Applied Mechanics and Materials
Vol. 538
Vol. 538
Applied Mechanics and Materials
Vols. 536-537
Vols. 536-537
Applied Mechanics and Materials
Vol. 535
Vol. 535
Applied Mechanics and Materials
Vol. 534
Vol. 534
Applied Mechanics and Materials
Vol. 533
Vol. 533
Applied Mechanics and Materials
Vol. 532
Vol. 532
Applied Mechanics and Materials
Vols. 530-531
Vols. 530-531
Applied Mechanics and Materials
Vol. 529
Vol. 529
Applied Mechanics and Materials
Vol. 528
Vol. 528
Applied Mechanics and Materials
Vol. 527
Vol. 527
Applied Mechanics and Materials
Vol. 526
Vol. 526
Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials Vols. 530-531
Paper Title Page
Abstract: Through the research of virtualization and cloud computing platform, the thesis is aimed at the problem of autonomous learning system and propose the solutions. This is the starting point in the application of the technology of cloud computing, and for further research on the construction of digital campus is based on cloud computing technology laid the foundation. This system has been completed the demonstration in the virtual cloud platform programming with Java combined with HBase .
696
Abstract: Social network is a collection of interrelated social actors, including individuals, groups, organizations, enterprises, even countries, is playing more and more important role in our life. But there are a lot of individual information in social network, it would violate individual privacy when publishing and analyzing the information. To avoid privacy disclosure and prevent privacy attacks, some k-anonymity privacy protection methods of social network are presented. In this paper, we represent the models of anonymization in social network and its key points, including definition, attack, and usefulness. We compared the difference among the proposed anonymization methods and techniques of privacy preserving in social networks. Finally, potential challenges in social network are proposed.
701
Abstract: This paper first engine starting defense from Intrusion Detection, Intrusion detection engine analyzes the hardware platform, the overall structure of the technology and the design of the overall structure of the plug, which on the whole structure from intrusion defense systems were designed; then described in detail improved DDOS attack detection algorithm design thesis, and the design of anomaly detection algorithms.
705
Abstract: With the promotion and popularity of smart-phone, the technology of short-range wireless communications is maturing with each passing day. The situation where communications is based on the services provided by ISP is changing. By using the smart phone as a carrier, this paper discusses how to design a flexible and handy solution of the services of community communication, based on the Ad Hoc network architecture. On the basis of the infrastructure and the function modules of the mobile community, this paper proposes the method to achieve the key modules. Experimental result shows that the proposed solution of mobile community can meet the demands of the short range of the communication system.
709
Abstract: Global satellite positioning technology has been applied to transport, mapping, security, agriculture, forestry and other fields. In this study, we summarized the application of satellite positioning technology in forestry, pointed out issues of low signal amplitude, and low accuracy of positioning in practical application. This paper introduced the theories of several commonly used assist positioning technologies, such as, Wi-Fi positioning, wireless sensor network positioning and inertial navigation, analyzed its application in forestry base on its characteristics of these positioning technologies, then proposed the technical method of the combining positioning. Designed the locating scheme of forestry based on nature reserve patrol business, and briefly introduced its basic theories. In this study, we analyzed the feasibility of the application of wireless positioning in forestry by control variables and regression analysis.
715
Abstract: This paper designs a VMF interoperation solution framework, and proposes an automatic generation method for VMF codecs, VMF-FMF translation unit and VMF-HLA gateway based on VMF data element dictionary, FMF data element dictionary and FOM table. The generated VMF codecs can be distributed to ensure the interoperation between C2 systems using VMF standard; The VMF-FMF translation unit can be used to ensure the interoperation between C2 systems using VMF standard and those using FMF standard; The VMF-HLA gateway can be deployed in simulation systems to ensure the interoperation between these systems and C2 systems. The proposed method also enables these generated utilities fast incorporation of the up-to-date information of the VMF Standard, FMF standard and FOM table.
724
Abstract: This paper gives a theoretical basis principle and structure of OFDM. The O-OFDM has three parts including transmitter, receiver and fiber. The main and key component is IFFT and FFT block. And then a basic direct detection optical-OFDM system (DO-OFDM) is designed and simulated by the software Optisystem. The performance of the system is viewed by the visualizer of the software compared to the RZ, OFDM and QAM modulation system. The result shows that the OFDM system is better than conventional serial modulation schemes like RZ, QAM.
729
Abstract: This paper provided a method and implementation technique about massive amount of data information transmission based on a variety of problems of the UDP communication in poor network. We provided a method based on several deficiencies of traditional method, which could remove the task that would keep the data package transmission in the correct order to receiver in order to reduce the communication burden and improve the stability and efficiency of transmission. A large number of actual tests proved that the improve protocol can transmit the massive amount of data information good although the network speed is below 10K/S which showed the practical value.
734
Abstract: This paper proposes and analyzes load balancing control in which numbers of sensors randomly join the original network. Sensors are better suited according to some metrics than arbitrary accessing. Analytic performance results are made in terms of message complexity, link changes and delay. Specially, we discussed the link assignment in dynamic network which is caused adjustment. In load balancing control, sensors are selected based on transmission queue and children number. Results indicate that with observed metrics contributes to better performance.
739
Abstract: With EDI, Internet, e-commerce and other key technologies, the application process can be divided into three stages: data processing stage represented by EDI, rapid popularization stage brought by Internet and diversified stage with e-commerce. The commercial activities in China has widely used information to strengthen competition to a certain degree. Enterprises of different industries, types and scale vary greatly in application of ICTs. From the perspective of application method, the current situation of application of ICTs by commercial enterprises in China is characterized by high network application and popularization rate, emerging of e-commerce enterprises and wide application of information system software. The e-commerce development in China obviously centralizes in Beijing-Tianjin-Hebei Region, Jiangsu-Zhejiang-Shanghai Region and Pearl River Delta as well as Shandong Peninsula and Cheng-Yu area to a certain degree.
743