Applied Mechanics and Materials
Vol. 723
Vol. 723
Applied Mechanics and Materials
Vol. 722
Vol. 722
Applied Mechanics and Materials
Vol. 721
Vol. 721
Applied Mechanics and Materials
Vols. 719-720
Vols. 719-720
Applied Mechanics and Materials
Vol. 718
Vol. 718
Applied Mechanics and Materials
Vols. 716-717
Vols. 716-717
Applied Mechanics and Materials
Vols. 713-715
Vols. 713-715
Applied Mechanics and Materials
Vol. 712
Vol. 712
Applied Mechanics and Materials
Vol. 711
Vol. 711
Applied Mechanics and Materials
Vol. 710
Vol. 710
Applied Mechanics and Materials
Vol. 709
Vol. 709
Applied Mechanics and Materials
Vol. 708
Vol. 708
Applied Mechanics and Materials
Vol. 707
Vol. 707
Applied Mechanics and Materials Vols. 713-715
Paper Title Page
Abstract: Because of complicated security policy collisions and twisted interest conflicts in network domains, inter-domain routing security has been a challenge of secure routing. At present most of related researches focus on the authentication of routing source and true path, but seldom addresses another point of whether the routing decision process matches expected policy. In this paper, a multipath inter-domain routing decision verification protocol was designed, which can verify whether an autonomous domain (AD) keeps its promise about choosing appropriate M from N paths that have the same destination and are received from upstream ADs, and sending to a downstream AD. According to the analysis, the protocol is valid and can protect privacy of participants, as well as can resist attacks such as forgery, modification and replay etc. and deploy on internet incrementally.
2269
Abstract: The balance of signed structures is defined in complete network. The local and global sign adjust rules in imbalance structure are designed under the first structural theorem. Complete linked network model is built. The convergent process of balance triangles was simulated and the results under local and global sign adjust rules were compared carefully. The impact of network size and nodes’ balance requirement on network global balance ratio are analyzed carefully.
2276
Abstract: This paper introduces a method of network status feedback and realization based on the analysis of big data. Firstly, millions of structured log of session related were converged to HDFS via Flume System. And then the data of session setup time and session success rate were acquired by Hive or Pig. The function of the two variables has been given by MATLAB. Finally, this function has been integrated in the bottom SDK. It can reflect the state of the network accurately, thus eliminating the anxiety state of users. It can well ease the tense mood of users who are waiting for the results coming from server. Obviously, this approach can improve the user experience.
2280
Abstract: This paper aims to analyze passenger flow in subway based on a kind of rational spline weight function neural network, in which the numerator of the spline is a cubic polynomial and the denominator of the spline is a quadratic polynomial, and this kind spline is denoted by 3/2 rational splines. There are many factors affecting the passenger flow. Combined the main influential factors with the self-learning method of neural network, we establish the neural network model of passenger flow in subway. This paper introduces the spline weight function neural network and the passenger flow model based on this neural network. Finally MATLAB simulation verifies that the 3/2 rational spline weight function neural network can be applied to analyze the passenger flow in subway with high accuracy.
2284
Abstract: Collaborative filtering recommendation is a mainstream personalized recommendation method, which has some flaws in actual application. And there are some inaccurate recommendation results in some cases. Considering the relationship of trust and similarity of user preference, this paper introduces trust to recommendation model and considers multi-dimensional factors of user preference, proposes a personalized recommendation method based on trust and preference. The recommendation method can improve the accuracy of recommendation system. Finally, this paper proves effectiveness of this recommendation method through the experiments.
2288
Abstract: Today, digital protection has been widely used in the power system.Its reliability directly affects the safety operation of the entire system.However, the current study focused primarily on hardware reliability, less digital protection software reliability study.The purpose of this article is to study digital protection software reliability assessment method based on software module structure. Through the existing digital protection software reliability, performance and agility make quantitative prediction and evaluation, we analye the reliable type of digital protection software.This paper uses a "gray box" approach, namely the use of I-M chain approach. Then we come true the reliability analysis of digital protection software.
2292
Abstract: LEACH is a classic wireless network routing protocol, the large energy consumption of LEACH cluster heads leads to the load imbalance of network nodes in order to shorten the life of network, the paper proposed an improved LEACH-M protocol to solve the problem, so that the shortest path between cluster heads and base station is formed, finally the NS2 simulation results show that the load balance of network is improved, and the lifetime of network is extended.
2296
Abstract: In this paper, conception, structure, key technologies of Internet of Things are described. According to the characteristics and trend of equipment support in informative war, equipment precise support system based on Internet of Things is put forward. Through layering research of precise support system, overall structure of the system is designed, main functions of the system is described in detail, a theoretical basis is laid for development of system.
2300
Abstract: This paper mainly studies Ihome, the application of smart home, which provides a cloud service background, based on the distributed and intelligent control and a series of control terminals, smart sensors, to let the family consumers can fast, easy to build an extensible intelligent home solutions. In addition, intelligent control, control terminals, smart sensors can also be integrated in the intelligent community.
2304
Abstract: In the protocol of Ad Hoc network, the AODV routing protocol is the on-demand distance vector routing protocol. Because of its low cost and simple realizing, it is the hot point of wireless ad hoc network researches. This paper researches the mechanism of the AODV routing protocol, analyses its limitations and proposes a pre-judgment based on the link quality. It avoids using the local path restoration algorithm AODV-LQP in unstable area. Before the break of the low quality link, starting the link reparation will avoid the restoration in data transportation. The simulation experiment shows that the improved algorithm reduces the average time delay of end to end, and augments the packet delivery ratio.
2308