Applied Mechanics and Materials Vols. 556-562

Paper Title Page

Abstract: In this paper, a multiple data replica placement scheme for cloud storage under health-care environment is proposed. It is based on p-center model with minimizing user access cost as its optimization objective. It uses GA (Genetic Algorithm) to find the optimal data replica placement solution. Simulation results have shown that it can not only improve user access time and promote load balance but also enhance system scalability and reliability.
5511
Abstract: Comply with the development trend of the domestic mobile Internet and mobile devices and boom, in order to improve and optimize the school teachers and students working and life in Guilin University of Technology, to promote the exchange of teachers and students, to enrich the lives of teachers and students, especially research and design of Cloud-based campus-plus system on android platform, the Android client school Education Online system perfect butt, perfect integration with the Kingsoft cloud network disk, docking with the microblogging platform based on the Hadoop technology of cloud and some personalization features. Through the Firebug plug-in for Firefox browser Senate online system packet capture analysis, to get access to the data request URL and request parameters, and then to use HttpClient open source library to encapsulate the URL and parameters, initiates a connection request to the server, the last Jsoup and Gson open source library to parse and filter the data to develop a Senate online system client. Hadoop cloud microblogging server using the HTTPS protocol as well as the Json format for communication to transfer data, and also incorporates Kingsoft cloud network disk, in order to meet the daily lives of teachers and students anytime, anywhere communication, share resources with each other.
5518
Abstract: Computer network security is of great importance for many users. As continuous development of computer network applications, more and more factors which endanger computer network security have emerged. This paper will mainly introduce such factors as hacker attack, network virus, system vulnerability etc. On this basis, the utilization of prevention technology of computer network security will be analyzed.
5523
Abstract: Discovering the vulnerabilities in network protocols is the key for network attacks and defenses. Basing on the analysis of some currently used vulnerability discovering methods, a method combining reverse engineering and fuzzy testing is put forward for vulnerability discovering of network protocols, where reverse engineering method is first used to analyze the details of the communication protocol, then fuzzy testing is used to test the target software. This combination can promote the efficiency of the fuzzy testing. By using this method to test a real network application, several vulnerabilities are discovered, which verifies the validity of this method.
5526
Abstract: This article starts with basic features of assembly-disassembly model of a virtual maintenance system, and hierarchical organizational structure necessary for virtual maintenance of the model is established. Further, method for establishing hierarchical information model is defined in light of the characteristics of hierarchical structure and necessary information for this purpose. And said method is employed to construct the model for launch guidance of some missile warhead.
5531
Abstract: The electronic magazine is an emerging information load bearing way, which has brought the brand-new network reading experience to us. It depends on the Internet platform to issue regularly. Users may browse and subscribe it at any time. This electronic magazine system is based on the Asp.net technology and it takes SQL Server as the database development tools. This article introduces the concept of electronic magazine system firstly, and analyzes the electronic magazine system from the technical feasibility and system demanding. Finally it designs overall from the front desk display, the backstage management module function and the database design. So we developed electron magazine system which has function, targeted and simple operation.
5535
Abstract: The conventional inversion can only get P-impedance data, but neural network inversion can obtain various kinds of well-log attributes data by getting the nonlinear relationship through training the data of seismic attributes and well-log attributes, and then apply the nonlinear relationship to the whole seismic data volume. In this paper, we use multilayer feed forward neural network, probability neural network and radial basis function neural network to carry out the log-density inversion research, and obtain three pseudo density data volumes. We compare the effect of the inversion results and analysis the density distribution in spatial domain through section and slice data, at last we predict the stability of the coal seam’s floor in more reasonable way.
5539
Abstract: This paper mainly discusses Database optimization technology of Power Designer in the software development..it includes the Horizontal partitioning table, the Vertical partitioning table and Table collapsing.The database optimization technology provided by Power Designer improve the efficiency of the system,such as the required connection of the query operation is reduced, the efficiency of the inquiry time to the record increased greatly compared with that of the original system. The efficiency of the optimized system also increased greatly, the number of the external keys and the indexes is also reduced.
5544
Abstract: The traditional learning and the self-inquiry learning have their advantages, so it is combining their advantages,studying the cloud learning platform. According to the present situation of the learning platform, it is designing the traditional learning platform and the self-inquiry learning platform, then develop the learning platform, finally analysis the advantage of the learning platform for students and teachers.
5548
Abstract: Based upon the synopsis of Cloud Computation technology, this paper describes the Cloud Computation architecture, and carries out practical analysis of system added capabilities. Meanwhile, the related policies and measures are presented with respect to the application of cloud computation technology into electronic information system. This will benefit the further development of electronic information system.
5552

Showing 1231 to 1240 of 1532 Paper Titles