Advanced Materials Research Vols. 765-767

Paper Title Page

Abstract: in order to manage the log information of Windows servers, Linux servers, network devices and security devices in a unified, so as to query log data, analysis and audit log data conveniently, a program is put forward, in which a variety of power system information devices log data be converted into a unified relational model and integrated into the database. The data parsing module uses the Windows Workflow procedure to select, clean and merge the massive log data. The database is created and operated by Microsoft SQL Server 2005 development platform. All of the log files have to be converted into a unified format and saved in centralized storage. Experiments and test results show that the module has a good efficiency of data processing and integration, and it greatly increases the proportion of valid data. It provides supports for efficient log auditing and fault diagnosis in the future.
1092
Abstract: in order to improve the efficiency and validity of node importance evaluation, a new evaluation method for node importance in complex networks was proposed based on node approach degree and node correlation degree. The basic idea of the method is that the larger the approach degree of a node is, the closer to center of a complex network the node is and the more important it is; the bigger the correlation degree of a node is, the more important the node is. An evaluation algorithm corresponding to the method was designed for the warship fleet cooperation anti-missile network. Finally, the validity of the proposed method was verified by simulation experiments.
1098
Abstract: The modern war has entered the era of network warfare, paper through studying the structure of collaborative anti-missile combat system, bulid the collaborative anti-missile network model. Put forward the anti-destroying ability measure indicators of network, analysis network measure changes from random network attack and selective attack. The simulation results indicate that the decision device on the network connection between the anti-destroying ability more sensitive.
1103
Abstract: in the greenhouse, the the thick skin melon tends to be more easily infected by some diseases. The traditional forecasting model disease convergence speed is slow and limited by the minimum, easily. This study, based on the BP neural network but to optimize it and introduce the genetic algorithm, through the local searching nearby the global optimal solutions, overcomes the local minimum value and convergence speed defects of traditional neural network with genetic algorithms global search ability. The experimental datas simulative analysis by Matlab shows that the thick skin melon's disease predicting error has been reduced significantly after the introduction of genetic optimization algorithm and has obtained an ideal fitting result.
1109
Abstract: Recently more and more researches in the information security field have been focused on the digital image zero-watermarking technology which is an important mean for protecting the digital multimedia copyright. In this paper, first the research background of image zero-watermarking is analyzed; and then the typical algorithms are presented and discussed; finally the performance of these typical algorithms are analyzed and experimented.
1113
Abstract: Network structure is irregular, complex and dynamically evolving in time. In the Internet of Things, we are Things. Labelled graphs are used in researching areas of many networks, cryptography, computer science, biology, information etc. For simulating real networks we construct compound split-graphs and compound split-trees having particular labellings almost in arbitrary manners by our methods. We have several algorithms in polynomial time.
1118
Abstract: Information and network technologies have great positive effect on teaching and learning in education. Many companies and researchers have developed various teaching and learning models to promote teaching and learning processes. In higher education, teachers work on different computer environments, which bring teachers many difficulties, such as version control of teachers working and software availability. We presented a cloud based working and teaching system for teachers so that each teacher will work with the same computer environment wherever and whenever they are as long as internet connection is available. With this model, teachers can focus on their work instead of underline computer infrastructure.
1124
Abstract: This paper is how to migrate PC-based educational resources to multi-terminal environment, to build desktop application in personal servers using VDI, and to form N screens and a cloud educational apps store. In apps store, students use the multi-terminal device in interacting multi-screen and sharing resource. It offer a mobile and X in one service mode. At last, we give some strategies and tips for migrating resources.
1129
Abstract: Considering the high throughput requirement in Wireless Mesh Networks (WMNs), a novel network coding based routing (NCBR) protocol is presented in this paper. The NCBR protocol could actively create potential coding opportunities in the process of path establishment, which attempts to choose an appreciated route with more coding benefits among available path candidates. After this paper gives the proposed coding condition, it describes the working principle of NCBR protocol in detail. Based on NS-2 platform, average end-to-end throughput is measured to evaluate the effectiveness of NCBR by varying the offered load and number of flows. The simulation results demonstrate that the proposed NCBR protocol performs better in enhancing average end-to-end throughput than traditional AODV and AODV+COPE schemes. In particular, average end-to-end throughput could be improved by 11% compared with the AODV+COPE case.
1134
Abstract: This paper mainly introduces the specific research contents of fire fighting equipment management based on grid technology. Through the establishment of a complete set of grid system, combining with database theory to complete the design of database about fire fighting equipment management system, initiatively updating information, it will be easy to achieve digitized management objects, the efficient management, and networked information processing.
1138

Showing 241 to 250 of 717 Paper Titles