Applied Mechanics and Materials
Vol. 554
Vol. 554
Applied Mechanics and Materials
Vol. 553
Vol. 553
Applied Mechanics and Materials
Vol. 552
Vol. 552
Applied Mechanics and Materials
Vol. 551
Vol. 551
Applied Mechanics and Materials
Vol. 550
Vol. 550
Applied Mechanics and Materials
Vols. 548-549
Vols. 548-549
Applied Mechanics and Materials
Vols. 543-547
Vols. 543-547
Applied Mechanics and Materials
Vols. 541-542
Vols. 541-542
Applied Mechanics and Materials
Vol. 540
Vol. 540
Applied Mechanics and Materials
Vol. 539
Vol. 539
Applied Mechanics and Materials
Vol. 538
Vol. 538
Applied Mechanics and Materials
Vols. 536-537
Vols. 536-537
Applied Mechanics and Materials
Vol. 535
Vol. 535
Applied Mechanics and Materials Vols. 543-547
Paper Title Page
Abstract: This paper presents a new software test and evaluation process model. Under the new framework, testers involve from requirements analysis, get security requirements through security analysis; build risk profile operation, and gradually thin profile in analysis and design phase; automatically generate test cases from profile by tools and drive test work.
3537
Abstract: In order to improve the utilization of system resources and enhance the network throughput, this paper focuses on the cooperative network coding which combines the advantages of both network coding and cooperative diversity. Both theory and simulation proves that it can provide better performance in BER and NC gain.
3541
Abstract: The monitoring mechanisms of open-source IaaS software OpenNebula and monitoring system Ganglia were analysed. Reduce overload of retrieving resource usage information by deploying the Ganglia monitoring agent. And for improving the robustness of monitoring subsystem, we take measures on the privileged domain of virtualization nodes to hide the agent to prevent regular or malicious users checking, modifying, unloading or killing it. The mechanism is very helpful to enhance the effectiveness, reliability and sturdiness of the monitoring system of IaaS platforms.
3545
Abstract: Cloud computing is an important area of current information technology research, particularly into the era of big data, Platform as a Service (PaaS) has become the industry to explore one of the hot clouds computing. But the function of the composition and architecture of platform services not yet conclusive, the paper on the application of Video monitoring platform through collaborative practice hadoop and PaaS, and proposed a new cloud computing platform Video monitoring solutions, PaaS and various modules under this program function overview. Provides a reference model for the era of big data Hadoop and PaaS collaborative applications.
3549
Abstract: Internet has become as a social infrastructure. The current Internet architecture based on TCP/IP is faced with many challenges. This fact makes the clean slate design of future Internet architecture represented by ICN (Information-Centric Networking) be a hot research topic. In this paper, a novel routing scheme for ICN (Information-Centric Networking) is proposed. On the basis of name-based routing, a process was designed to look for other available interface through which the backtracking-condition-met interest packet will be forwarded, which can reduce the network blocking rate. Moreover, FIB (Forwarding Information Base) of neighbor nodes will be modified when data packets go through a router, which can realize the efficient use of cache. Also, a concept of "popularity" is introduced to improve CS (Content Store) hit rate. The proposed routing scheme is implemented on NSFNET by simulation, and the experimental results have shown that it is feasible and effective.
3555
Abstract: This paper research video stream collected and compressed to H.264 format in video surveillance system, saving as readable video file via network. On the basis of introducing H.264 standard and AVI format, the paper analyzed video data acquisition in the condition of multi-channel and packet losing in network, and proposed the corresponding method. According to the analysis and method, the paper proposed the storage algorithm implementation steps of storing H.264 video stream in AVI format file.
3561
Abstract: To solve the difficult quantify analysis problem in the process of information security risk assessment, on the basis of the original qualitative risk assessment method, the fuzzy analytic hierarchy process is put forward, in order to realize the organic combination of subjective and objective assessment of risk factors. Based on the improvement of the analytic hierarchy process and fuzzy evaluation method, the two methods are organically combined. On the basis of the analysis and assessment of risk probability and impact of the incident, the risk rank of each risk factor is determined, and the information system risk control suggestions are given
3565
Abstract: Cloud computing is the latest trend in IT technical development, the importance of cloud databases has been widely acknowledged. There are numerous data in the cloud database and among these data, much potential and valuable knowledge are implicit. The key point is to discover and pick up the useful knowledge automatically. An association rule is one of the main models in mining out these data, and it mainly focuses on the relationship among different areas in the data. This paper puts forward the basic model of data mining based on association rules in cloud database and introduces corresponding mining algorithms.
3569
Abstract: Cloud computing, networking and other high-end computer data processing technology are the important contents of eleven-five development planning in China. They have developed rapidly in recent years in the field of engineering. In this paper, we combine parallel computing with the collaborative simulation principle, design a cloud computing platform, establish the mathematical model of cloud data processing and parallel computing algorithm, and verify the applicability of algorithm through the numerical simulation. Through numerical calculation, cloud computing platform can be divided into complex grids, and the transmission speed is fast, which is eight times than the finite difference method. The mesh is meticulous, which reaches millions. Convergence error is minimum, only 0.001. The calculation accuracy is up to 98.36%.
3573
Abstract: This paper uses the ORACLE database system and Ballista testing tools to set up the virtual simulation platform of computer network, and to establish the mathematical model and algorithm of network virtual reality. In order to validate the validity and reliability of the designed model and algorithm in this paper, we carry out the numerical simulated experiment with NI cDAQ chassis, four channels data acquisition card and B-PLC network card and other hardware equipments, which has successfully divided the virtual grid of the complex blade, and from the system test, we can find that the hardware system has improved the performance of network transmission, and the quality of network video transmission. Finally, we apply the computer simulation system to the practice platform of network democracy, and introduces the democratic politics video conference and the network democratic political opinion box system in the platform.
3577