Advanced Materials Research
Vol. 1086
Vol. 1086
Advanced Materials Research
Vol. 1085
Vol. 1085
Advanced Materials Research
Vol. 1084
Vol. 1084
Advanced Materials Research
Vol. 1083
Vol. 1083
Advanced Materials Research
Vol. 1082
Vol. 1082
Advanced Materials Research
Vol. 1081
Vol. 1081
Advanced Materials Research
Vols. 1079-1080
Vols. 1079-1080
Advanced Materials Research
Vol. 1078
Vol. 1078
Advanced Materials Research
Vol. 1077
Vol. 1077
Advanced Materials Research
Vols. 1073-1076
Vols. 1073-1076
Advanced Materials Research
Vols. 1070-1072
Vols. 1070-1072
Advanced Materials Research
Vols. 1065-1069
Vols. 1065-1069
Advanced Materials Research
Vol. 1064
Vol. 1064
Advanced Materials Research Vols. 1079-1080
Paper Title Page
Abstract: In today's era of big data, how to quickly find the data they need is a difficult thing from the mass of information, in order to achieve this goal, cloud computing to data mining technology provides a new direction, this article on how cloud environment attribute Reduction using data mining techniques are described.
779
Abstract: This paper discusses the problem of sharing information technology in Research Information Management using WEB Services, Meanwhile a detailed description of the WEB Service Technology using in Management Information System.
782
Abstract: With the rapid development of wireless network technology, according to the actual need, the computer network group network type and each node has different function, so that the computer network system has node complexity, structure complexity and various other complexities. For these reasons, the large scale computer network can be treated and researched abstractly as specific Chirp-UWB network. Therefore, to keep up with the trend of technology progress by means of computer wireless technology, aided design of wireless communication system, it is quite necessary for the implementation of computer management of production safety.
787
Abstract: thedevelopment of modern logistics industry, has been unable to leave the support of computer network. This paperbriefly introduces the modern logistics and computer network technology relatedconcepts, analyzes the characteristics and results of information system ofmodern logistics, and discusses the construction of the security defensesystem, with a view to promoting to a certain function of the construction oflogistics information system based on computer network technology under.
791
Abstract: The new visual design is a visual design forms a channel of communication and computer software tool based on digital media. Compared with the traditional visual design manifestation, new visual design not only has the stereoscopic effect, also has interactive and multi-dimensional display, is a new form of digital media design based on visual performance.
796
Abstract: Fischeris a classic dynamic resource allocation algorithm, and the optimizationcriterion is to minimize the system error rate base on a constant bit rate andsystem power. However, the Fischer algorithm is still have problems with highcomplexity, and it require long time to calculate, all these problems making itdifficult to use in an actual system. This paper is an improvement on Fischeralgorithm, the improved algorithm will keep the same error rate, reducing thecomplexity, shortening the arithmetic operation time and increasing thepracticality of the algorithm.
799
The Practice and Evolution Research of the Enterprise Data Communications Network to IPv6 Technology
Abstract: Enterprise data communication network is the fundamental transmission platform of carrying all kinds of business. With the technology development of smart grid and the Internet of things, a large number of addressable, independently managed entities are emerged. The address space, QOS and security mechanism of data communications network are put forward higher requirement. Technology system of the enterprise data communication network was described in detail. The key evolution technologies of MPLS VPN network to IPv6 was focused on. At the same time 6VPE technology was used to practice effectively. The evolution route about the enterprise data communications network was put forward, which can be a foundation for the next generation Internet technology in the enterprise application.
802
Abstract: In order to realize the real-time and effective supervision ofconstructors’unsafe behavior, we put forward to apply RFID technology to thereal-time supervision of unsafe behavior.According to the analysis of factorsthat influence constructors’ unsafe behavior in the process of theconstruction, using the functionof RFID technology for information storage andreal-time location,so as to build subsystem based on static factors andsubsystem based on dynamic factors. We apply this system to realize real-time supervisionof constructors’ unsafe behavior.This technical method solves the deficiency oftraditional management methods ignoring constructors’ internal factors and letsreal-time supervision come true. In the end,it could improve safety managementperformance in construction site.
807
Abstract: With the rapid development of internet and information technology, XML has become the important standard for information exchange and denotation 011 the internet, thus that how to manage the XML document in an efficient, systematic and scientific way has become a great challenge in the field of databaseXML regarded as data interchange’s foundation has a lot of advantages,but regard it as the datum store way it has many disadvantages such as no efficient data structure and indexing structure,poor query ability.This paper recommend a new technology for the storage and management of XML dam,including the work that design of data schema,design the interface and implement it with.NET.Direct against the problem that what past XML file is stored and inquired,this paper have introduced the data schema in RDBMS the XML file emphatically, and introduced functions,the inquiry and statistics based on this data schema
812
Abstract: With the development of computer network and rapid popularity of Internet, network information security has become the focus of safeguarding national security and social stability. In the network security event, the hacker often can’t successfully intrude into the network by means of a single host / services hacker. With the help of various kinds of "vulnerability" generated bydifferent relationship existing in multiple point multiple host, the hacker can achieve the purpose of network intrusion. Therefore one important aspect of network security is after obtaining the vulnerability of the network information, considering a combination of multiple exploits and analyzing the attack path of network penetration attacks that the attacker may take.
816