Applied Mechanics and Materials
Vols. 568-570
Vols. 568-570
Applied Mechanics and Materials
Vol. 567
Vol. 567
Applied Mechanics and Materials
Vol. 566
Vol. 566
Applied Mechanics and Materials
Vol. 565
Vol. 565
Applied Mechanics and Materials
Vol. 564
Vol. 564
Applied Mechanics and Materials
Vol. 563
Vol. 563
Applied Mechanics and Materials
Vols. 556-562
Vols. 556-562
Applied Mechanics and Materials
Vol. 555
Vol. 555
Applied Mechanics and Materials
Vol. 554
Vol. 554
Applied Mechanics and Materials
Vol. 553
Vol. 553
Applied Mechanics and Materials
Vol. 552
Vol. 552
Applied Mechanics and Materials
Vol. 551
Vol. 551
Applied Mechanics and Materials
Vol. 550
Vol. 550
Applied Mechanics and Materials Vols. 556-562
Paper Title Page
Abstract: In current complex network environment, various kinds of attacks are mixed together forming the attack group. The diversity of the attack group leads to diverse attack signatures, which cannot be constrained by uniform conditions. Based on mixed attack signatures estimation model, the paper proposes a detection method for mixed and diverse attack groups. The paper classifies the different attacks in the mixed and diverse attack groups by use of attack constraint classification methods, builds invasion recognition particle tree, and detects mixed diverse attack groups in complex network environment according to error estimation. Experimental results show that the algorithm can effectively improve the accuracy of detection in complex network environment.
atures;
5740
Abstract: This paper presents a design method of large-scale visual positioning software combining embedded technology and software algorithm. The design process and implementation ideas of hardware and software are given, and the pattern recognition methods are utilized for accurate positioning of the target. The test method is to utilize the proposed system to process visual positioning recognition of airport obstacles. The experimental results show that the system can effectively improve the accuracy of recognition, thus ensuring the aircraft can evade the obstacle accurately in the process of running on the runway, and achieved satisfactory application results.
5744
Abstract: The Internet of things is currently an emerging hot technology at home and abroad, bringing profound changes for people's production and life style. At the moment of bringing many benefits, the Internet of things also brings about unprecedented challenges for software, even the whole field of information technology. Specific to the mass, heterogeneity, sensitivity of time and space and dynamic flow, this paper proposes the concurrency control mechanism of the global transaction based on the Internet of things cluster system, effectively improving the concurrence of the global transaction execution, increasing the transaction throughput rate, reducing transaction response time and improving the performance of the system.
5748
Abstract: Generally, the methods to evaluate network performance include analytical method, numerical method and simulation method. Nowadays, emulation is the main method to analyse computer network communication system. This paper discusses a general approach to evaluate network performance which includes bandwidth, latency, jitter, throughput and computer simulation method to analyse LAN performance. A network simulation framework is also introduced in this paper.
5752
Abstract: The paper presents the concept and the main idea of network access control and uses the open source software (FreeRADIUS) as a basic framework. It brings in an terminal security status assessment ideas. At the same time, it designs and implements including authentication, configuration and implementation of security strategy and the security state of terminal evaluation as one of the terminal network access control system.
5756
Abstract: On the construction and transformation of smart community, it is crucial to program the plan for the buildings. Aiming at solving the problem of building security, a solution based on wireless sensor network is proposed: Making CC2530 as the core wireless measureing and controlling unit, the monitoring and security were achieved. With ARM6410 as the main processor to construct converging gateway node, the gathering and transferring of security information were established. Meanwhile, the control center can be connected to the monitoring center, based on which the integrated organization of the smart community could be realized.
5761
Abstract: Network Security Logs are the records of the important activities and changes of the network, which not only records the state changes of network or mainframe at any time, but also provides the data bases for the network administrators to conduct network management. How to obtain the effective information of security events from the logs with different formats, thus realizing the detection, analysis and evaluation of the security events, has always been the key point to improve the important content of information security protection and focused on by the network administrators. The paper presents a kind of descriptive language of computer network security focusing on the log management, which realizes the uniform description of the common logs in the network with its effectiveness being verified in the actual network environment. It provides the infrastructural support to improve the early warning capacity towards the information security events.
5765
Abstract: Wireless sensor nodes are battery-powered devices with limited processing and transmission power, energy-efficient configuration has become a major design goal to improve the lifetime of the network. A cluster-based network topology can increase the scalability and lifetime, the classical clustering solutions elect the cluster head according the nodes’ residential energy in homogeneous networks, and however, the network is mostly inhomogeneous in practical application. In this paper, a cluster head election mechanism is proposed in a network which deploys the nodes with non-uniform energy and data gathering rates. This protocol is able to distribute energy consumption more reasonable among the sensors in the network, and make each node lifetime more similar.
5771
Abstract: Ecotourism suitability evaluation is a relatively new field in the area of land suitability evaluation. There are numerous studies which focus on land suitability evaluation, yet very limited attention is paid to ecotourism suitability evaluation. Investigation and evaluation of ecotourism resources and the ecotourism environment are helpful for determining whether a particular area is suited for ecotourism activities, providing a theoretically reasonable basis for the functional division and activities in ecotourism planning, and a foundation for sustainable development of the ecotourism industry.
5776
Abstract: Tourism business website is an inevitable trend of the development of tourism industry according to the characteristics of the development of tourism business website, using Web data mining technology, the tourists, and tourism core product classification to develop personalized tourism business website services, identify potential customers, develop dynamic adjustment of tourism products, and improve the tourism business website web site design and the tourism information retrieval speed.[1] It can provide the tourism business website for tourism enterprise construction planning, strategic planning, website maintenance and web marketing to provide the reference for the construction of network brand. Analysis of the data mining technology and Web records the process of mining, mining and recommendation engine using Web records help the tourism business website personalized tourism network. Meanwhile, the usages of business website can recommend travel plans for travelers and improve the reservation rate of network of tourism. Tourism enterprises also can make more profit
5780