Applied Mechanics and Materials
Vol. 437
Vol. 437
Applied Mechanics and Materials
Vol. 436
Vol. 436
Applied Mechanics and Materials
Vols. 433-435
Vols. 433-435
Applied Mechanics and Materials
Vol. 432
Vol. 432
Applied Mechanics and Materials
Vol. 431
Vol. 431
Applied Mechanics and Materials
Vol. 430
Vol. 430
Applied Mechanics and Materials
Vols. 427-429
Vols. 427-429
Applied Mechanics and Materials
Vols. 423-426
Vols. 423-426
Applied Mechanics and Materials
Vol. 422
Vol. 422
Applied Mechanics and Materials
Vol. 421
Vol. 421
Applied Mechanics and Materials
Vol. 420
Vol. 420
Applied Mechanics and Materials
Vol. 419
Vol. 419
Applied Mechanics and Materials
Vol. 418
Vol. 418
Applied Mechanics and Materials Vols. 427-429
Paper Title Page
Abstract: This paper introduced parallel computing techniques to improve random walk algorithm. The random walk problem was firstly explained by a formal model. And then, the parallel features of random walk algorithm were discussed in detail. A parallel random walk algorithm was proposed and applied to analyze the VLSI power grid. The time complexity and the main factors impacting on the execution time of algorithm were analyzed carefully. The experimental results proved that the parallel computing techniques could improve random walk algorithm effectively.
2787
Abstract: For various features of heterogeneous network access, combined with multi-master multiple slave Stackelberg game model, network pricing and resource allocation scheme of a heterogeneous IOT is proposed. A mobile end-user utility function based on income and spending is designed. After the operator's price is determined, the utility function satisfies the concave conditions to ensure the existence of mobile user's non-cooperative Nash equilibrium point, resulting in multiple resource participants in the joint optimal objective.
2791
Abstract: In traditional role-based access control (Role Based Access Control, RBAC), proposed the role and user-groups based on access control with context-aware (Role and Group Based Access Control with Context, RGBACC) model. RGBACC can do unified functional management to users, and can dynamically change the user's permission by the information from application environment in the context of access and security-related .This article RGBACC model applied to the actual document access control system, and the system design and implementation of a detailed description.
2795
Abstract: Due to the high speed of yacht, an emergency meeting will be easily caused in the complex sea environment. So it is important to the safety management of yacht. This paper designed and realized a navigation system of cruise yacht based on Qt using embedded, GPS and 3G technology. The advantage are low development cost and easy operation.
2800
Abstract: Aiming at the condition that laboratory instrument resource can not meet the demands of experimental teaching,management and upgrading because of shortage, decentralization, obsolescence and aging, therefore, a design proposal of network experiment system based on Lab VIEW is presented. The data transmission of tree modules which are virtual instruments, simulation and real time measure is achieved with application of Data at Socket technology and Remote Panels technology. Practical application shows that this system can reduce attrition rate of machines and improve the utilization efficiency of instruments and it has some other advantages including short development period, low cost, good compatibility, good extensibility and easy update for equipments. The network construction based on virtual instrument technology has broad prospects in industry and scientific experiment.
2804
Abstract: Research and development of fault diagnosis system in application of integrated neural network information fusion is based on information fusion technology, with which preliminary analysis of equipment fault is made in different perspectives in terms of neural network, so as to identify the fault on the basis of fusion outcome. This technique is applied in fault diagnosis of one type of missile launching control unit, leading to sufficient use of various information and substantially increased fault diagnosis rate.
2808
Abstract: A WSN (Wireless Sensor Network) routing protocol AL-CADE (Airfield Lighting-Clustering Algorithm based on Distance and Energy) based on logic zones was developed to monitor the airfield lighting in approach zone. In the protocol, the monitoring area was set several small logic zones according to the geography location of the nodes, and there were some advanced nodes placed in the logic zones as relay nodes. The cluster-head number of the nodes was optimized in the elliptical area, and the cluster-head election algorithm based on energy and distribution of the nodes was put forward. The simulation results show that the protocol is effective in reducing the node energy consumption and prolonging the network lifetime.
2813
Abstract: The IOT( Internet of things) has been widespread concerned in recent years. In order to gain a better understanding of the IOT technology, the development of the IOT applications and one of the key technologies RFID technologies was given a detailed introduction. For the IOT operation principle and working mechanism can be more easily understood and grasped, it combined with EPC global standards, establishing a structural model of IOT, and giving the aware-layer, network-layer, and application-layer works in this model. To further promote the application of this IOT structure model, highlighting the problems to be solved, and emphasizing awareness node optimize allocation problem, information security issues and data processing problem, etc. The final conclusion points out some suggestions on the development of IOT.
2818
Abstract: Superscalar pipelining is to improve instruction-level parallelism and advanced technology, and is widely used in the computer's central processor and graphic accelerator. In this paper, we made use of advantage of CPLD devicesinherent flexibility, usability, predictability and so on, to achieve superscalar pipelining, designed and constructed a processor model superscalar pipeline machine based on RISC instruction set. Using EDA technology with top-down design methods, and gave the processor model hardware verification and performance test results, and had explored the use of EDA technology processor design ideas and methods.
2822
Abstract: Electric power system relies heavily on common information technologies and platforms, so all common information security issues have been experienced in the electric power information system. Because of attacks destructivity and uncontrollability, it is inappropriate to conduct security analysis in a real Power system directly. Therefore, the paper uses simulation and emulation technology to build a information security test bed for power system at a lower cost and no affect the normal operation and the premise of the aimed system. Simulation contents in the test bed are arranged in four different layers including firmware layer, system layer, network layer and application layer. The test bed also provides a network attack and defense combat system. The test bed can be used for Power system information and network system security testing, engineering validation and evaluation.
2826