Applied Mechanics and Materials Vols. 427-429

Paper Title Page

Abstract: Big data is the new revolution of global development, the coming of the big data era puts forward new challenges on the data control ability of traffic managers, and also provides unprecedented opportunities to better enhance the level of traffic management. This article first gives the concept and application prospect of big data, in combination with the traffic conditions of Shenzhen, proposed several methods of collecting data; according to the application and practice of big data technology in Shenzhen, put forward application of big data technology in traffic management.
2743
Abstract: Distribution network reconfiguration is one of the essential functions of the DMS system; it can be attributed to a number of constraints of large-scale nonlinear combinatorial optimization problem in mathematics. The characteristic of load change of time and space will affect the results of load forecasting. Distribution network reconfiguration relies on the load forecasting results. This paper proposes the more realistic distribution reconfiguration scheme based on the GIS system with space information through spatial data mining. For the real-time and efficiency of effective assurance data, the interface design in GIS system and distribution automation system are also proposed. The geographical information and real-time information are connected seamlessly, so that this two system information is highly unified. The solution can provide the data basis for distribution reconfiguration scheme accurately, and improve power supply reliability of distribution network. It shows that through the example: GIS based on the spatial data mining can provide load in quantity, time, space prediction for the deeper research of distribution network reconfiguration.
2748
Abstract: In this paper, we illustrate an orthogonal space-time block code (OSTBC) concatenated with trellis-coded modulation (TCM) model, for information transmission over a multiple-input multiple-output (MIMO) channel with 2 transmit antennas and 1 receive antenna. We establish the model of TCM-OSTBC concatenation using the SIMULINK. Also, the establishment of an independent TCM model and OSTB model are shown in order to compare with the concatenation scheme. Finally, the performance simulation diagram under three schemes is given. As expected, the simulation result clearly shows, the performance of concatenated OSTBC with TCM is better than TCM or OSTBC.
2752
Abstract: In order to satisfy the need of short distance wireless personnel positioning, a ZigBee compliant personnel positioning system has been designed. ZigBee technology and its characteristics was been introduced,and analysed the ZigBee wireless communication protocol, and using the CC2430 chip and CC2431 chip with positioning engine. On this based, the personnel positioning system is studied and the design of hardware, software of the wireless communication application development, achieve the underground personnel positioning. It can provide abundant data, graphic information, real-time monitoring well from ground personnel,.in accordance with the actual situation of coal mine provide attendance function. After the accident, the accident can be fast retrieval when underground staff location specific distribution, so as to formulate timely and effective rescue measures. This network system satisfied the needs of the underground personnel positioning requirements of wireless short distance, low cost, convenient construction, and easy to use.
2756
Abstract: The network has become an important part of life in the 21st century and it gradually become an important positions which people can express their ideas and they can exchange their cultural and social opinion can be spread, the modern college students are the biggest group which are influenced by network culture. The network culture to college students values research is imminence requirement of the times. this paper according to social network cultures current situation to analyze the present situation of the college students, estimate of variance of the influence of value by fixed-effect model to judge the influence degree. And than research relevant strategies, it tries to lead the college students value orientation under the internet culture.
2761
Abstract: Traditional appllications of deep packet inspection technology in the cloud is unscientific and unreasonable.In this paper,an intelligent cloud-cooperation framework of DPI is designed, given characteristics of cloud computing like distributed computing and user configurability. The overall efficiency is improved since it coordinates the configuration intelligently according to diversity of resources in the back end of cloud computing system and provides a scheduler for cooperative processing and defenses of repeated assaults. By comparing our design with traditional framework in virtual cloud computing platform, we prove the advantages of cloud-cooperation framework on space and time performance.
2767
Abstract: In order to rationally arranged cornfield wireless sensor network nodes, fields of corn are studied in the loss of signal of 2.4GHZ wireless sensor radio frequency signal, and selecting 3 levels of planting density carries out the field random test with the transmission distance and antenna height as influencing factors, environmental impact factors and antenna height exist linear relationship, establishing the mathematical model.
2771
Abstract: We propose a new deep packet inspection mechanism: APFA(Asynchronous Parallel Finite Automaton) instead of the traditional one, which is developed based on detailed analysis over causes of status explosion and flaws of existing solutions. Applying Asynchronous Parallelism and Heuristically Forecast Mechanism, it can take advantage of multi-core platform, offering an effective method to avoid overlapping problem and semantic assaults. Experiments under environment with artificial flows show that the average space APFA occupies is 89.7% less than that of DFA and the average time is 24.4% less cost.
2774
Abstract: In the TCP/IP building intercom system, broadcast addressing or query-list addressing are often used to obtain the IP address of the called party. However, these methods are limited by the function of the network equipment, intolerable resource costs, and high failure rate of querying. To solve such problems, this paper presents a networking and addressing method in the TCP/IP building intercom system which is based on Distributed Hash Table (DHT). Results from theoretical analysis and simulations show the feasibility and superiority of such a method.
2778
Abstract: With the rapid development of Internet technology, network and information security has become increasingly important. After studying the principle of IPSEC(IP Security) and VPN (Virtual Private Network) technology, this paper designs a network architecture which is called S1 in the TD-LTE communication system. The specific packet is securely encrypted by using IPSEC technology between the base station and security gateway. After a lot of tests, the technical solution to achieve IPSEC is proved to be realized and to have a highly efficient and stable characteristic.
2783

Showing 611 to 620 of 657 Paper Titles