Advanced Materials Research Vols. 129-131

Paper Title Page

Abstract: The Aim—this paper is to investigate whether there is a certain kind of organizational modes for cooperative technological exploitation. In recent years, an important objective of cooperative R&D alliances built by independent organizations is to explore a new market or to exploit the existing one. Whether the objective can be achieved or not is tightly related to the governing efficiency of the R&D alliance, and the latter in turn depends on the suitable organizational mode. The Method--this paper selects 39 Heating Ventilating and Air Conditioning companies listed in Shanghai and Shenzhen Stock Exchange according to some certain criteria, and collects their collaborative R&D cases since their listing, and then analyzes the impact of technological exploitation objective to the selection of cooperative R&D organizational modes in light of LOGIT model. The result—this paper shows that the equity mode is prior to the non-equity one no matter the R&D alliance is to explore a new market or exploit the existing market.
1394
Abstract: Sensor assignment is an important issue in the collaborative tracking, a good sensor assignment method can improve the efficiency of collaborative tracking. This paper proposes a filtering based sensor assignment modeling method. The method uses relation of set theory to establish the sensor target assignment scheme model, combines the sensor assignment scheme with the filter, regards each sensor detect program as an filtering, and chooses the best scheme according to error upper limit of filtering. This modeling method does not need assumption of statistical characteristics of the target.
1400
Abstract: The research was carried on centered about the key technology in the Proxy Mobile Ipv6 networks. The frame based on multi-level domains multicast agent was proposed. And the multi-level domains multicast agent who can be collocated easily was also introduced. The different service area of multi-level domains multicast agent is overlapped which can avoid “single point of failure.” The router advertisements of Ipv6 discovered the dynamic change of availed multi-level domains multicast agent and network topology. An ASMM (Auto Study Mobile Multicast) program was proposed on the based frame of multi-level domains multicast agent. The way of sending multicast data in outer region can be chosen neatly taking advantage of the number of mobile host in outer region according to the network situation in this program instead of sending multicast data in only one mode which achieved seamless handover. In recent years, the rapid development of internet and mobile networks makes people demand the combination of internet and mobile networks more and more eagerly which can provide extensive business for mobile users. And multicast is a very promising technology in mobile network. It can enable a group of mobile users to receive the message from the same business source at the same time which improved network efficiency greatly [1]. The mobile multicast technology is facing many problems. Firstly, all multicast technology was designed for fixed host; the multicast tree established on these agreements can be changed easily. And it will cost much if it is changed; Secondly, The mobile multicast technology not only considers the dynamic change of every group members but also the location dynamic change of every group members [2, 3]. So, the mobile multicast technology is a research focus at present. IETF and many researchers proposed much mobile multicast agreement. But these agreements have different inadequateness.
1405
Abstract: With the flouring development of network-application, the importance of network security and its information security has become a greater concern for the computer users. This paper focuses on the study of the speed of detection, which is so far the most challenging problems in network intrusion detection. In practice, double-array hashing space method is applied in order to solve the problem of the big hashing space; according to features of data-package and those of attack-string, hashing -function is selected because of its high speed and efficiency; and the speed of detection is improve through the decrdasd of the times of detection to network package by applying various characteristic-string of the sane length with their corresponding pattern. There are many methods to achieve network security, and intrusion detection technology is a very effective mechanism [1]. It is a technology that could detect the current attack or attack happening inside computer system. At present, there are several different pattern match algorithms that are used for the attack detection of effective load for packet. No matter what optimization is made, they all could not get rid of a weakness: must match item by item for each mode that indicates attack characteristics [2-5]. So the packet to be detected shall be scanned for many times, and the scanning time is equal to the quality of mode; meanwhile, detection system also establish and manage heuristic function for each attack mode, and adjust detection order of attack mode, so system has rather big burden, and has difficulty to promote the detection efficiency. This is the fundamental problem causing low detection efficiency of effective load of packet [6]. Is it possible to design a detection algorithm which could build heuristic function from the perspective of whole attack model base and could detect all the attack models at the same time This article uses hashing-method to discuss this problem, and finds that the attack probably existing could be found by several scanning for packet. In addition, network intrusion detection rule base is network IDS detection engine using model matching detection method, which is the standard for checking the captured packet. Snort is intrusion detection system based on network. This description method is simple, easy to achieve, and could describe most of the intrusion activities. Therefore, this article adopts the intrusion activity description method of Snort intrusion detection system, and introduces the rule base of Snort intrusion detection system as the rule base of this article for the foundation of design and demonstration of hashing detection scheme.
1410
Abstract: Earth berms are often used for the temporary support of embedded retaining walls,but there is a lack of information concerning the factors that influence their behaviour. It is shown that earth berms will probably be more effective in reducing soil and wall movements than an increase in the depth of wall embedment.
1415
Abstract: Through the research on intrusion detection and artificial neural network, this paper designs an intrusion detection system based on artificial neural network, in detail describes the theory and implementation of all modules, and then carries out test and analysis for it, the results show that it has great advantages in web-based intrusion detection.
1421
Abstract: This paper presents a security protection model of logs from the aspect of the system security architecture and technical feasibility, describes complete system architecture according to the system design objects, and gives the design process of each module in this system. Finally the proposed algorithm for association rules mining is experimentally tested in the network security audit system and there are satisfactory results.
1426
Abstract: Through the research of current video data acquisition, this paper presents a design program for the video data acquisition system based on Linux system. The system has a modular design idea, and the various parts of which are coordinated with each other to form a complete image video acquisition system. The real-time multi-task mechanism of Linux operating system can not only meet the real time requirement, but also has good scalability.
1432
Abstract: Combining with the advantages of ant colony algorithm to solve optimization problem, this paper designs a grid resource allocation model and task scheduling system based on ant colony algorithm. The algorithm can not only locally update for the pheromone in the allocation of grid computing resources, but also can entirely update for the pheromone after the completion of grid computing resources. Experimental results show that the ant colony algorithm can effectively achieve a reasonable task scheduling and load balancing, its application in the task scheduling in grid environment is very successful.
1438
Abstract: . In view of the application problems of integrated C/S framework in the existing single sign-on system, a safe, efficient and scalable enterprise integration logging-on system scheme which can integrate the structure characteristics of B/S and C/S is proposed in this paper, this scheme can focus on publishing application systems, management login and applying operation, and it has been carried on application verification by enterprise users in practice.
1444

Showing 281 to 290 of 290 Paper Titles