Applied Mechanics and Materials
Vol. 658
Vol. 658
Applied Mechanics and Materials
Vol. 657
Vol. 657
Applied Mechanics and Materials
Vol. 656
Vol. 656
Applied Mechanics and Materials
Vol. 655
Vol. 655
Applied Mechanics and Materials
Vol. 654
Vol. 654
Applied Mechanics and Materials
Vols. 651-653
Vols. 651-653
Applied Mechanics and Materials
Vols. 644-650
Vols. 644-650
Applied Mechanics and Materials
Vol. 643
Vol. 643
Applied Mechanics and Materials
Vols. 641-642
Vols. 641-642
Applied Mechanics and Materials
Vols. 638-640
Vols. 638-640
Applied Mechanics and Materials
Vols. 635-637
Vols. 635-637
Applied Mechanics and Materials
Vols. 633-634
Vols. 633-634
Applied Mechanics and Materials
Vols. 631-632
Vols. 631-632
Applied Mechanics and Materials Vols. 644-650
Paper Title Page
Abstract: The paper proposed a design scheme of wireless sensor network border router based on IPv6. Project mainly expounds the realization of hardware and software design of boundary router, focuses on wireless sensor network IPv6 protocol stack adaptation layer design based on. Through the data packet fragmentation and reassembly mechanism as well as the header compression scheme, adaptation layer of protocol stack to achieve the transmission of IPv6 data packet in the IEEE in 802.15.4 link. The experimental results show that, this scheme realizes the seamless integration of wireless sensor network and IPv6 network, data transmission is reliable, practical application value.
2957
Abstract: With the rapid grow of the volume of data and internet application, as an efficient and promising infrastructure, data center has been widely deployed .data center provide a variety of perform for network services, applications such as video stream, cloud compute and so on. All this services and applications call for volume, compute, bandwidth, and latency. Existing data centers lacks enough flexible so they provide poor support in QOS, deployability, manageability, and defense when facing attacks. Virtualized data centers are a good solution to these problems. Compared to existing data centers, virtualized data centers do better in resource utilization, scalability, and flexibility.
2961
Abstract: Based upon the synopsis of software support of information system, this paper puts forward main factors, integrated model and phase tasks of software support of information system, and gives description to software supportability analysis technology, software fault diagnosis technology, software fast recovery technology and software remote support technology so as to increase software support capabilities and information system effectiveness.
2965
Abstract: Given a scenario of Vehicle Ad hoc Network (VANET), this paper presented a GIS-Based routing (GBR) strategy to resolve frequent reconstruction caused by rapid topology changes. Due to the use of road information based on GIS, the protocol can evade permanent or temporary topology holes respectively which frequently occurred in the city scenario. Simulation results showed new routing protocols could achieve better performance in packet delivery ratio and proved GBR’s lower routing overhead, as well as it is better performances in high mobility, compared with DSR in urban vehicle environment.
2969
Abstract: GPSR routing protocol is incapable of controlling the energy consumption of single node, causing network monitoring loophole. In the current study, a new routing algorithm NEWGPSR was developed from by original GPSR protocol with the introduction of LEACH clustering thought and the improvement of its head selection algorithm, appending active excitation mode, the heuristic rules and local optimization strategy, improving surrounding forward mode.Results of simulation analysis using NS3 platform showed that the new NEWGPSR algorithm was capable of effectively reducing system energy consumption, prolonging the network life cycle, and improving the performance of the entire network.
2973
Abstract: It is analysed and summarized the China’s big ten network media events in recent years, and concluded the commonness among the network hot events and the causation that attention by netizens. According to the characteristics of the events, it is extracted keywords, record and statistics the appearing and propagation characteristics of the events in the network, and researched the optimization method for keywords. Finally, the keywords entered in network community warning and tracking system, mainly distributed in the router, the application server, terminal software, and the corresponding application is Forum、network access、email、instant messaging and online community, then conduce to the community network opinion supervision and management, in order to maintain social stability.
2978
Abstract: This paper describes the implementation of a fast and efficient method to build a cloud storage environment. In this method, we base on the OpenStack Object Storage (code-named swift), use Swauth as the authentication system, and build a S3-compatible cloud storage platform. Then do a second development of open source software Cyberduck and use it as the cloud storage Client.
2981
Abstract: This paper describes the common inference channel. By adding inference control module in the database design and operation stages to detect and control inference, our research aimed at improving the security of the database.
2985
Abstract: The integrated WiFi and WiMAX network is of great potential for the future due to the high data transport capacity of WiFi and the wider coverage of WiMAX. According to the requirements for real-time service in the wireless network, a fast secure authentication model in the WiFi/WiMAX mixed networks is proposed. It is based on the EAP-TLS protocol and its authentication procedure is divided into two stages: pre-authentication and re-authentication. By the utilization of the pre-authentication the authentication delay is reduced significantly when a MS roams between WiFi and WiMAX networks, which can be used to support real-time service in the mixed wireless network to some extent.
2988
Abstract: This paper introduces steps and techniques for the front-end database applications in Powerbuilder (PB), gives relevant script fragments that are for creation of transaction objects of communication between PB clients and database and for definitions of their properties, and analyzes and compares several approaches for PB clients to talk to database and the corresponding script fragments.
2992