Applied Mechanics and Materials
Vol. 456
Vol. 456
Applied Mechanics and Materials
Vol. 455
Vol. 455
Applied Mechanics and Materials
Vol. 454
Vol. 454
Applied Mechanics and Materials
Vols. 448-453
Vols. 448-453
Applied Mechanics and Materials
Vols. 446-447
Vols. 446-447
Applied Mechanics and Materials
Vols. 444-445
Vols. 444-445
Applied Mechanics and Materials
Vol. 443
Vol. 443
Applied Mechanics and Materials
Vol. 442
Vol. 442
Applied Mechanics and Materials
Vol. 441
Vol. 441
Applied Mechanics and Materials
Vol. 440
Vol. 440
Applied Mechanics and Materials
Vols. 438-439
Vols. 438-439
Applied Mechanics and Materials
Vol. 437
Vol. 437
Applied Mechanics and Materials
Vol. 436
Vol. 436
Applied Mechanics and Materials Vol. 443
Paper Title Page
Abstract: Network security situation awareness model is the research basis in network security situation awareness. Through building this model, we can measure the relationships among system components and that between the components and environments. We put forward the conceptual model of network security situation awareness, and establish the model of current network security situation evaluation and future network security situation prediction.
499
Abstract: As social networking services, social network covers all the networking service form which regards human social as the core, obtains user behavior feature by situational awareness and finds potential social relations. By analyzing the application and system structure of context-aware technology, this paper proposed a mobile P2P social network system based on LTE network and its Algorithm and realized the structure of the mobile P2P social network system based on context-aware.
504
Abstract: Based on the complex network property of wireless sensor networks, this study focus on the topology of wireless sensor network and carry out series simulation according to complex network research methods. The characteristic of topology for the wireless sensor network is probed in the experiment. The degree distribution, clustering coefficient and average path length are analyzed during the experimental process. Our results verify that the topology of wireless sensor network is neither regular nor random. It is between random network and small-world network which has comparatively smaller average path length and bigger cluster coefficient. In order to form a network that is similar to the property of small-world network, which can reduce network energy consumption by decrease the average hops, our experiment constructs a network model which has significant small-world network characteristic. The results indicate that the added small sum of long range edges in the network will not increase the network load while it can reduce the energy consumption of the network effectively.
509
Abstract: in order to improve the performance of lte system using mimo technology, we proposed an algorithm for lte mimo system based on the transmitting time delay. This algorithm can improve the throughput of mimo lte system. One access point can support more clients at the same time by using this method. A two antennas' base station may support 3 users simultaneously by using this algorithm to access the lte network. Moreover, it is easer for lte network to select pairing users for v-mimo system.
513
Abstract: The computer network security system is the basic condition to ensure the users to operate the computer safely. It is as well an important content of the development and research for the network system. Analyzing from the perspective of the operation effects of the traditional networking security system, there are still quite apparent shortages in the structure composition. It has not only caused the increase of the research and development costs of the system, but also has brought a great deal of inconveniences for the users to operate the system. In order to meet the requirements for high-performance system of the users, it is of great importance to carry out the optimization improvement on the structures of the computer network security system. Focusing on this point, this paper has explored on the shortages of the traditional computer network security system. In addition to this, it has brought out an effective optimization scheme for the structure.
517
Abstract: Energy Conservation has been the focus in the ad hoc wireless network study. As the capacity of battery is limited, node will lose its function once its energy is exhausted. This thesis is aiming to calculate among the multiple transmission paths and find out a path which consumes the least energy. Previous studies are focused on finding the minimum hop path in transmission. In this study we propose to use the square of the distance between nodes as a proxy to the power consumption as the transmission power is proportional to the square of the distance between the nodes. We simulate the node transmission by limiting node out-degree in broadcasting and calculate the minimum sum of the square of distance between nodes in the path to find a path which has the least energy consumption.
521
Abstract: Manufacturing execution system is the software system that is used most widely for manufacturing enterprises to realize informatization. In order to solve the problem of distributed heterogeneous environment, MES introduces the concept of middleware. It is in the middle of the operation system software and MES and above the operation system, network and database and below the MES. It helps the software developers to flexibly and high effectively develop and integrate complicated all modules in MES as well as complicated application and communications in enterprises. This design adopts two kinds of middleware. The first kind is Message Oriented Middleware (MOM). Message Oriented Middleware hides the details of interaction between all kinds of machine equipment and MES data under the unified data specifications. It makes in-time, high-efficient and stable data transmission as well as easily copes with the complicated production environment. The second kind is common transaction processing middleware. It enclosures the details of transaction processing and offers a stable transaction platform, enabling the developers to pay attention to the development of business logic. It ensures the development qualities and the development costs.
526
Abstract: Along with the continuous development of computer technology, the embedded system, as one of the most important computer applications, has been more and more widely used in the world. In this paper, the embedded system is briefly introduced, and also the application of the embedded system to software development is analyzed and expounded.
531
Abstract: There are usually energy holes caused by uneven energy consumption of transferring data in Cognitive Radio Ad Hoc Network (CRANH), which brings about many difficulties in various applications, as limit the network lifetime. To solve this problem, the major idea so far is based on the real-time routing mechanism. However, the method needs to cost extra energy for be routed again after transferring data, it can decrease network surviving lifetime. Hence, a self-adaptive power adjustment routing mechanism for Cognitive Radio Ad Hoc Network proposed in this paper. The algorithm can be minimum of network energy consumption of transferring data based on self-adaptive power adjustment technique can find different neighbor set to meet different power thresholds. Theoretically and experimentally, it is concluded that the proposed algorithm is able to decrease energy consumption and improve the network lifetime of CRANH.
535
Abstract: Ant colony algorithm is an effective algorithm to solve combinatorial optimization problems, it has many good features, and there are also some disadvantages. In this paper, through research on ant colony optimization algorithm, apply it in intrusion detection. Then it gives an improved ant colony optimization algorithm. Tests show that the algorithm improves the efficiency of intrusion detection, reduces false positives of intrusion detection.
541