Applied Mechanics and Materials Vols. 511-512

Paper Title Page

Abstract: This paper gives out a novel way, TCFI4J, to enforce the control flow integrity to the Java applications based on Java virtual machine. TCFI4J combines the trusted computing technology and Java virtual machine together. It takes full advantage of the Trusted Platform Module (TPM) and gives full consideration to the memory organization of the JVM. TCFI4J takes the integrity of part of JVMs memory image into account for the control flow integrity enforcement. The method presented in this paper can provide the user information about an applications behavior. It can significantly improve the security of a Java application with a tolerable performance impact.
1219
Abstract: This paper proposes an intelligent lighting control system based on CAN. Compared with the traditional lighting control system, it overcomes the effect of relatively scattered control and disadvantages of poor management, poor real-time and low degree of automation. In explaining the overall design of intelligent lighting system framework and communication protocols based on CAN bus communication, it analyzes the real time capability and puts forward the optimization scheme. It also proposes an implementation of SJA1000 CAN communication modules to achieve application to intelligent lighting system.
1225
Abstract: MPLS L2VPN is used to transparently pass users’ L2 data through MPLS network, with the common implementation model of Martini L2VPN by using LDP as the signaling. In spite of its wide application, the configuration of its capacity expansion is cumbersome and the cross-domain problem is insolvable. Therefore, based on the label swapping technology of MPLS, this paper adopts kompella-based approach for L2VPN implementation and mainly focuses on packet forwarding and controlling. Firstly, it does not make direct CE connections, but partitions different VPN in the whole SP (Service Provider) and gives serial numbers of CE within the VPN. Moreover, it also establishes the VC (virtual circuit) channel between the two PE and uses label distribution and calculation for mutual information. In this respect, it can not only provide effective supports for capacity expansion, but also solves the cross-domain problem.
1230
Abstract: In this paper, by using the energyequation method, the 2D g-Navier-Stokes equations with linear dampness on some unbounded domains wereinvestigated without the restriction of the forcing term belongingto some weighted Sobolev space. Moreover,the estimation of theHausdorff and Fractal dimensions of such attractors were alsoobtained.
1235
Abstract: This study is comprised of three main problems. Firstly, a supply chain risk defense problem (SCRDP) is proposed. Then, the study considers a facility location problem in the presence of random facility disruptions where the facilities can be defensed with additional investments. It is formulated as a mixed integer programming model. Finally, a case shows a location solution which designs how to distribute the hardened and non-hardened facilities.
1239
Abstract: As information technology continues to develop, smart mobile terminal has become the electronic equipment most closely with people life and work. Meanwhile, the security threats are also increasing to smart mobile terminal when it conducts the business application. Based on the analysis of security assessment architecture for smart mobile terminals, the security risk assessment model for smart mobile terminals is proposed in this paper. The security of smart mobile terminals can be assessed based on the proposed security risk assessment model well.
1244

Showing 241 to 246 of 246 Paper Titles