Applied Mechanics and Materials
Vol. 577
Vol. 577
Applied Mechanics and Materials
Vol. 576
Vol. 576
Applied Mechanics and Materials
Vol. 575
Vol. 575
Applied Mechanics and Materials
Vol. 574
Vol. 574
Applied Mechanics and Materials
Vol. 573
Vol. 573
Applied Mechanics and Materials
Vols. 571-572
Vols. 571-572
Applied Mechanics and Materials
Vols. 568-570
Vols. 568-570
Applied Mechanics and Materials
Vol. 567
Vol. 567
Applied Mechanics and Materials
Vol. 566
Vol. 566
Applied Mechanics and Materials
Vol. 565
Vol. 565
Applied Mechanics and Materials
Vol. 564
Vol. 564
Applied Mechanics and Materials
Vol. 563
Vol. 563
Applied Mechanics and Materials
Vols. 556-562
Vols. 556-562
Applied Mechanics and Materials Vols. 568-570
Paper Title Page
Abstract: Three common transitional technologies are analyzed ,that is, the tunnel technique, the dual protocol stack, and the translation technique (NAT-PT).An updating technology solution of IPv6 for the campus network are proposed,especially for the routing technology of IPv6 using the Cisco 7603 router, finally, the installation and configuration of IPv6 are introduced Briefly.
1355
Abstract: This article discusses the design model, general construction and implement scheme of network teaching platform based on Web techniques, probes the application of education informationization in the teaching process. Combined modern teaching theory and multi-medium techniques, the article demonstrates and implements the main function and demand of network teaching platform from m teaching and learning point of view.
1360
Abstract: Along with the arrival of Chinese hydropower construction investment peak and the application of computer technology in the whole life cycle of hydropower station of every stage, isolated data appeared between different stages in the whole life cycle, as well as different professional module of the same stages. Based on the whole life cycle theory of hydropower station, overall planning informatization of basin wide hydropower development company was studied. The overall planning includes main information system modules of each stage of the whole life cycle of hydropower station, such as: basin wide or river planning stage, pre-feasibility study stage, feasibility study stage, bidding and construction stage, completion operating and maintenance stage and digitalization basin stage. Meanwhile, based on the transverse business sectors, management of comprehensive enterprise, hydropower station construction process, production operations, and function business modules of hydropower station was studied. After the implementation of the plan, whole process planning informatization is except to be unified, and a unified data model should be established. Finally, a new management model can be formed, the purpose of efficient management can be achieved.
1364
Abstract: Insiders, who have the lawful authority in network information system, formed a huge threat to security by abuse and misuse of authority. It has become one of huge challenge to the security of information system. Against the features of more subtle and more difficult to find, this paper study how to perceive the trusted behavior of insiders with behavior-based attestation. Taking into account the impact of various uncertainties in monitoring and perception process, dynamic awareness model of insider threat is presented based on subjective logic. In order to find the insider threats, monitoring data of actual behaviors are compared with operation tree; legality of the user behavior dynamically analyzed according to historical experience and current experience; the trust of user behavior legitimacy is represented as trust point in subjective logic. Finally, experiments are employed to test the validity and applicability of proposed method.
1370
Abstract: For the problem of multi-task assignment based on the contract net protocol, this paper improved the traditional contract net protocol after analyzing its defects ,such as broad bidding scope and low efficiency etc. The research proposed a method of screening the bidders for each task by using distance matrix in task distribution ,employed the 0-1 programming model established to determine the successful bidders for each task in bidding process. Meanwhile, the study applied the auction mechanism to realize the dynamic assignment of multi-task, provided a concrete model algorithm and analyzed the performances of the algorithm proposed as well. The results show that the model algorithm effectively improves the overall performances of the task assignment system.
1376
Abstract: With the popularity of the Internet, web applications have become an essential part of business development. At the same time, network security issues have become increasingly prominent, enterprises feel the convenience brought by the network, while they are also facing a variety of attacks and threats: leaks of confidential, loss of data, network abuse, identity theft, illegal invasion. At present, some enterprises have established the appropriate network security systems, but in actual use, because of the wrong use of various security tools, the phenomenon of system vulnerabilities, illegal software, viruses and malicious code intrusion causes the computer operating system can not reach the required level of standard safety levels.
1384
Abstract: Agricultural IOT (Internet of things) is the integration of modern information and communication technology in agriculture. Based on 6LoWPAN wireless sensor networks, this paper puts forward a real-time monitoring system to agricultural environment, in order to improve the function of modern agricultural greenhouse control system. This system uses the 6LoWPAN as backbone to reach the goal of point-to-point communication between NGI (next generation Internet) and wireless sensor networks signed with IPv6. It is no specific gateway to protocol transition and carrying which makes it possible to realize real-time monitoring and controlling of agricultural environment, reduce energy consumption, shorten the delay time.
1389
Abstract: The planning of network communications of Yalong river basin hydropower development company aims to adapt to the company's strategy and making decision, meet the requirements of project construction, electric power production and administrative management. Based on the principle of advanced nature, economy, reliability, security, scalability, and standardization, the concept of basin area and framework of network communication are put forward on the regional development and project category of Yalong River Company . The content of communication planning is to solve the network communication problems of the company headquarters, between the company headquarters and secondary units focus on office, between corporate headquarters and production, between basin area and each power plant under construction projects.
1394
Abstract: Currently, the security industry taking the high definition network video surveillance as representation is developing rapidly,so the security device interface standard is becoming more and more important. This paper studies the security industry new standard interface ONVIF protocol, analyzes its systematic structure and work principle,discusses the interactional process of video server NVT and client NVC with ONVIF. The design scheme of IP camera based on ONVIF is presented. Finally, the instance of IP camera is given.
1399
Abstract: In consideration of the current MP2P network disturbance from frequent location changes of the mobile nodes, the limited computing power and storage capacity, this paper proposes a flexible strategy of partition management by assigning different functions to nodes according to some standards, regarding a subnet as a unit and using super-nodes to manage subnets. In order to speed up the data transmission and replacement efficiency, data is processed with partial network coding technology. Additionally, a trans-subnet query algorithm is proposed to link subnets, conduct information exchange between subnets and resource location. Results of the experiment manifested that this strategy can efficiently increase the resource download success rate and hit rate, reduce the average delay, improve the content distribution efficiency of MP2P networks, and simultaneously enhance system robustness.
1403