Applied Mechanics and Materials
Vol. 696
Vol. 696
Applied Mechanics and Materials
Vol. 695
Vol. 695
Applied Mechanics and Materials
Vol. 694
Vol. 694
Applied Mechanics and Materials
Vol. 693
Vol. 693
Applied Mechanics and Materials
Vol. 692
Vol. 692
Applied Mechanics and Materials
Vols. 687-691
Vols. 687-691
Applied Mechanics and Materials
Vol. 686
Vol. 686
Applied Mechanics and Materials
Vol. 685
Vol. 685
Applied Mechanics and Materials
Vol. 684
Vol. 684
Applied Mechanics and Materials
Vol. 683
Vol. 683
Applied Mechanics and Materials
Vol. 682
Vol. 682
Applied Mechanics and Materials
Vol. 681
Vol. 681
Applied Mechanics and Materials
Vol. 680
Vol. 680
Applied Mechanics and Materials Vol. 686
Paper Title Page
Abstract: The paper study the software and hardware principles of ultrasonic ranging reversing radar, design the vehicle reversing radar based on intelligent node of CAN bus, realize data communication and resource sharing with other intelligent nodes of the reversing radar. The experimental results show that, the design can achieve the expected technical indicators design, measurement precision and the reliability is high, which has certain guiding significance in the design of the car reversing radar, has wide application prospect and practical significance in the function of the extended CAN bus communication messages design and automotive CAN network.
448
Abstract: The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which includes firewall system, VPN system etc.. The system can meet the requirements of network security and the goals of design network security.
453
Abstract: The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools.
458
Abstract: Along with the completion of HGP (human genome project), huge amounts of genetic data constantly emerge. Research suggests that genes are not in independent existence and the expression of a gene will promote or inhibit the expression of another gene; if the expression of a gene makes the biochemical environment of cells changed, the expression of a series of genes will be affected. In order to get a better understanding of the relationship between genes, all sorts of gene regulatory network models have been established by scientists. In this paper, a variety of gene regulatory networks are first introduced according to the process of this subject research, and then the most basic network (i.e. Boolean network) is emphatically analyzed, and then a new method (i.e. Boolean network based on the theory of circuit) to describe Boolean network is drawn forth. After the shortcomings of the Boolean network proposed in the past are analyzed, a simulation circuit Boolean model is established using EDA technology in order to improve the Boolean network.
463
Abstract: This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments.
470
Abstract: This paper compares Ceramic Decal design and traditional printing design through computer; show the innovation advantages of computer Ceramic Decal design prominent, such as computer color advantage, computer design software brings innovation advantage. The computer brings to the thinking innovation advantage and computer Ceramic Decal design than the traditional ceramic decal in the design process. Through the design advantage that computer has very important influence and significance of ceramic decal.
477
Abstract: Research and development design is involved with inflatable lifting web professional boots in architecture industry limited space installation work technology field. This web-based boot includes boot body, lifting device and support to support the feet and the lifting device to fix on the boot body. The support uses the lifting device to connect to the bottom of the boot body, and through the lifting device function, it can have lifting displacement to the boot bottom. The workers put foot fixed on the support, so as to make the inflating lifting boots walk along with the workers. The adjusting lifting device can make support member move far or near the bottom direction of boot body. The workers can lift higher or lower along with the support. The workers can adjust the lifting device according to specific work height, without using or moving ladder or stool, to save time and improve the work efficiency.
482
Abstract: The paper mainly discusses the application of BIM technology in computer aided architectural energy efficiency design. First the paper analyzes the development and characteristics of BIM analysis software, discusses the present situation of computer aided architectural energy efficiency design. Taking Chongqing area as an example, the paper were discussed simulation software and application of BIM technology from the scheme design stage and anaphase to illumination analysis, so as to provide reference for the future research and application.
486
Abstract: High speed and large capacity belt conveyor is the main development trend. In the design, calculated and used of belt conveyor must be considered the high speed, large capacity, dynamic load. This paper starts from the analysis of conveyor belt transverse vibration. Through calculate transverse vibration natural frequency of conveyor belt, and analyze the lateral stability of belt conveyor.
491
Abstract: This paper first analyzes the NC simulation and NC machining process of curve bevel gear, and provides the basic equations and the formulae in detail based on the CNC 3 axis linkage machine tool cutting. Directly to takes the rotation angle of the work gear as machine tool motion parameters, the axes of other motion work piece express the gear angle function. Finally, according to the characteristics of curve bevel gear, we select reasonable processing technology, setting processing parameter of curve bevel gear, then test the tool path simulation and program processing, and finally the use of CNC milling machine with three linkage process curve bevel gear.
497