Applied Mechanics and Materials
Vol. 659
Vol. 659
Applied Mechanics and Materials
Vol. 658
Vol. 658
Applied Mechanics and Materials
Vol. 657
Vol. 657
Applied Mechanics and Materials
Vol. 656
Vol. 656
Applied Mechanics and Materials
Vol. 655
Vol. 655
Applied Mechanics and Materials
Vol. 654
Vol. 654
Applied Mechanics and Materials
Vols. 651-653
Vols. 651-653
Applied Mechanics and Materials
Vols. 644-650
Vols. 644-650
Applied Mechanics and Materials
Vol. 643
Vol. 643
Applied Mechanics and Materials
Vols. 641-642
Vols. 641-642
Applied Mechanics and Materials
Vols. 638-640
Vols. 638-640
Applied Mechanics and Materials
Vols. 635-637
Vols. 635-637
Applied Mechanics and Materials
Vols. 633-634
Vols. 633-634
Applied Mechanics and Materials Vols. 651-653
Paper Title Page
Abstract: In order to effectively monitor, manage and prosper professional mobile application, this paper analyze the reasons of shorting for monitoring and management of mobile application on current technologies. Also, based on mechanisms of mandatory access control in user space or kernel space, including scenarios context switcher, we implement an active stereoscopic framework for monitoring and management of mobile application adapting to situations changing. Besides monitoring & management of application, the framework can support application for user with new services adapting new environment.
1860
Abstract: In order to ensure the security of massive data and user’s privacy in cloud computing, encrypting is a preferred method to protect their security. Due to some characteristics of massive data,such as large scale and structural complexity, it makes that the traditional encryption algorithms cannot be directly used to protect the security of massive data in cloud computing. Considering the real-time and reliability of encryption algorithms, we propose a hybrid algorithm, which combines DES algorithm and one-dimensional logistic map by using the parallel computing architecture of the MapReduce. Our experimental results and analysis show that our algorithm could effectively implement massive data encryption with high security.
1864
Abstract: VANETs is a rapid developed wireless mobile MANETs network with special challenge nature. It is a distributed and self-organized communication network based on moving vehicle. This network has characteristics like limited bandwidth, strong mobility, strong dynamic network topology, limited node degrees freedom, equipment capacity constraints and weak physical security. These characteristics usually make typical routing protocol in mobile MANET show a low efficiency in mobile VANETs, even fail. MANET routing algorithm is roughly divided into two categories, namely table driven routing protocol and on-demand routing protocol. It is due to the particularity of driving cars on the road. So how to improve network routing protocol in the performance is now a challenging problem. The purpose of this article studies network routing mechanism based on wireless vehicular networks simulation method. On the basis of analyzing the performance of typical routing protocols in MANET, such as DSDV, AODV and DSR, the improved scheme of AODV on-demand routing algorithm is put forward.
1868
Abstract: The WK-recursive network has received much attention due to its many attractive properties. In this paper, we consider the one-to-one disjoint path covers properties of the WK-recursive network. We use K(d, t) to denote the WK-recursive network of level t, each of which basic modules is a d-vertex complete graph, where d > 1 and t ≥ 1. We prove that for any two distinct vertices u and v, there exist d-1 node-disjoint paths whose union covers all vertices of K(d, t) for d ≥ 3 and t ≥ 1. The results is optimal for vertices in different Kj(d, t − 1) for t ≥ 2, since each Kj(d, t − 1) with 1 ≤ j ≤ d has d − 1 open edges.
1875
Abstract: After directional sensor nodes are randomly thrown into target area, coverage ratio often less than the anticipant value, in order to improve the coverage, sensor nodes should turn from overlapping regions to coverage holes by a much faster way. In this paper, we improved the existing potential field based coverage-enhancing algorithm (PFCEA), presented a optimization of the virtual potential field based on coverage-enhancing algorithm for directional sensor networks (OPFCEA), we introducing a new-style virtual node to enhance the coverage of boundary region and a new-style control for the rotation angle. By these ways, we can improve network’s performance. This algorithm enhanced the coverage ratio of the network, the simulation results show the effectiveness of the algorithm.
1882
Abstract: Software reliability is one of the most important quality indices in software quality evaluation. Reliability analysis based on software architecture has become a researching hotspot. This paper makes a review on existed architecture-based reliability evaluation models, and puts forward the shortage of these models. As petri net has a good ability of description for concurrency and asynchronism, this paper focuses on the research of petri net model. Transitions are divided into time transitions and instantaneous transitions. Time-related reliability, including time-delay reliability and temporal reliability, are added. Then the reachable state transition matrix is set up and system reliability evaluation proceeds. The method above is used into a avionics embedded software. At last we accomplish the architecture modeling, reliability evaluation, proving the effectiveness and feasibility of this method.
1888
Abstract: analyzing management situation of current enterprise-class network, introducing cloud computing technique, presenting centre framework of enterprise-class network data center based on cloud computing, stating resource integration way, which includes cloud infrastructure virtualization, cloud platform, and cloud application for different structure. The data center based on cloud computing can support the operation and development in a better way.
1893
Abstract: This article proposes distributed topic-focused crawlers on the basis of HDFS and MapReduce, which are the two core technologies of Hadoop. The crawler has the advantages of distributed processing ability, scalability, high reliability. This article analyses the dependency of subject by using the method of conceptual analysis and uses MapReduce to realize webpage crawling and updating webpage. At last using experiments to verify the performance, expansibility and reliability of the system
1896
Abstract: In the society with the rapid development and popularization of computer technology, the management information system has become the hot field of software development. It runs stably in the browsers, like IE6, IE7, IE8, IE9 and FireFox, with high efficiency, sound security, friendly interface and simple operation. It has done research on the design and realization process of HTML5 off-line data storage on the Android platform. Under the Eclipse integrated development environment, with Android SDK and HTML5 grammar, develop the system, which realize the functions of off-line storage, addition, deletion and modification of user data. It enables the application of HTML5 of Android platform and has made detailed analysis on the Android platform and HTML5 application module. The result indicates, the webpage application design of HTML5 conducted on the Android platform, is simple and fast, which can better meet the demand of Android cellphone users.
1901
Abstract: In view of the problems existing in the wireless multiple hop network such as consumption imbalance of node power, disunity of node transmission data efficiency, unfixed life within the scope of network, it has put forward the trade-off relationship between the wireless multiple hop network node energy consumption and multiple factors based on the k-means clustering method. The principle of steps and characteristics of the k-means clustering algorithm are first introduced; Then model the influence of the K-means polymerization on VoIP service quality, then use the k-means clustering method to make cluster analysis for network node data package, and mine the trade-off relationship between data transmission service quality and multiple hops node energy consumption; Finally carry on the simulation experiment to test the performance of this method. Simulation results show that the method not only improves the data transmission service quality of VoIP service, but also reduces the energy consumption of nodes and prolongs the life span of the wireless network.
1905