Applied Mechanics and Materials
Vols. 568-570
Vols. 568-570
Applied Mechanics and Materials
Vol. 567
Vol. 567
Applied Mechanics and Materials
Vol. 566
Vol. 566
Applied Mechanics and Materials
Vol. 565
Vol. 565
Applied Mechanics and Materials
Vol. 564
Vol. 564
Applied Mechanics and Materials
Vol. 563
Vol. 563
Applied Mechanics and Materials
Vols. 556-562
Vols. 556-562
Applied Mechanics and Materials
Vol. 555
Vol. 555
Applied Mechanics and Materials
Vol. 554
Vol. 554
Applied Mechanics and Materials
Vol. 553
Vol. 553
Applied Mechanics and Materials
Vol. 552
Vol. 552
Applied Mechanics and Materials
Vol. 551
Vol. 551
Applied Mechanics and Materials
Vol. 550
Vol. 550
Applied Mechanics and Materials Vols. 556-562
Paper Title Page
Abstract: Based on the technology concept and application of IOT, the technology of IOT is applied to the monitoring and safety early warning of bridge health to improve the level and efficiency of the operation and management in safety of bridge. The article discusses the key issues involved in the application, from the selection and optimized layout of sensors, the acquisition and transmission of monitoring data, the architecture and function of the bridge health monitoring system, safety early warning model research of bridge etc. And the article provides scientific basis for decision making in the safe operation and daily maintenance and management of bridges.
5994
Abstract: With the development and popularization of computer network, and speed up the pace of government and enterprise informatization, network architecture and existing enterprises more complex. The complex network structure exposed a lot of security problems, personal and corporate demand for network security grows with hitherto unknown speed. How to let the rapid advance of network security to satisfy business, become a hot topic. Network security is the supporting system of daily office and business applications for the modern enterprises. In the enterprise network, only like a personal computer network security protection just install personal version of virus protection program and software firewall is not enough, and should also deploy hardware firewall, network virus protection program and other such as intrusion detection system, network isolation equipment etc.. At the same time, it is necessary to deploy enterprise network disaster tolerance system, because it is all safety protection measures in the last line of defense.
This paper mainly describe, safety control program of firewall in enterprise network security is how to design. I hope that this paper can help everyone to design network security protection systems .
5999
Abstract: Social intercourse based on interest is becoming more and more popular, design of the existing architecture and the business logic of the light blog by taking analysis is implemented. Through recording and analyzing users’ behavior and data profiles, this system can automatically push the new useful information to the specific users who may have an interest on that by data mining. In this paper, the application of the data mining technique, the implementation of TF-IDF algorithm and the solution of the model similarity are mainly explained.
6003
Abstract: Nowadays in China, when the patients change medical institutions for treatment, the lack of clinical information sharing may result in loss of information, misdiagnoses, repetitive drug prescriptions, etc. This makes high cost and low efficiency, especially medical security problems. To solve this problem, this paper presents a novel cloud platform for clinical information exchange between medical institutions based on web services; Data exchanges are using web services based on encrypted and compressed XML for interoperability and privacy. our architecture satisfies many requirements of medical institutions in China. Finally, we have developed a prototype that clinical information is shared between dozens of military hospitals.
6007
Abstract: Intelligent control is a class of control techniques that use various AI computing approaches like neural networks, Bayesian probability, fuzzy logic, machine learning, evolutionary computation and genetic algorithms. In computer science and related fields, artificial neural networks are computational models inspired by animals’ central nervous systems (in particular the brain) that are capable of machine learning and pattern recognition. They are usually presented as systems of interconnected “neurons” that can compute values from inputs by feeding information through the network. Like other machine learning methods, neural networks have been used to solve a wide variety of tasks that are hard to solve using ordinary rule-based programming, including computer vision and speech recognition.
6011
Abstract: The proposed IPv6 protocol has brought new problems for network security. The new protocol and features were introduced for IPv6 and the new type of attack applicable in the environment of IPv6 was summarized. And then, according to the idea of the attack detection, computers themselves can discover the vulnerabilities and deficiencies of their own systems. Thus the vulnerabilities will be patched up and the security of the system will be improved. We focused our research on designing and realizing the IPv6 network attack platform by designing the overall structure of the platform. Finally, we tested the IPv6 network attack platform. Test results show that the attack effect is remarkable, which plays a role in finding computers’ system vulnerabilities, strengthening security protection and enhancing network security.
6015
Abstract: multilevel security technology has broad applications in military and commercial aspects, the key technology in the research of multilevel security network, based on the BLP model of a security enhancement model is presented, and proved its security of the model. Secondly, based on the analysis of RBAC96 model cluster, proposes a licensing scheme of multilevel mobile IPv6 network based on role.
Again gives an implementation scheme of multilevel security network in mobileIPv6 network environment. Including the configuration and deployment of mobile IPv6 environment of multilevel security network, and gives the process of multilevel security network. Finally, the simulation results of multilevel security network is given. The results show that, the multilevel security network design to meet the functional requirements of multilevel security network.
6019
Abstract: As started late, China's large exhibition venue industry lags behind the developed countries in the exhibition venue construction and management concepts, and lacks of integrated management over the full cycle of large exhibition venue projects, therefore, decision-making, implementation and operational phases are disjointed with each other and all sorts of drawbacks exist, meanwhile, the overall optimization of social, environmental and economic benefits and win-win situation between stakeholders are unable to be realized. This paper takes large exhibition venue project full cycle integrated management model as object of research and discusses the reason mechanism, connotation, organizational methods and information system of the integrated management. Focusing on large exhibition venue project operation, this paper makes a research and analysis on venue project full cycle integrated management information system demands, and proposes information integration transformation models (including integration relationship model, integration element model and integration mapping model) and comprehensively designs the system basic function framework, hierarchical framework and overall running framework, and also proposes key technologies used to realize the system.
6023
Abstract: Ethernet ring networks are used widely recently, and the research on the ring protection switching is carried out. Spanning Tree Protocol (STP) was the first technology to control ring networks to avoid the storm. Rapid Spanning Tree Protocol (RSTP) is an upgraded version of STP[1]. RSTP can provide shorter convergence time than STP. Ethernet Automatic Protection switching (EAPS) is designed for a single ring topology [2]. The convergence time of EAPS is below 50ms and EAPS can meet the real-time requirements and high-reliability requirements of network services.G.8032 is a standardized scheme for achieving sub-50ms service protection in ring topologies which is recommended by ITU-T[3]. This paper intelligent Ethernet ring protection technologes about Spanning Tree Protocol, RFC3619 and G.8032 .These technologies appear in different times, and have their advantages and disadvantages. This article outlines these Ethernet ring protection switching technology and explains their basal principles.
6026
Abstract: The virtual manufacturing technology mainly provide visual, auditory information, to achieve "what you see is what you get" the effect. Several typical definition of virtual manufacturing dominate in this fields were listed out, based on which expressed an explicit interpretation. Main features and three type of virtual manufacturing, such as design-centered, machine-centered and control centered virtual manufacturing were analyzed respectively. The virtual manufacturing system, supported by cutter tool magazine, pallet storage, production database, material storage and NC storage, have been demonstrated in an architecture figure. Finally, the author concluded the important role of virtual manufacturing and illustrated an example of applying virtual manufacturing in five-axis machining process.
6030