Applied Mechanics and Materials
Vol. 538
Vol. 538
Applied Mechanics and Materials
Vols. 536-537
Vols. 536-537
Applied Mechanics and Materials
Vol. 535
Vol. 535
Applied Mechanics and Materials
Vol. 534
Vol. 534
Applied Mechanics and Materials
Vol. 533
Vol. 533
Applied Mechanics and Materials
Vol. 532
Vol. 532
Applied Mechanics and Materials
Vols. 530-531
Vols. 530-531
Applied Mechanics and Materials
Vol. 529
Vol. 529
Applied Mechanics and Materials
Vol. 528
Vol. 528
Applied Mechanics and Materials
Vol. 527
Vol. 527
Applied Mechanics and Materials
Vol. 526
Vol. 526
Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials Vols. 530-531
Paper Title Page
Abstract: Wus method is one of the effective methods for solving large-scale polynomial equation systems in algebraic cryptanalysis. But it will take a lot of time to solve polynomial equations with a serial algorithm of Wu’s method. In order to eliminate the bottleneck of computing time overheads, we proposes an efficient data parallelization scheme based on Wu‘s method. And a load balance mechanism applied to our scheme, which greatly improves computing-performance of Wu’s method and enhances its ability to meet challenges of algebraic cryptanalysis.
641
Abstract: To dynamically discover network attacks hidden in network data, an intelligent detection method for network security is proposed. Biological immune principles and mechanisms are adopted to judge whether network data contain illegal network packets. Signature library of network attacks and section library of attack signatures are constructed. They store attack signatures and signature sections, respectively. They are used to make the initial detection ability of proposed method. Detectors are defined to simulate immune cells. They evolve dynamically to adapt the network security. Signatures of network data are extracted from IP packets. Detectors match network data's signatures which mean some attacks. Warning information is formed and sent to network administrators according to recognized attacks.
646
Abstract: Since the concept of cloud computing was proposed in 2006, cloud computing has been considered as the technology that probably drives the next-generation Internet revolution and rapidly becomes the hottest topic in the field of IT. The paper synthetically introduces cloud computing techniques, including the currently non-uniform definition and the characteristics of cloud computing; The paper also introduces the core techniques of cloud computing, such as data management techniques, data storage techniques, programming model and virtualization techniques. Then the 4-tie overall technique framework of general cloud computing is talked about. Finally, the paper talks about the obstacles and opportunities.
650
Abstract: With the development of Internet technology and communication technology, traditional base station has been unable to meet the demand for high data services. In view of this, we propose the system core with Samsung S3C2440X processor constructs smart home hardware platform and using ADI ADF4602 single-chip, multiband 3G Femtocell transceiver to establish 3G home base stations, designed and realized an embedded gateway server through the house gateway to realize the family appliance equipment remote monitoring. Of software design, focusing on smart home control system, transplantation of embedded operating system uClinux to manage system resources, constructed a complete family gateway hardware and software platform, which can reduce the load of Microcell, improve the whole network capacity, and provide high-speed and high-quality indoor wireless access services.
662
Abstract: In order to ensure that the cloud platform client runtime kernel virtual machine security, this paper proposes a new framework for dynamic monitoring of virtual machines, it is for the kernel rootkit attacks, study the cloud client virtual machine operating system kernel safety, presented Hyperchk virtual machine dynamic monitoring framework. This framework mainly for kernel rootkit attacks, ensure that customers running virtual machine kernel security.
667
Abstract: Network attacks, either in aggressive or silent way, are main threat to network security. Modern network environment normally involves multiple domains, and there are connections between them, so an adversary can impact the important network domain via attacking a normal one. When the threat is found in one domain, there isnt a mean to identify how large scale this threat has spread, and there isnt an effective method to mediate such threat. This paper focused on detecting the real topology of multi-domain network and proposed a cooperative method to mediate the threat propagation. The network topology is identified by tracing the propagation of designed benign worm, and the cooperative method is based on novelly collaborating local firewalls on hosts. Performance evaluation is given at the end of this paper to demonstrate the feasibility and effectiveness of the proposed measure.
671
Abstract: Current domestic study on cloud service and library is still relatively weak and it needs all to be promoted whether from the research system to see or to see the depth of research. On the view of current domestic research, it is mainly reflect in the following three points. First, there have fifty published academic theses. Second, the main focus of research are still focused on the cloud platform and cloud service model. Third, the related research and disciplinary platform are still relatively narrow.
677
Abstract: A new description method of protocol structure is presented by base-function firstly. Then, a protocol analysis method base on it is proposed. To analyses the private protocols, a new self-learning algorithm is discussed. Finally, the flow of protocol analysis based on base-function is given. Experiment results show the efficiency of presented method.
682
Abstract: Algorithm and characteristics of CRC were investigated, and a pipeline algorithm steps to achieve it was introduced. The Modbus protocol RTU mode with CRC-16 was developed based on LabView using two methods, embedded c statements and graphical language based on LabView2012. The programs developed were verified in a serial communication system consist of infrared temperature robe and IPC. The successful embodies the reliability and the high efficiency of CRC, provides examples of a specific CRC-16 check.
686
Abstract: This paper begins with analyzing the characteristics of metro project construction, creatively puts forward building a metro project management system by using the existing 4G network. It gives the structure diagram and function chart of metro project management system based on the 4G network as well as illustrating the implementation methods of important functions and key technologies.
690