Applied Mechanics and Materials Vols. 543-547

Paper Title Page

Abstract: Accompanying the development of the computer technology and network technology, the sharing of teaching resources is achieved by exploiting the network resources in most schools. The traditional network model for the sharing of teaching resources is likely to result in information island, that result in links among the islands not smooth, it is also difficult to achieve the needs of users. So research approach of the teaching resource sharing system based on cloud computing is given in this paper. The design of this approach combines cloud computing and web development technology, makes full use of the characteristics of cloud computing, and reaches the purpose of the elimination of the information island.
3316
Abstract: NDN (Named Data Networking) is clean-slate architecture for future networking, in which packets carry data names rather than source or destination addresses, being a sharp contrast to today IP architecture. The default routing strategy for NDN is flooding the interest packets to all the possible interfaces which could reach for the data provider or data cache container. Obviously, the default routing strategy is not best way in the actual networking for the heavy load of routing items. This article proposes an interface rank-based routing strategy (RBRS), in which the PIT and FIB structures are detailed and expanded to satisfy the Interest and Data packets transmission, and the interfaces are ranked through a cumulative algorithm for route selection. Through the simulation, RBRS has been proved an adaptive routing mechanism with better performance of network load balance, while reducing the average routing hops and the centric nodes load.
3320
Abstract: The Simulation Training Software is a kind of large and complex software systems. Its development requires a clear understanding of desired system features firstly. The development of Simulation Training Software exists many problems, such as deficiency in reuse and development. The feature model has been widely adopted as a domain requirements capturing model by most of the current domain engineering methods. Aiming at these problems, service analysis, function analysis and the behavior analysis are made for this domain. Then the feature model is constructed which includes simulation object management, simulation model driven, running suport platform.. Practice shows that, based on the feature model, the development platform of Simulation Training Software can fit to the most development of electronic equipment simulation training software, and can also get good results.
3324
Abstract: Componentbased development has reusability,maintainability and scalability characteristics. This paper presents a design application components which in the virtual device emulation software development, the definition of virtual device emulation component, betweenclass structural design and component interaction mechanisms of the program in the application of the proposed training system and achieved good results.
3330
Abstract: This paper mainly analyzed the security of TKIP protocol and VPN technology ,the wireless LAN 802.11 and 802.1x/EXP security vulnerabilities: defects of SSID and MAC Address Filtering, defects of User Authentication Method, security vulnerabilities of WEP Algorithm, defects of 802.1x / EAP and RADIUS Authentication, etc. The author put forward improvement authentication and encryption method as improving wireless LAN security measures.
3335
Abstract: The design of test cases plays an important role in GUI software testing. If test cases can be reused effectively, test time can be much reduced. Also, repetitive work can be avoided. Thus the efficiency of testing can be enhanced a lot. In this thesis, according to the characteristics of GUI software, a novel strategy of test cases reuse was proposed, which was proved efficient in practice.
3339
Abstract: In this paper, we analyze and point out several weaknesses in the dynamic ID-based remote user authentication schemes using smart card for multi-server environments, and present the countermeasures to enhance the security of the schemes. Taking Li et al.'s scheme for instance, we demonstrate that their scheme does not provide forward secrecy and key privacy for the session keys, and cannot resist offline password guessing attack. Furthermore, the reasons of these security weaknesses are analyzed through extending the attacks to its predecessors. Finally, the improved ideas of local verification and authenticated Diffie-Hellman key agreement are presented to overcome the weaknesses mentioned above.
3343
Abstract: Whereas it plays the more and more important role in modern living, the level of integration testing on foundational SW&HW(software and hardware) was advanced. On the basis of integration testing content analysis, the basis flow of integration testing was advanced. The environment of integration testing was designed, especially the frame of testing environment on performance. The above research provided reference for standardization of integration testing.
3348
Abstract: To promote large equipment resource sharing, collaborative sharing, utilization and maximize utilization of the instrument, this study uses OGSA grid architecture in all major instruments sharing network on the basis of the existing resources services, application Globus Toolkit establish grid platform, so that large instruments sharing network of compute power resources, storage resources, programs and services such as shared databases.
3352
Abstract: Embedded software gradually tends to be more integrated, modular and complex. The architecture of integrated avionics system software is the typical example. Method for measurement testability of traditional testability analysis model DRR (Domain Range Ratio), due to its reliance on internal information, it is difficult to measure testability for complex embedded software such as IMA. So this article on the basis of the DRR model, it is proposed a model that described internal information of embedded software complex in development phase, Base-Line-Flow Graph, at the same time, we can measure testability index of software through this model. An example of IMA task proved that this method is effective and feasible.
3356

Showing 741 to 750 of 1059 Paper Titles