Applied Mechanics and Materials
Vol. 554
Vol. 554
Applied Mechanics and Materials
Vol. 553
Vol. 553
Applied Mechanics and Materials
Vol. 552
Vol. 552
Applied Mechanics and Materials
Vol. 551
Vol. 551
Applied Mechanics and Materials
Vol. 550
Vol. 550
Applied Mechanics and Materials
Vols. 548-549
Vols. 548-549
Applied Mechanics and Materials
Vols. 543-547
Vols. 543-547
Applied Mechanics and Materials
Vols. 541-542
Vols. 541-542
Applied Mechanics and Materials
Vol. 540
Vol. 540
Applied Mechanics and Materials
Vol. 539
Vol. 539
Applied Mechanics and Materials
Vol. 538
Vol. 538
Applied Mechanics and Materials
Vols. 536-537
Vols. 536-537
Applied Mechanics and Materials
Vol. 535
Vol. 535
Applied Mechanics and Materials Vols. 543-547
Paper Title Page
Abstract: E-commerce website with distributed architecture can deal with millions consumers to access and read and write at the same time. In this paper a new distributed network architecture designed for e-commerce website is proposed. Resource allocation and scheduling of the distributed architecture is discussed. Experiments show that the new architecture features a more quick and high response, and provide a kind of method for improving and perfecting the computing at the same time, filling the needs of producing.
3000
Abstract: Against the problems of privacy leakage from the graph of workflow structure of the government affair OA systems, the paper puts forwards a privacy preserving model which is effective in the protection of degrees and workflow amounts of the nodes in the government business workflow graph. For further implementation, it proposes a new unified anonymization algorithm oriented the actual nodes in the workflow graph based on the ides of social network anonymization and a new method of random weights disturbing to prevent the important nodes in the graph from being recognized by attackers and protect the information of workflow amount in the government and public institutions. At the end of this paper, the model has been verified by two experimentations that proves its feasibility and usability.
3004
Abstract: Service-oriented computing is a novel computing paradigm that utilizes simple small-scale services as fundamental elements to orchestrate applications that are complex large-scale services, while traditional software development methods and running environment are insufficient to support the challenges required by dynamic services binding and service reuse. We concentrate on service-oriented programming, and propose a mutable pragmatic and effective automated code generation framework for service dynamic binding. Service-oriented applications are developed in a unified and coordinated way, and the additional codes are generated automatically to invoke diverse services developed by distinct technologies. Service dynamic binding is achieved by filtering from a set of candidate services through the execution engine.
3009
Abstract: In this paper, the authors employ the multi-queue single-server system for information packets to calculate the theoretical value and computer simulation in the Bi-directional cable TV network. 3-queues single server polling system is used for example in the paper. And the simulation results show that the theoretical analysis and computer simulation are consistent.
3013
Abstract: Tiny autonomous embedded electronics (sensor nodes) devices able to communicate through wireless channels are ensuring the emission and reception of data through a communication radio between two sensors grouped by hundreds and thousands within Wireless Sensor Networks (WSNs). These amazing new technology with ongoing research worldwide, are merging networking, systems hardware, systems software and programming methodologies thus enabling applications that previously were not practical. Hence numerical simulations on computers can now visualize the physical world phenomena that could be observed through empirical means, as sensors are deployed in a dedicated environment, to fulfill their aim of sensing for any occurrence of the event of interest. The data sensed by these wireless sensors are now very sensitive, thus need to be fully protected by all means, which is why T. D. Engouang et al., argued that security and reliability and also durability are mandatory when deploying any sensor nodes or hard device. The Pallier based homomorphic encryption data aggregation is proposed with security measures preserving data integrity and privacy.
3017
Abstract: Active defense technology may predict future attack situation and detect unknown attacks, but it has many questions to will be researched: vulnerability, lower mal-ware detection rate, security situation awareness technology has faced problem of inter-organization cooperation, real-time response, correlation analysis, high-load low fault tolerance. Artificial immune technology combines with active defense technology to solve integrated artificial immune security situation awareness system with artificial immune technology and active defense technology by Black Hole theory and for diversification ad development characteristics of the artificial immune and active defense, gives a method about simulating Black Hole accretion theory to achieve absorption and utilization a variety of security and virus technology; a no escaped mechanism simulate the Black Hole; a method about access control method based on Hawking radiation theory. Based on the above work, applies virtual and sandbox technology to achieve network system itself virus immunity, and then that we implement re-engineering and reverse engineering for virus technology in order to study virus and dig more holes, create unified integrated defense tactics, so this defense system will improve ability of situation comprehension, situation prediction and intelligence decision.
3023
Abstract: When developing a project about big games or the large virtual simulation, the modeling of sky is a pivotal part, in order to effectively reflect the authenticity of the scene. However, because of the demand of updating data in a large quantity real-time, the theme is always a difficult problem to be researched that the ordinary simulation cannot satisfy. According to the researching theme, the paper puts forward a method which replace the required texture of the sky model in real time. The approach is not only meet the simulation on computers of low configuration, but also reflects the authenticity of the virtual scene better.
3029
Abstract: The fair distribution of bandwidth among different flows is an important research issue in the differentiated services architecture. In this paper FATM (a fair aggregate traffic marker) is proposed to provide the fairness among aggregate flows. FATM guarantees the fairness among the aggregate traffic flows by considering CIR of an aggregate traffic, and also considers maintaining estimated arrival rate for each flow within an aggregate at the boundary router.
3033
Abstract: U.S. put forward the protocol standard of 3G generation HF communication, which emphasizes HF network automation degree and interconnection capacity between HF and other network to support a larger network application. HF in the form of access network and the integration of existing IP network should be able to get rid of the island model of traditional HF communication of point to point and self-managed,self-used. give full play to the HF over-the-horizon transmission and strong anti-damage ability of their own advantages and efficient multiple IP network data transmission service ability, provide a wider range of communication for cable users, provide efficient management for wireless subscribers.Compared with the traditional HF communication mode. HF network achieve efficient planning, management and control through the integrated network management system based on IP. Enhanced the network management and control ability as well as anti-damage and anti-disturbance ability.
3036
Abstract: To facilitate research into IPv6 protocol, we propose IPMT in this paper, an IPv6 packet manipulation tool that allows rapid encode and decapsulation of IPv6 frames. IPMT offers capabilities of IPv6 packet manipulation, such as packet encapsulation, packet decapsulation, and packet trace. We mainly focus on IPv6 protocols because most popular network tools that are currently used don't support IPv6. We describe the main features of IPMT and demonstrate how the IPMT programming class enables users to easily develop portable IPv6 packet analysis tools without needing to consider the details of the capture format, file compression or intermediate protocol headers. Unlike other popular network tools, IPMT can almost decode all layers all at once. We divide IPMT into two modules and implement the tool and test the tool in a real test scenario to show that the tool works well. At the same time, we design a versatile way of storing decoding information result. As a result, we conclude that IPMT is a valuable contribution to the passive measurement community that will aid the development of better and more reliable IPv6 analysis and network monitoring tools.
3040