Advanced Materials Research
Vol. 769
Vol. 769
Advanced Materials Research
Vol. 768
Vol. 768
Advanced Materials Research
Vols. 765-767
Vols. 765-767
Advanced Materials Research
Vol. 764
Vol. 764
Advanced Materials Research
Vol. 763
Vol. 763
Advanced Materials Research
Vols. 760-762
Vols. 760-762
Advanced Materials Research
Vols. 756-759
Vols. 756-759
Advanced Materials Research
Vols. 753-755
Vols. 753-755
Advanced Materials Research
Vols. 750-752
Vols. 750-752
Advanced Materials Research
Vol. 749
Vol. 749
Advanced Materials Research
Vol. 748
Vol. 748
Advanced Materials Research
Vol. 747
Vol. 747
Advanced Materials Research
Vol. 746
Vol. 746
Advanced Materials Research Vols. 756-759
Paper Title Page
Abstract: By now, Attack Graph (AG) is widely applied to the field of network security assessment. In the AG, each vertex has a value that implies the probability of the exploit and each edge represents the relationship between the exploits. In this paper we design an AG model and propose an approach which integrates the AG model with the Dynamic Bayesian Network (DBN). The approach not only strengthens the rationality of uncertain reasoning, but also provides a quantitative assessment of network security status. We evaluated the approach by experiment. The results showed that our model is rather accurate and the performance of it is competitive.
2374
Abstract: ETM system is a complex product information management system based on JSP and MySQL. It contains three subsystems: product management system, material management system and IETM making system. This paper first introduces the IETM system, then focuses on the key techniques involved in the management process including product information management, the association between a product and its sub-products, the product tree caused by a damaged product, the product tree used to find the cause of failure, the performance table management, the conversion technology from product information data to a S10000D document, the conversion technology from S1000D documents to a Word document and the word name repetitive judgment.
2379
Abstract: With the quick development of information science, it becomes much harder to deal with a large scale of data. In this case, cloud computing begins to become a hot topic as a new computing model because of its good scalability. It enables customers to acquire and release computing resources from and to the cloud computing service providers according to current workload. The scaling ability is achieved by system automatically according to auto scaling policies reserved by customers in advance, and it can greatly decrease users operating burden. In this paper, we proposed a new architecture of auto-scaling system, used auto-scaling technology on batch jobs based system and considered tasks deadlines and VM setup time as affecting factors on auto-scaling policy besides substrate resource utilities.
2386
Abstract: Aiming at the difficulty in writing network security test programs, this paper designs and realizes a visualized network security test platform. It first defines a template for security test program, which encapsulates the commonly used network packet operations. Then it provides a visualized design interface, and saves the design results into description files. Finally it resolves the description files to form the security test program. This platform can simplify the design procedure, thus improve the efficiency of writing a network security test program.
2391
Abstract: In oil and gas exploration of Block K in Amu Darya basin Uzbekistan, the reservoir lithologies are mainly in different carbonate rocks, the more types of rocks, the more various reservoir space is, as a result, it brings some difficulties to the reservoir quantitative evaluation. Therefore, according to this situation that the difficulty in identification of complex carbonate lithologies is, in this study block, artificial neural network analysis method is used in this paper. The method combines mud logging, cutting, core data, well logging, studies logging response characteristics of the different types of carbonate rocks, establishes lithology identification index. In this study, the method is used in identifying the types of carbonate rocks, the identified result compared to actual rocks displays about 70.51~87.23%, and it plays the positive role for reservoir quantitative evaluation.
2396
Abstract: It has become a hot research topic that to improve the coordination performance of multi-robotic system by communication. With rapid development of wireless communication and robot technologies, multi-robotic system based on spread-spectrum technology has become product of combining two technologies. Code Division Multiple Access (CDMA) technology is applied in multi-robotic communication system here. According to the modified m-Walsh sequence got by the way of analyzing the relation characteristic of Walsh-code and m-sequence, the best direct sequence spread spectrum (DSSS) PN code and the improved RAKE receiver scheme are proposed, which satisfied the requirements of real-time performance, reliability and confidentiality in multi-robotic communication system, and have great significance for the research of multi-robotic communication system.
2401
Abstract: This paper explains in detail design and implementation of PCIe driver in Linux operating system, First of all, it introduces briefly characteristics of PCIe bus; secondly, it gives a detailed analysis of how to write PCIe bus driver and how to write PCIe device driver of virtex5 series FPGA development board; finally, a test program is wrote in the application layer to verify correctness and stability of PCIe driver.
2406
Abstract: Network fault location is the premise of fault repair. Event correlation technique is an important fault location strategy which has its own advantages, but this technique also has some defects. Automatic fault location has not been realized and it worthy further study. This paper proposes a fault location method based on event correlation and realizes a network fault location system, which uses the relationship of topological structure of network node to generate fault correlation graph and the adjacency matrix, and through the fault correlation algorithm to locate the sources of faults. At the same time, the fault data is stored in case retrieval library for next network fault location, the system improves network fault locating speed and reduces workload of network management.
2410
Abstract: In digital media area, exchange and evaluation of the animation works has become a prominent problem. In this paper, we develop an intelligent evaluation system of animation works based on E-learning portfolio, which can record students animation works and learning files in digitized form. It achieves a combination of quantitative evaluation and qualitative evaluation using fuzzy comprehensive evaluation and artificial intelligence technology. It can not only generate the scores, but also generate remarks automatically. This will facilitate teachers and students to exchange and evaluate animation works, and improve the quality of evaluation.
2416
Abstract: Aiming at the problems such as updating difficulty, searching slowly and calling inconveniently occurs in use of current 3D Standard Part Library, the method to classify Standard Part data by function and the corresponding operations of each type of classified Standard Part data are analyzed firstly based on the real application and management requirements of the 3D Standard Parts Data. Then, the conception and the architecture of the data driven 3D Standard Part library is discussed based on the goal such as quick retrieve, automatic modeling and dynamical update of the Standard Part data and the methods as well as the key technology to develop the data driven 3D Standard Part Library are discussed based on the Pro/E and Access.
2422