Applied Mechanics and Materials
Vol. 697
Vol. 697
Applied Mechanics and Materials
Vol. 696
Vol. 696
Applied Mechanics and Materials
Vol. 695
Vol. 695
Applied Mechanics and Materials
Vol. 694
Vol. 694
Applied Mechanics and Materials
Vol. 693
Vol. 693
Applied Mechanics and Materials
Vol. 692
Vol. 692
Applied Mechanics and Materials
Vols. 687-691
Vols. 687-691
Applied Mechanics and Materials
Vol. 686
Vol. 686
Applied Mechanics and Materials
Vol. 685
Vol. 685
Applied Mechanics and Materials
Vol. 684
Vol. 684
Applied Mechanics and Materials
Vol. 683
Vol. 683
Applied Mechanics and Materials
Vol. 682
Vol. 682
Applied Mechanics and Materials
Vol. 681
Vol. 681
Applied Mechanics and Materials Vols. 687-691
Paper Title Page
Abstract: Wearable device has a huge application market recently, intelligent glass is an important application of wearable device. In this paper, we propose a design of intelligent glasses based on Android platform, which realizes the function of engineering and entertainment. Miracast enables wireless delivery and shares a screen in real-time. Combined with SI – ASR (Speak-Independent Automatic Speech Recognition), Bluetooth and other hardware technology, it realizes the voice control, data and audio signal transmission. The function of intelligent glasses is expanded through the software diversity of smart mobile terminal.
2587
Abstract: LD3320 is a high-performance speech recognition module which is made in ICR company. It can achieve non-specific voice recognition feature of a limited vocabulary. The chip does not require the user for record training, with a identify dynamically editable key words list, we just need to put the key words in the chip, which can take effect immediately in the next recognition. The design on the basis of Android platform, combined with non-specific speech recognition module, Bluetooth technology enables voice control hardware, design of a set of older self-aid devices.
2591
Abstract: Group technology is the study of things similarity, combining with computer technology, open up a new integrative approach of computer aided design, production process automation and production management automation. The object group technology is to build Group to manage various objects during the CAD software application. Feature modeling technology is the foundation of the CAD system object group technology. Based on the mainstream 3D design software NX, the object group technologies including feature group, sketch Group and constraint Group are discussed in this paper. In addition, the group technology in AutoCAD and Pro/E is introduced simply. In the process of modeling and assembly, the application object group technology simplifies the operation steps and speeds up the design and reliability
2595
Abstract: To solve the logistics information system based on GIS application problems of small and medium-sized logistics enterprises, the software architecture of the traditional logistics information system and system based on GIS technology is analyzed, and their advantages and defects are pointed out. On this basis, a kind of service oriented four layers logistics system architecture based on components GIS is designed, using ArcSDE and ArcIMS as GIS platform, the detailed deployment of the architecture are given. The relationships between the infrastructure layer, the spatial information support layer, the service support layer, the business application layer and the components are Expounded. The architecture features of business agility, loose coupling of system interface, combine and reusability of functional components are verified by its prototype system.
2599
Abstract: As the second line of defense, intrusion detection is the necessary means of getting the high survivability. Intrusion detection technology and its classification is described in this article. And based on the features of Ad Hoc network, the existing new network intrusion detection technology and its characteristics suitable for Ad Hoc network are summarized.
2603
Abstract: The network management system based on WEB has been becoming the current hot spots. The paper discusses the advantages and significance of WBM fully to discuss the possibility of a network management system based on JAVA implementation. Based on the SNMP protocol is proposed based on ARP protocol and network topology search found based on ICMP protocol and topology reconstruction. SNMP access to treatment and MIB information structure and based on the MIB information acquisition. Application server search and real time function and the realization of the corresponding technology such as network service monitoring method. And on the Linux platform, using TOMCAT as a JSP interpreter, information storage, publishing technology and by using XML and JAVA platform compatibility technology is verified to above ultimately proved: the network management system based on JAVA and XML can completely meet the requirements of network management has good feasibility and practical application value.
2607
Abstract: In this paper, a new method which is named DRNFD for network troubleshooting is brought forward in which “abnormal degree” is defined by the vector of probability and belief functions in a privileged process. A new formula based on Dempster Rule is presented to decrease false positives. This method (DRNFD) can effectively reduce false positive rate and non-response rate and can be applied to real-time fault diagnosis. The operational prototypical system demonstrates its feasibility and gets the effectiveness of real-time fault diagnosis.
2611
Abstract: this article researches the network information security, designs the safety monitoring system of network information that's based on intrusion detection and system log. Moreover, it introduces the design concept, design framework, function module, and encoding realization of this system. Then, we can find out the testing process and the result.
2618
Abstract: As the second line of defense, intrusion detection is the necessary means of getting the high survivability. Intrusion detection technology and its classification is described in this article. And based on the features of Ad Hoc network, the existing new network intrusion detection technology and its characteristics suitable for Ad Hoc network are summarized.
2622
Abstract: Because the IRP (I/O Request Packets) sequences of programs are not identical in different environments in the same operating system, which have a certain influence on the detection results. Through a lot of experiments, we found that the IRP request sequences of programs on the same operation path are consistent. Therefore, the new malware detection method based on the path IRP sequences is proposed. Every single IRP request sequence on the same operation path is extracted, Negative Selection Algorithm (NSA) and Positive Selection Algorithm (PSA) are used for detection. Experimental results reveal that our method outperforms the method which based on IRP sequences in detection rate.
2626