Vol. 390
Applied Mechanics and Materials
Vol. 389
Vol. 389
Applied Mechanics and Materials
Vol. 388
Vol. 388
Applied Mechanics and Materials
Vol. 387
Vol. 387
Applied Mechanics and Materials
Vols. 385-386
Vols. 385-386
Applied Mechanics and Materials
Vols. 380-384
Vols. 380-384
Applied Mechanics and Materials
Vol. 379
Vol. 379
Applied Mechanics and Materials
Vol. 378
Vol. 378
Applied Mechanics and Materials
Vol. 377
Vol. 377
Applied Mechanics and Materials
Vol. 376
Vol. 376
Applied Mechanics and Materials
Vols. 373-375
Vols. 373-375
Applied Mechanics and Materials
Vol. 372
Vol. 372
Applied Mechanics and Materials Vols. 380-384
Paper Title Page
Abstract: In computer graphic, conventional method often uses the fixed graphics in single color to introduce the design of fractal tree graphics, which makes students feel difficult to understand. In order to solve this problem, in this paper a new environment of fractal tree graphics base on E-learning is proposed, development of which is also introduced in detail. In this learning environment, the iterated depth of fractal tree graphics, and the changing angle of branch can be increased and decreased. In increasing process, the fractal limitation or fixed point can be seen clearly. In this new learning environment, students can easily grasp the fractal graphics definition and the programming procedure of fractal graphics, and understand the generation procedure and structure of fractal tree graphics. Therefore, it can arouse the students interests and attracts their attentions in the course of learning.
2292
Abstract: HFS+ is the main file system of Mac OS. With the popularity of Apple computer, more and more security specialists pay attention to the computer forensics in Mac OS. As computer forensics technology on Windows Platforms is quite mature and can pass the limit of authority, when get the HFS+ disk or mirror from Apple computer, we can achieve data manipulation for further computer forensics through analyzing the file system on Windows platform. This paper proposed an efficient method to analyze HFS+ file system on Windows to build directory structure and get the unallocated space. This work is the important beginning of computer forensics in Mac OS.
2297
Abstract: Chaperonage network technique of continuously development, make ether net safety problem research more and more importance, involve a network safety the realm have many safety technique, like fire wall, invade examination, safety scan, agreement analysis etc., but these technique of realization all demand depend on a network data pack to succeed in catching. This text to under the system of the data pack succeed in catching a technique to carry on a research, and put forward a few data pack of succeeds in catching a method.
2302
Abstract: With the wide application of Web technology, Web database system is playing an increasingly important role in network application. The storage amount of Web database information is growing, at the same time, the security of Web database has been facing extremely daunting challenges. How to strengthen the security of Web database system has become an important issue of network researches. This paper has introduced implementation techniques of database security, described the sub-key encryption algorithm of database in details, and applied it to the management system of information student.
2306
Abstract: In this paper, to the deficiencies of the Ad Hoc network in optimization design, we design a multi-objective heuristic algorithm to optimize global collocation of the routing protocol parameters with Pareto genetic algorithm. In process of the optimization, based on the performance indicator value corresponding to individual of the entire group calculate its Pareto Level to obtain a Pareto optimal set, and each solution in the collection is Pareto optimal solution.
2312
Abstract: Based upon the resume and analysis of software reliability of information system, this paper sets forth software reliability assurance technologies of standardization, review, test, information feedback and control, and software engineering in brief. Moreover, the meticulous analysis and proper induction is carried through with respect to the technology applications during the periods of software life cycle. Thenceforth a primary prospect is presented.
2316
Abstract: IPTV is a new TV style. IPTV STB is the key device of IPTV system. In this paper, we will select the ARM9E as the embedded chip. We designed a new IPTV STB based on Android system. The system structure chart of STB may be helpful for the IPTV system.
2321
Abstract: As a low-cost, highly effective network application model, Cloud Computing provides a variety of users with virtual and rich data and processing services including data storage , software downloads and maintenance, customer service, multimedia information resource and so on. On the basis of a brief description of cloud computing and its features, this paper focuses on design modes in mobile learning, and explores the educational environment of cloud computing.
2325
Abstract: In this paper, with the information analysis at the demand side in smart grid, two interactive modes and four interface protocols in application layer have been proposed according whether the main station exists or not. With comprehensively reviewing the smart electricity businesses related with power consumers, this paper defined the requirement and interaction content and four kinds of Web Service interface protocols in the application layer. Meanwhile, examples of information exchange in the actual scenarios was carried out. The results in this paper can impel the construction of smart electricity service system, enhance the user QoS and comprehensively intelligentize the demand response to a certain extent.
2329
Abstract: In this paper, we proposed the multi-carriers generation scheme for WDM-ROF and explored the typical applications in smart grid. The result and the analysis show that the WDM-ROF is one of the promising technologies to satisfy the new requirements in smart grid. It can realize high-speed, huge-capacity communication by converging wired and wireless technologies. It will enhance the whole communication performance in the power communication system.
2333