Applied Mechanics and Materials
Vols. 568-570
Vols. 568-570
Applied Mechanics and Materials
Vol. 567
Vol. 567
Applied Mechanics and Materials
Vol. 566
Vol. 566
Applied Mechanics and Materials
Vol. 565
Vol. 565
Applied Mechanics and Materials
Vol. 564
Vol. 564
Applied Mechanics and Materials
Vol. 563
Vol. 563
Applied Mechanics and Materials
Vols. 556-562
Vols. 556-562
Applied Mechanics and Materials
Vol. 555
Vol. 555
Applied Mechanics and Materials
Vol. 554
Vol. 554
Applied Mechanics and Materials
Vol. 553
Vol. 553
Applied Mechanics and Materials
Vol. 552
Vol. 552
Applied Mechanics and Materials
Vol. 551
Vol. 551
Applied Mechanics and Materials
Vol. 550
Vol. 550
Applied Mechanics and Materials Vols. 556-562
Paper Title Page
Abstract: Guided by the thought of system integrity, complex behavior of computer network is thoroughly study based on complexity theory. Based on chaos theory complex behavior property of computer networks traffic with different time-scale is deeply researched, the result indicates the universe of the chaos and scale-free behavior in real computer networks. The network behavior evolvement model that correctly describes function mechanism of general real networks is presented, and formal description of the evolvement rules is implemented, the fluctuations formula of input traffic is also deducted. Based on the mean field model of network traffic, the dynamical properties of network traffic system is analyzed, and the condition of chaotic dynamical behavior is achieved under mean field hypothesis.
5822
Abstract: In order to improve data query speed, there are four methods: optimization of SQL (Structured Query Language) statements and reasonable use of index, temporary tables and views are researched. Practice demonstrates these four methods can improve query speed and database performance.
5825
Abstract: During bridges and culverts design effort, in order to avoid defects of manual calculating and plotting, people use excel table to build worksheet calculating model and plot Pearson—III theoretic frequency curve, Excel software can do data calculating as well as data processing, it has powerful functions, so can plot more accurate, ocular precise frequency curve, the graphics are easy to adjust, all these make the model practical and highly optimized for general use.
5829
Abstract: Cloud Computing is one of the hit technologies that developed in computing industry in recent years. It turns all IT resources into a service that customers can rent based on their practical need and team work through internet. As a geographical data collecting, storing, managing, and analyzing computing system, GIS has been integrated into the main stream of IT technology.
5835
Abstract: In order to avoid the shortcoming of faceted classification scheme for being not flexible enough, in this paper, an integrated method which combining the advantages of faceted classification scheme and key value pair method is proposed to represent the logical model of software component. The faceted classification scheme provides a set of summarized optional information for software component to choose. And the key value pair method uses key and value to express the information contained in software component. The information contained in a software component can be divided into four basic facets, namely, the application field, expression method, using environment, development process. And they describe the basic information, using information, and storage information of a software component. The component management protocol based on URL is defined to represent software component, which can be used for storing, transmitting, and analyzing of software component inside of system.
5839
Abstract: By studying the handover process in HetNet network scenario with macrocell and picocell, analyzing and simulating the probabilities of successful handover in theory and geometry, respectively.
5843
Abstract: In the energy crisis environment, V2G and G2V energy exchange is an important issue for attention. We studied the V2G and G2V energy exchange process and electric energy transaction mode. The design of an energy transaction management system for V2G and G2V is given, and the management system is developed. This system is an information system for V2G and G2V two-way mode trading platform, which include two parts: the first is the system management and basic information management module, the second is V2G and G2V transaction module. Based on transactions between electric vehicles and the grid, the system realizes the plan and arrangement for the electric automobile to charge and discharge orderly.
5848
Abstract: The internet of things perception and recognition by the ubiquitous information to the physical world. Ad Hoc provide suitable network environment to the internet of things, whose routing protocol Protect data transmission efficient and reliable. This paper not only analyzes the particularity of Ad Hoc network technology in the Internet of Things, but also simulates AODV and DSDV in test environment to analysis the communication performance in the internet of things.
5852
Abstract: At present, the application systems most enterprises have are self-built and only used in inner-enterprise, thus information can’t be shared efficiently and up-front cost and ongoing maintenance costs are high. To solve this problem, this paper presents a design method of management information system based on cloud computing, which take full advantage of cloud computing platform: HDFS-based cloud-computing copy replication dynamic control mechanism. It can determine whether to increase or decrease the number of copies by reading the number of requests at the same time period and select the appropriate node to add or remove files copies according to historical information so as to achieve the purpose of improving the efficiency of concurrent reads.
5855
Abstract: To analyze all types of safety-related data is an important issue of risk assessment of the current information system. This paper has built a theoretical framework of risk assessment of information system based on data mining technology. Under the guidance of the framework, we study and illustrate the theories about risk assessment of information system applied data mining technology with quantitative and qualitative research methods.
5859