Applied Mechanics and Materials Vols. 568-570

Paper Title Page

Abstract: Based on the characteristic of real network, this paper introduces traffic routing model, uses the capacity of network to measure the connectivity of network, establishes connectivity research model and finally we analyze the method for determining the capacity of network, and the relation between the connectivity of network with the capacity of each node (C) through simulation. Conclusions are shown as following: (1) It is feasible to use the capacity of network to measure the connectivity of network. (2) The capacity of network is measured by the critical generating rate Rc at which a continuous phase transition will occur from free state to congestion. (3) The connectivity of network is positively related with C, and the capacity of network shows a linear growth with the increasing of C. Results show that this evaluation of connectivity can better reflect the connectivity of real network, and well meets the research needs of real network.
1412
Abstract: SCADA (Supervisory Control and Data Acquisition) is an important concern about national security of our country and its security professionals. During those early days, a so called "security by obscurity" helped provide a palpable layer of cyber security and defense and a general feeling of immunity kinds of security problems that have started emerging networks to emerge in the mid 1980's, starting with the known Morris Worm. However, with the global standardization of TCP/IP protocol, and for the past 20 years, with the migration of autonomous systems SCADA interconnected power grids, security risks have increased exponentially. The security officials can no longer rely on the isolated nature of these systems to provide protection. Unfortunately, the security of SCADA systems has not kept pace with advances in computer technology. According to a 2003 report by Sandia National Laboratories, the SCADA security is generally five to ten years behind compared to typical systems of information technology. As threat, the contradictory range has expanded to include not only domestic but foreign terrorists, disgruntled internal, organized crime and even international competitors. This volatile convergence of global computer network and critical weaknesses in the operating system and application software system are well understood by opponents. Although a catastrophic failure is unlikely, these risks could be very problematic and cause disruptions in essential services and billions of euros in losses. This study includes a description of the state of the art of attacks against these systems and the reasons for the vulnerability of these systems. [1, 2, 3]
1417
Abstract: Network coding based multipath routing (NCMR) transmission mechanism is interpreted. Introduced the energy model into research, the transmission reliability and energy consumption of NCMR is analyzed with quantitative analysis on a braided multipath network model. A source controlling strategy is proposed for optimizing the energy consumption with transmission reliability requirement.
1422
Abstract: The model of network monitoring system proposed in this paper, the use of user modeling techniques and event detection techniques. Preclude the use of dynamic modeling and dynamic model of the method of combining inferred more detailed user interest model to optimize the results, event detection method for the introduction of natural language processing, the system automatically send the text to identify hot topics and events advertising. In the system design, considering the intersection of the two, to obtain a better user experience.
1430
Abstract: Wax precipitation of oil production wells seriously influence the oil production. In order to improve the level of wax removal, it is necessary to predict the depth, thickness and period of wax precipitation in the wellbore with oil production. On the basis of the mechanism analysis for wax precipitation in the wellbore, the theoretical model and empirical model were built up and programmed wax precipitation of oil production wells software and the results by the two models were compared. The sensitive factors which influence wax precipitation in the wellbore were analyzed. The results show that the two models can be used to predict the wax thickness, depth and precipitation cycle. The empirical model for wax precipitation profile prediction is more accurate than the theoretical model. The wax precipitation varies with the productive time and water cut.
1437
Abstract: This report discusses the evidence for the claim that “big classes in java are bad”. In other words, there are some evidences for the negative impact of classes size on software quality.
1443
Abstract: As to the difficult problem of simulation and deduction for the scheme optimization design and equipment support ability of measurement and control equipment, A set of software for simulating tracking ability of measurement and control equipment is developed based on MapX and OSG. It solves a series of problems including creating simulation models for measurement and control equipment, simulation of tracking ability and situation in 2-D GIS and 3-D GIS, rapid and visual method for designing and creating simulation route, dynamic state display for deduction data and etc. The work in this paper will provide theoretic foundation for station distribution, tracking strategy and safety control of TT&C system, which also raises the ability of TT&C system engineering design in shooting range.
1447
Abstract: Software formal method is a mathematics-based technique for the specification, development and verification of software systems, and has been viewed as an important way to guarantee the reliability of final product. Reliability of Algorithms in embedded software system is in high demand. The paper introduces an algorithm formal approach suitable to the development of embedded software that will enhance its reliability, and as a case study an algorithm has been formally developed.
1451
Abstract: With the development of semiconductor industry, different types of wafer processing are increasing. According to the different wafer processing models, the need of data display and process is different. In this paper, a customizable software platform is described for the manufacturing equipment of semiconductor integrated circuit (IC equipment). The C# control technology has been used to build the IC equipment customizable control system interface. The development method of customizable control technology based on C# can realize the control of the reuse and codes sharing, in order to improve programming efficiency, avoid the development of two times, cost saving and be easy to debug.
1455
Abstract: Existing smart home has been difficult to achieve the degree of public information automation and convenience of home environment requirements, smart home is a new field of networking technology applications. This article discusses how to use networking technology to the field of smart home, smart home study architecture in a wireless communication technology to solve the traditional home system using wired communications evils. Meanwhile, combine Bluetooth wireless smart home study based on the design of a kind of Bluetooth technology based smart home controller.
1459

Showing 271 to 280 of 381 Paper Titles