Advanced Materials Research
Vol. 769
Vol. 769
Advanced Materials Research
Vol. 768
Vol. 768
Advanced Materials Research
Vols. 765-767
Vols. 765-767
Advanced Materials Research
Vol. 764
Vol. 764
Advanced Materials Research
Vol. 763
Vol. 763
Advanced Materials Research
Vols. 760-762
Vols. 760-762
Advanced Materials Research
Vols. 756-759
Vols. 756-759
Advanced Materials Research
Vols. 753-755
Vols. 753-755
Advanced Materials Research
Vols. 750-752
Vols. 750-752
Advanced Materials Research
Vol. 749
Vol. 749
Advanced Materials Research
Vol. 748
Vol. 748
Advanced Materials Research
Vol. 747
Vol. 747
Advanced Materials Research
Vol. 746
Vol. 746
Advanced Materials Research Vols. 756-759
Paper Title Page
Abstract: The upgrading and optimizing of industrial structure is a significant choice for the developing countries. This paper arranges the input-output table of four departments from the input-output table of Shandong Province in 2002 and 2007, and analyzes the influence of information industry on other industries by using influence and sensitivity coefficients. In order to reflect the association relationship between information industry and others, we use Structural Decomposition Analysis (SDA) Model to analyze the relationship between the change of information industrial structure and the cause of the growth of total output, which is actually industrial association relationship based on total requirement. Furthermore, an empirical example is provided to illustrate the effectiveness and practicability of the proposed method.
787
Abstract: The rapid development of computer network technology and information technology, brings greatly facilitate and enrich people's lives for information transfer and fast access, improves work efficiency. At the same time, the network information security is followed. How to ensure the network information is transferred security, which is the problem that various network information systems must face, and also a difficult and hot issue to be researched. In this paper, a variety of effective network security technologies are studied and corresponding implementations are provided for the information network system in the university.
791
Abstract: We use of CAS for business information resources to integrate theoretical analysis of the complexity and finish in a swarm of modeling and simulation platform model runs. In the analysis, we constantly adjust system, to observe changes in the simulation results. And finally we found for the system, that the higher the integration of the enterprises and market share on enterprises competitiveness has obvious advantages.
796
Abstract: The rapid development of computer technology, internet technology and multimedia technology has an increasingly profound impact on education. The importance of multimedia network teaching has been fully affirmed, and the quality of network teaching resources is the core, which is directly related to the effectiveness of teaching. Some practicable methods on resource construction and management of multimedia network teaching are proposed in this paper, to standardize teaching resources, realize resource sharing, improve teaching quality and management effectiveness and at the same time meet the needs of digital learning.
800
Abstract: The early warning can constantly improve the monitoring and management of the hazardous sources to realize advance prevention and control. Many early warning methods do not predict and imitate the hazard sequel and the early warning information in incomplete. This essay analyzes and studies the early warning process of the hazardous sources, hazard assessment techniques and analyzes the hazardous sources quantitatively and qualitatively. This essay combines effectively the imitation of the hazard sequel and the early warning technology, proposes hazardous sources security early warning procedure information processing system structure and designs models for processing early warning information of the hazardous sources, improving the early warning of the hazardous sources and increasing the accuracy and efficiency of the prior warning. Combining with cases, it performs imitation of the hazard sequel of leakage accident. Practices have shown that the proposed imitated early warning structure and methods are efficient. The imitation result is nearly matched with the fact. The early warning gets satisfied effect having certain practical value.
804
Abstract: The development of E-Commerce has become the main tendency, so the importance of website building should also be taken seriously. The paper designs a system of comprehensive evaluating depends on the basic demands of website building, and begins with four aspects, which mainly includes website function, website content, website implement and application, and website promotion. Then this paper establishes the judgment matrixes of A-B and B-C and check their consistency to get the assessment matrix of A-C based on the analytic hierarchy process (AHP), at last we get the total index weight rank which represents the important level of every specific index relative to the final goal. This research mainly aims at promoting the standardization development of website.
810
Abstract: In many safety-critical missions, more and more Multiprocessor Embedded Systems are used to provide the ability of fault tolerance. Using Operating System can easy software design and make software development more efficient. Because of the limited resource in Embedded Systems, many advanced technologies used in common desktop multiprocessor environment have not been used in Embedded RTOS yet. In this paper, we introduce the technologies of Virtual CPU Pool and Multiprocessor Processor Communication Interface to solve task distributing and communication between deferent CPUs. After using and mending uC/OS, I finally realize and test an Operating System in a kind of SMP multiprocessor hardware module successfully.
814
Abstract: There are two main problems to store the system data on single machine: limited storage space and low reliability. The concept of distribution solves the two problems fundamentally. Many independent machines are integrated as a whole. As a result, these separated resources are integrated together. This paper focuses on developing a system, based on SSH, XFire and Hadoop, to help users store and manage the distributed files. All the files stored in HDFS should be encrypted to protect users privacy. In order to save resources, system is designed to avoid uploading the duplicate files by checking the files MD5 string.
820
Abstract: Pv6 protocol, which should replace the actual IPv4 protocol, brings many new possibilities and improvements considering simplicity, routing speed, quality of service and security. In the case of the normal working of the existing IPv4 campus networks, this article puts forward the strategy to access Cernet2 for campus network and all stages network architecture of campus network transitions to IPv6 network. According to the different stages, we can select suitable transition mechanism to achieve the interoperability of the whole network.
824
Abstract: ZigBee is an emerging standard for the low cost, low power and low rate wireless networks and the ZigBee technology is well suited to a wide range of energy management and efficiency applications in areas such as building automation, industrial, medical and home automation. ZigBee is a version of AODV routing protocol, where the routes are discovered RREQ through the network by the source broadcasting and sending RREP back the destination, so make ZigBee routing efficient, we used AODV mesh topology methods to send and receive data from source to destination and vice versa. In this paper we present an improved version of ZigBee-AODV mesh network, which utilizes and divide the topology of network into one or more logical clusters and restricts the flooding of route request outside the cluster. ZigBee-AODV mesh network uses nodes of the same cluster to share routing information, which significantly reduces the route path discovery and created cluster formation to decrease the routing path. The proposed protocol has higher reliability and lower overhead than AODV.
828