Applied Mechanics and Materials Vols. 556-562

Paper Title Page

Abstract: This paper analyzes the limitations of simple network management protocol (SNMP) which adopts the centralized service model, discusses the basic idea of AgentX frame and the agent’s operating principle, and has a brief analysis on AgentX protocol packets. Based on my experiences, the paper describes the implementation of MasterAgent/ SubAgent based on AgentX communication protocol, using the related source-packet.
6340
Abstract: SEU is one of the major challenges affecting the reliability of computers on-board. In this paper, we design a kind of encoding and decoding algorithms with a low complexity based on the data correction method to resolve the data stream errors SEU may bring. Firstly, we use the theory of linear block codes to analyze various methods of data fault tolerance, and then from the encoding and decoding principle of linear block codes we design a kind of encoding and decoding algorithms with a low complexity of linear block code, The fault-tolerant coding method can effectively correct single-bit data errors caused by SEU, with low fault-tolerant overhead. Fault injection experiments show that: this method can effectively correct data errors caused by single event upset. Compared with other common error detection or correction methods, error correction performance of this method is superior, while its fault tolerance cost is less.
6344
Abstract: A soft-bus radar system model basing on a multi-core processor computer was designed in the paper. In this soft-bus, a distribute network communicating protocol called ‘data distribute service’ was used. The plug-in management, dataflow control and system data transporting of the data processing functions were supported by a unified protocol of the design. The functions of the in-using radars were consummated and extended by this design.
6350
Abstract: Linear network coding can achieve the network capacity in the single source multicast case. For the single source multicast network with wiretap adversary, the paper of Cai and Yeung constructs an information-secure linear coding which tightly achieves the transmitting rate upper bound , where is the capacity of the network and is the maximum number of edges the adversary can wiretap. The current paper considers the cryptographic security for the messages in the random linear network coding setting. The indistinguishability under chosen-message-attack (or CMA-Security) from probabilistic polynomial-time (PPT) wiretap adversary is defined. With a pseudorandom generator against linear cryptanalysis, an end-to-end protocol is constructed for multicast network using random linear network coding. When the adversary wiretap less than edges, the protocol is CMA-Secure and attains transmitting rate approaching the network’s capacity from below, asymptotically in the expanding ratio (i.e., length of output string/length of input string) of the pseudorandom generator. Compared with secret-key based scheme, no secret is needed by the receiver nodes, which means the key managing issues for dynamic networks would never come up.
6354
Abstract: This paper through the body-in-white model test got each order modal natural frequency, vibration mode, damping about this body-in-white. At the same time, on the basis of the test, analyzing the influence about windshield condition of each order modal parameters. Study shows that the low-frequency dynamic characters of the body-in-white is better, to improve local modal properties, increase the windshield on the body-in-white modal characteristic has certain strengthen.
6358
Abstract: This paper put forward an improved MMSPEED routing algorithm basing on Game Theory through detail researches and analysis of existing routing protocol and combining the specialties of Wireless Multimedia Sensor Network (WMSN). This algorithm takes advantage of Nash Equilibrium to pick out the optimal path of revenue from source node to sink node; and elect paths which are suitable to different information to process information transmission by adjusting revenue function, considering there are various information types in WMSN and different information has different demands to QoS. Simulation tests indicate the improved protocol is better-adapted toWMSN where multi types of information coexist, and balance the energy consumption under the circumstance of less rising of frame loss rate,to prolong the working time, and also improve the instantaneity and reliability.
6362
Abstract: This document analyzes the current problems brought by the impact of mass passenger flow in Beijing Rail Transit Network. Based on the characteristics of Internet of Things such as real-time sensing, information sharing and intelligence analysis etc., the construction strategy of Internet of Things precautionary systems is proposed to prevent mass passenger rail transit, and defined the selection and deployment policies of passenger flow detection equipment. Practice shows that the system effectively improves the forecasting capacity of mass passenger flow, and provides strong support for the implementation of rail transit sophisticated management.
6366
Abstract: Although histogram has been introduced into the optimizer of the relational database to assist cardinality estimates for more than thirty years, the issue of histogram maintenance is not addressed well. The application of the query feedback information provides a new way of thinking for the histogram maintenance. But it is not mature until now and inefficiency is the main problem. The query feedback-based histogram maintenance approach adopts the entire update mode and the whole histogram will be updated in each maintenance process. This mode brings huge computation for the maintenance process and becomes the most important reason for its inefficiency. Therefore, we propose the partial update mode in this paper to replace the entire update mode and try to improve the maintenance efficiency by limiting the updating range and decreasing the computation in each maintenance process.
6370
Abstract: There are many obstacles exit in the mobile management scheme, it mainly shows in its not high switching performance, excess signaling overhead and too long handoff delay, hard guaranteed quality of service in handoff as well as safety problem. It put forwards a fast handoff scheme which advances HMIPv6 by giving it authority to temporary mobility anchor point (LT-TMAP). The lower level access router is licensed through upper level of MAP, make it a temporal mobility anchor point to give distribute management to mobile node, and describe the implementation process theoretically. In the end, we use the NS-2 simulation tool to build network topology and based on the IPv6 test-bed build in our school network laboratory which I help researched to give a simulation test to that handoff scheme. It proves the handoff scheme can take better advantage of the network MAP resource, has stronger real-time performance, and higher handoff efficiency.
6375
Abstract: Architectural design is a creative work, the final results of it is image and visually expressed in the form of drawings. AutoCad technology and Sketchup software combined with architecture design are the combination of computer application technology, especially the inevitable outcome of the development of computer graphics technology. Usage of the two softwares is not only able to design construction drawing with specification, beautiful buildings, and can effectively help designers improving the design level and work efficiently, this is the manual drawing. Mastering the AutoCad and SketchUp architectural drawings in other words is to have the advanced and standard of architectural design language tools.
6379

Showing 1421 to 1430 of 1532 Paper Titles