Applied Mechanics and Materials
Vol. 437
Vol. 437
Applied Mechanics and Materials
Vol. 436
Vol. 436
Applied Mechanics and Materials
Vols. 433-435
Vols. 433-435
Applied Mechanics and Materials
Vol. 432
Vol. 432
Applied Mechanics and Materials
Vol. 431
Vol. 431
Applied Mechanics and Materials
Vol. 430
Vol. 430
Applied Mechanics and Materials
Vols. 427-429
Vols. 427-429
Applied Mechanics and Materials
Vols. 423-426
Vols. 423-426
Applied Mechanics and Materials
Vol. 422
Vol. 422
Applied Mechanics and Materials
Vol. 421
Vol. 421
Applied Mechanics and Materials
Vol. 420
Vol. 420
Applied Mechanics and Materials
Vol. 419
Vol. 419
Applied Mechanics and Materials
Vol. 418
Vol. 418
Applied Mechanics and Materials Vols. 427-429
Paper Title Page
Abstract: Using the internet to provide learning exchange services for students has become a need now. This paper introduces the frame structure and the main functions of each module of the campus online learning system with a three-layered B/S structure based on .NET and Microsoft SQL Server 2000, and lays stress on implementing the course management and courseware management of the system.
2874
Abstract: Broadband trunking communication system is a specialized command and scheduling system for mobile communication, which has characteristics such as resources and costs sharing, high-efficient command and scheduling capability and so on. This paper firstly describes the evolution of broadband trunking communication. Based on the study of the system architecture and existing technologies, this paper proposes a way of simplifying the system architecture and elaborates the system framework into four modules including scheduler, server, base station and terminal. In the end, a program of broadband trunking communication server subsystem is designed and realized for voice service based on Linux platform. The results demonstrate the program has advantages of low-delay and high-efficient scheduling capability.
2878
Abstract: Many complex networks display a surprising degree of tolerance against error comes at a high price in that these networks are extremely vulnerable to attacks (that is , to the removal of a few nodes that play a vital role in the networks). Complex peer-to-peer overlay networks display a surprising degree of robustness: although some components regularly malfunction, local failures rarely lead to the loss of the information carrying ability of the network. The stability of these and other complex systems is often attributed to the redundant wiring of the functional web defined by the systems components. In this paper a model of peer-to-peer overlay is presented based on the actual topology. According to the model it is found that such error tolerance and attack vulnerability are generic properties of peer-to-peer overlay.
2884
Abstract: With the rapid development of Internet technology, traditional marketing has been faced new challenges and opportunities. There is a hot spot that how to modernize traditional marketing and online marketing optimization has been focused by enterprise at present. First, the entity marketing theory is analyzed in the paper. On its basis, then, the study collects the modern network marketing classic theory, to construct entity marketing and network marketing as a model by applying the idea of mathematical modeling. Based on multivariate linear regression analysis method, the advantage of the model in the practical marketing has been deepening. Finally, you can conclude that the integration of entity marketing and network marketing can better promote consumption and bring returns for enterprise. It can provide realistic basis to develop marketing strategies for the enterprises.
2888
Abstract: With the development of science and technology, especially the continuously upgrading computer technology , universities appeares large quantities of scrap phenomenon,because of the computer's poor performance. In the scrap computer process, the resources waste phenomenon is more and more serious. Poor performance is not equal to scrap that cant be used, reasonable allocation can realize the waste computer resources being reused. This paper mainly use fuzzy evaluation method to have a deep analysis and study on the reason of resources waste in the process of universities scrap computer, and puts forward some suggestions and measures.
2893
Abstract: As a result of government's macroeconomic regulation, some regions of China have suffering financial disturbance,which makes some small enterprises close down because of capital chain rupture.The guarantee industry is an part of the construction of social credit system, and its survival and development are a very serious challenge now.Medium-sized enterprise security crisis which happened over the past two years in Zhejiang province is overall analyzed in this paper.This paper digs out its internal factors which mainly reflect in two aspects,and analyzes two primary causes why security crisis happens by using mathematical model.And it puts forward corresponding measures to solve the credit risks in order to provide feasible suggestions for ensuring the safety guarantee.
2898
Abstract: In recent years, the mobile GIS applications have been developed fast and are still in great demand with the popularity of smart phones. For the diversity of network analysis, this paper puts forward an universal algorithm for path planning based on the thoughts of heuristic A* algorithm to support customization of target rule, weight rule and result rule. It aims at finding a path planning algorithm applicable to most mobile GIS network analysis.
2903
Abstract: In recent years, with WiFi technology development, the manufacturing costs of related products continue to drop, personal computers with WiFi function and the popularization of other WiFi terminal were expanded. Especially in the higher education institutions, based on traditional cable connection network access, and because it has limited by access position and access condition, at present has been difficult to meet the teachers and students demand to high quality study, work, and the living conditions. On the contrary, the wireless network with its flexible and efficient ,free to move characteristics, favor by the of teachers and students, become the mainstream direction of the modern campus network construction, the application in campus dormitory management system on WiFi technology.It will be helpful to speed up our countrys sustained and rapid development in constructing educational informationization.
2908
Abstract: In this paper we discuss one kind of nonhomogeneous (H,Q) processes, Nonhomogeneous Semi-Markov Process. We get the distributions and moments of the first entrance time for this process. And furthermore, we obtain their recursive formula.
2913
Abstract: This study uses data from 173 respondents in 29 groups to provide evidence that when members locate in peripheral position in intragroup network, leader-member-tie is more positively associated with job performance. The relationship is even stronger for peripheral members in advice network.
2917