Applied Mechanics and Materials
Vol. 697
Vol. 697
Applied Mechanics and Materials
Vol. 696
Vol. 696
Applied Mechanics and Materials
Vol. 695
Vol. 695
Applied Mechanics and Materials
Vol. 694
Vol. 694
Applied Mechanics and Materials
Vol. 693
Vol. 693
Applied Mechanics and Materials
Vol. 692
Vol. 692
Applied Mechanics and Materials
Vols. 687-691
Vols. 687-691
Applied Mechanics and Materials
Vol. 686
Vol. 686
Applied Mechanics and Materials
Vol. 685
Vol. 685
Applied Mechanics and Materials
Vol. 684
Vol. 684
Applied Mechanics and Materials
Vol. 683
Vol. 683
Applied Mechanics and Materials
Vol. 682
Vol. 682
Applied Mechanics and Materials
Vol. 681
Vol. 681
Applied Mechanics and Materials Vols. 687-691
Paper Title Page
Abstract: The paper introduces the concept and general situation of Internet of Things technology system. From Hubei province development status and agriculture application level, we proposed a intelligent agriculture management system based on Internet of Things that can long distance inert high speed. According to project implementation condition, summarized the problem of agriculture Internet of Things in the development, discussed study direction in the future.
1868
Abstract: According to the automobile industry cluster situation at present, the paper introduces the method and train of thought of automobile industry cluster based on GIS from demand analysis, data base design, function design and so on. Also demonstration analysis in one automobile industry cluster. In construction, use client layer, web layer, business logic layer and data layer to design the system architecture. It improved the system maintenance performance, used Oracle and ArcSDE to access space data and attribute data, and mass data storage management. Research results maybe give some significance reference for design and implementation of automobile industry cluster.
1872
Abstract: Internet gambling crimesas same to general gambling crimes is a complex social phenomenon. And it present fast development, a wide range of effect and deep degree of harm. According to the characteristics that it is diffculty to find investigation and eradicate in practice. The investigation should find it difficult for online gambling crime, investigation and evidence we should strengthen awareness initiative investigation about the investigation uncover clues.Adopt a multi-force investigation coordinated operations multisectoral ideas, strengthen the investigative mechanism about related cases andeffectively combat internert gamblingcrimes.
1876
Abstract: With the development of computer network technology, Java has a fairly extensive use of die circumference. Especially in recent years, the development of the smart phone system is also stimulated the use of the Java language. In this paper, Java server is mainly divided into two categories JSP server and Java EE servers. Java EE function which has more features than perfect JSP servers. Application server is a chief platform of Web-based application. J2EE is a standard of enterprise-scale application server. In this paper J2EE is analyzed from the point of view of software architecture and Java-based application development. Some defects of J2EE are pointed out, such as J2EE being unable to support version management and it having diverse concepts and notions due to its multi-tier architecture. Furthermore, a light weight application server—J Web Frame is developed, which overcomes some problems of J2EE.
1880
Abstract: With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.
1884
Abstract: As a new generation network model, Internet of Things (IOT) is the integration and expansion of traditional network and technology. Traditional network security and technical security problems still exist in the system of IOT, but it also add more private information and involve a number of confidential information. Security management, security and other information security issues has been put forward higher requirements. This paper gives simple description for the concept of things, the architecture and core technology and summarily describes the response to network security networking security technology.
1888
Abstract: With the rapid development of network technology, the network security related threats are more and more serious at present. To guarantee the security of the network, now the main defense technology is static, but the static defense technology don’t change with the corresponding preventive measures change and unable to attack intention and attack strategies. Based on the analysis of the current situation, this paper mainly analyses the dynamic non cooperative game theory, and applied the theory to network security prevention, and achieved good results.
1892
Abstract: In order to improve the component dynamic test efficiency, this paper proposes a keating component built-in test case generation method of genetic algorithm and designs the chromosome coding method. The test point and keating component facet description of dynamic test data generation method. Mass in order to improve the generation of test cases and add Yang the convergence speed of genetic algorithm. We improve the algorithm of the method for calculating the fitness function and fitness function not only consider the case of path coverage, but also considers the path coverage rate of increase, thus effectively improved the path coverage and reduce the Yang cases produce cost.
1896
Abstract: With the increasing volume of E-commerce transactions in China, trust issue in E-commerce is increasingly prominent, which has been one major bottleneck of the sound development of E-commerce in China. This thesis aims to analyze the reasons for the lack of trust in E-commerce by starting with C2C E-commerce platform, and to analyze the main factors influencing the trust conduct of transaction bodies and put forward suggestions for improving credit system through the use of the static game theory.
1900
Abstract: Forensic DNA analysis software is dedicated with forensic DNA testing platform matching data analysis tools, which can realize the platform acquisition, pretreatment of DNA data analysis and deep processing. It realizes the automation of forensic DNA testing process, further to get rid of dependence on foreign analysis software of DNA testing technology in China. It has a good prospect of popularization and application.
1904