Applied Mechanics and Materials
Vol. 493
Vol. 493
Applied Mechanics and Materials
Vol. 492
Vol. 492
Applied Mechanics and Materials
Vols. 490-491
Vols. 490-491
Applied Mechanics and Materials
Vols. 488-489
Vols. 488-489
Applied Mechanics and Materials
Vol. 487
Vol. 487
Applied Mechanics and Materials
Vol. 486
Vol. 486
Applied Mechanics and Materials
Vols. 484-485
Vols. 484-485
Applied Mechanics and Materials
Vol. 483
Vol. 483
Applied Mechanics and Materials
Vol. 482
Vol. 482
Applied Mechanics and Materials
Vol. 481
Vol. 481
Applied Mechanics and Materials
Vols. 479-480
Vols. 479-480
Applied Mechanics and Materials
Vols. 477-478
Vols. 477-478
Applied Mechanics and Materials
Vols. 475-476
Vols. 475-476
Applied Mechanics and Materials Vols. 484-485
Paper Title Page
Abstract: The increasing ability of emergency management practices is highly dependent on information technology; this paper introduces the video conferencing system for emergency management practice has various advantages. For the current video coding in a large number of technical standards for network messaging limitations, this paper analyzes H.264 video compression coding unique advantages and technical standards. Based on our current status of the emergency information network construction, it proposed in H.264 video coding standard video conferencing systems to improve and enhance the government's ability to respond to emergency management.
866
Abstract: With the continuous development of network applications, the new network structure emerging. To solve the interconnection of heterogeneous computer networks is essential, real-time network traffic is the current focus of the study of computer network. Articles focus on these two aspects of the problem and put forward a thought of heterogeneous network with the structure, in the network-level and application-level implementation of a heterogeneous network interfaces isomorphism. We discusses the implementation of real-time communication network principle and method based on the client / server model, gives a heterogeneous network to solve the problem of real-time communication process model, programs and implementation framework.
871
Abstract: Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt files matrix transformation. Article presents a matrix-based electronic document encryption and decryption algorithm, which relies on a special class of matrices combinatorial problems, the method to improve the security of electronic document system is feasible and effective, and finally give the source code and programming software.
876
Abstract: The study of the logistics system mode based on the city construction is mainly according to the concrete characteristics of the logistics operation, to sum up the characteristics of the logistics system in the area of the set of the logistics information system, which aims to design a reasonable response model framework of the logistics system. This research is mainly based on the research on the GPS system, and deepening the logistics information system is to design and construct the function combination of the countermeasures of the logistics information technology, which is to design a complete system framework of the working state. In addition to the related GIS technology, and the implementation of the monitoring and the control of the logistics information system, and the implementation of the navigation guidance in a reasonable range, provide the reference for the construction plan of the whole system, which lays a theoretical foundation for the healthy and effective operation of the countermeasures of the logistics information technology.
881
Abstract: Using the method of establishing land resources geographic database, combined with the actual situation of cultural tourism resources of Mt. Lu scenic area, this paper explored the construction of Mt. Lu Cultural Tourism Resources Geographic Database based on MapGIS. Describes the method and process of the construction of Mount Lu Cultural Tourism Resources Geographic Database Based on MapGIS according to the characteristic of MapGIS, and discussed its application value.
885
Abstract: through the design of teaching aerobics web-based course and application practice, the instructional design process based on B/S learning are analyzed, and discusses several key problems in the design and teaching. This paper presents the resource based learning aerobics teaching design network course should adapt to the application mode of network teaching and traditional classroom combination; that will provide teaching demonstration, teaching contents for students as well as the function of self-testing evaluation and provide the job management, teacher online Q & A, database and knowledge base construction, greatly improving the "aerobics" teaching efficiency.
891
Abstract: Traffic flow sampled data is noisy and chaotic time series. Complex noise component affects the traffic flow predictability. In this paper,it used multi-scale noise reduction based on wavelet/wavelet packet to shield the traffic flow’s noise components interference in deterministic component.It aimed at the contradiction between similarity and predictability in traffic flow noise reduction process, then proposed multi-state threshold method. Experimental results show that, compare with the traditional threshold value method, the threshold method can more effectively extract the traffic flow’s effective information. This method not only made traffic flow which is reduced noise higher goodness of fit, and the prediction accuracy is higher than the traditional threshold methods, thereby we can significantly enhance prediction performance.
896
Abstract: In this article we extend the application of ISCSI protocol to the data storage field of mobile device. First of all, we describe the implement principles and advantages of ISCSI protocol, and discuss the problems and solutions in the design. Then we implement the interface design based on the Android platform, port the ISCSI kernel-mode module, and design the ISCSI communication interface for multiple layers of Adroid system. After that we propose a local cache policy based on the linear mapping method of Device mapper. At last, we analyze the impact of the cache policy on the improvement of system performance according to the experiment results. In a word, we supply a feasible storage solution to solve the problem that there is not enough storage capacity in the mobile device and satisfy the instant accesses from users.
902
Abstract: The construction of object 3-dimensional image is the thinking base of machine learning, it is important to machine recognize the outside world. The current algorithms of object 3-dimensional image construction are mainly based on the least squares method (LSM) in linear or nonlinear models, all of them existed some defects and deficiencies. The paper introduced the construction principle of 3-dimensional image by support vector machine, then the algorithm and step was put forward, as well as the key code in the Matlab7.4.
907
Abstract: Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields,while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first analyzes the current security mechanisms of Hadoop,then through study of Hadoop's security mechanism and analysis of security risk in its current version,proposes a corresponding solution based on secure multicast to resovle the security risks. All these could provide certain technical supports for the enterprises in their Hadoop applications with new security needs.
912