Advanced Materials Research Vols. 760-762

Paper Title Page

Abstract: The application and development of computer network system bring a great convenience for library management and readers. At the same time, the security of computer network system in library is faced with all kinds of threats. How to guarantee the security of library computer network system has become the most important question for each library. This paper analyzes the factors which affect the library network security, such as network hardware, network operating system and application system, data security and so on, and puts forward corresponding security strategies and solutions.
1241
Abstract: The complete Finite Element Model of vehicle with dummy inside is established. Through analyzing structure deformation and acceleration of the vehicle, the rule of energy absorption and dissipation is obtained, the dummys respond and the collision capability criteria of the head, chest and thigh are achieved. A comprehensive and credible appraisement about the frontal crash process and crashworthiness is proposed by analyzing the effect of the main energy-absorbing components, the transmitted route of the energy and the safety of the vehicle and occupant injury criterions.
1244
Abstract: Aircraft fire training simulators are key facilities in airport used for firefighters to do firefighting trainings. In order to protect the safety of firefighters, the monitoring system should be applied to monitor the internal environment of the simulator. In accordance with the requirements of the training environment, a kind of monitoring system based on MCU and GPRS communication components are built. The parameterized PID controller, the sensor detection module, the fan and spray drive module are consisted of closed-loop to achieve real-time control and regulation on the smoke and temperature of the internal simulator. Using GPRS module, the internal scenes of the simulator are sent to the command center through the information transmission system. Based on the information transported from training site, command center can take the appropriate training programs to guide firefighters. Use this system, the training safety is ensured and the training efficiency is improved at the same time.
1250
Abstract: Explosively Formed Projectile (EFP) is a new branch of the shaped charge technology. It is developed as an anti-solid target technology in recent decades. Velocity of EFP changes quickly with the change of EFP shape. It is very important to research the velocity and morphology change of EFP in their movements to improve its performance. In this paper, theory of the exploding forming effects of EFP is analyzed, the working principle and design process of the EFP test system are introduced, and a particularly detailed description of the structures is given. The way of assembling test system and the process of data processing in the experiment are described. The experiment result shows that this system has a bright application future in the area of the EFP test, and it is worthy to further study.
1254
Abstract: With FPGA as the host controller, a set of hardware system based on digital micro-mirror device (DMD) for compressive imaging (CI) was developed. This paper studies the principle and characteristic of DMD control. First, the data of PC Screen image is transferred to DMD driver by software using binary pulse width modulation (BPWM) technology. The data is then rewritten into a control single which finally directs the DMD. The test results proved that the digital image received can be loaded onto the micro-mirrors excellently and with optics module installed, the system could successfully implement the CS measurement patterns which satisfy CI system.
1259
Abstract: This paper presents a method to locate the personnel in the coal mine. ZigBee wireless transmission mode is used to transfer the person location information to the groud.location hardware system includes three components, first one is ZigBee terminal mobile node, which is installed on the body of miners, the left is ZigBee router and ZigBee coordinator, which can obtain the wireless power in the miners place, combined with the RSSI ranging algorithm, can obtain the miner location. The software is used to store the information about the historical location information and others, display the miner location on the underground using the GIS technology. The field application result shows the miner location accuracy of this system is about 3 meters, which is helpful for miner management and accident processing.
1263
Abstract: Due to fast development of information technology, the form of human war is changing from mechanization war to information war. Fire control system should be built from the platform-centric warfare into the network-centric warfare. With the widely use of big fire control, information war in future will greatly improve overall combat ability. This paper introduces the composition and principle of big fire control and its influence on operation efficiency of weapon system. From characteristics of operation war, the status and function of big fire control in future war are analyzed.
1269
Abstract: Lifting mechanism is one of the most important work system. Its design quality directly influences the using performance of mining dump truck. The dissertation takes large dump truck as research object, with the knowledge of the mechanism dynamics for the top rear lifting mechanism of dump truck for innovative design,using the optimization function of MATLAB make the lifting mechanism optimal, to articulated point lifting mechanism the reasonable optimally lay out, and improves the lifting organization performance fundamentally.
1274
Abstract: Because the charged objects have the factors of complexity, interference uncertainty and nonlinear, the time-varying system control method gains increasingly attentions. First, this paper carries the researches on the time-varying system classification and builds the control model of the time-varying system. Then the paper discusses the common time varying system control method and analyzes the state-of-art and performance of the control algorithms. Finally, it investigates the development tendency of the complex time-varying system control methods.
1278
Abstract: The intrusion detection under the environment of IPv6 is an important security technology along with firewall in system security defense system, which can be used for real-time detection and monitoring of the system in the whole process of system invasion. This paper puts forward an intrusion detection system under IPv6 platform based on intrusion detection feature attribute reduction by using pattern matching, so as to expand the range of application and user group of the security products. By the analysis and comparison of various pattern matching algorithms, the new algorithm realizes the intrusion feature module matching under IPv6, and make detection system be of high efficiency. Later experiments have proved this view.
1282

Showing 261 to 270 of 468 Paper Titles