Advanced Materials Research
Vol. 773
Vol. 773
Advanced Materials Research
Vol. 772
Vol. 772
Advanced Materials Research
Vol. 771
Vol. 771
Advanced Materials Research
Vol. 770
Vol. 770
Advanced Materials Research
Vol. 769
Vol. 769
Advanced Materials Research
Vol. 768
Vol. 768
Advanced Materials Research
Vols. 765-767
Vols. 765-767
Advanced Materials Research
Vol. 764
Vol. 764
Advanced Materials Research
Vol. 763
Vol. 763
Advanced Materials Research
Vols. 760-762
Vols. 760-762
Advanced Materials Research
Vols. 756-759
Vols. 756-759
Advanced Materials Research
Vols. 753-755
Vols. 753-755
Advanced Materials Research
Vols. 750-752
Vols. 750-752
Advanced Materials Research Vols. 765-767
Paper Title Page
Abstract: Existing defense policy description language can describe some aspects of defense only, such as protection or detection but cannot express relationship among actions. Thus, it cannot accomplish a joint defense goal with the linkage of all kinds of defense mechanism for large-scale, distributed network attacking, such as Botnet. To solve this problem, we proposed a computer network defense-oriented scheme description language (CNDSDL), which can describe protection, detection, analysis, response, and recover actions as well as relationship among actions. These relations include sequence-and, sequence-or, concurrent-and, concurrent-or, and xor. It provides a unified coupling language description for linkage defense of different security devices. At last, we realized the simulation of schemes which are described by CNDSDL. The experiments results show that CNDSDL can be transformed to detailed technique rules and realize the defense effect of expression.
1739
Abstract: This paper analyzes the basic system architecture of smart library based on RFID technology, which is composed of perception layer, network layer and application layer. It further explores the cloud services and large data processing technologies. According to the experience in the construction of Donghua University Library, we propose some problems which should be paid attention in the implementation and construction of university library, such as the construction of librarians, privacy protection and standardization.
1743
Abstract: This paper proposes an energy-efficient model to overcome the energy-efficient problem in large-scale IP networks, based on QoS constraints. To characterize network energy consumption, we present a link energy consumption model based on the sleep and speed scaling mechanisms. If there is no traffic on a link, let it sleep, or activate it and divide its energy consumption into base energy consumption and traffic energy consumption. And then according to the link energy consumption model, we can build our energy-efficient model to improve the network energy efficiency. Finally, simulation results show that our model can significantly improve the network energy efficiency.
1747
Abstract: During the electrical prospecting, the three-dimensional forward problem has been the hot topic in the research of DC electrical method. When the forward computation results are solved through the finite element method and the finite difference method, a large-scale sparse linear equation set should be obtained, moreover the computation in the solution of large-scale linear algebraic equation sets are very heavy. If we adopt serial computation, the computing efficiency is very low, which greatly affects the application efficiency. With the increasing maturation of the parallel computer architecture, the Graphic Processing Unit (GPU) parallel computing modeling can apply in this field to enable the efficiency of the three-dimensional forward modeling to be significantly improved.
1752
Abstract: Communication network plays a vital role in smart substations. Different network topology provides different network performance, while the quality of network performance directly impacts the reliability of the entire system. In view of the network topology of smart substations, this paper compares the advantages and disadvantages of different network topologies as well as different network schemes of substation layer and process layer, and also analyzes the relationship between the reliability of network system and network topology, which play an important role in establishing a reliable and efficient smart substation system.
1757
Abstract: Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and implementation of key modules are described. The experimental results validate the validity of the models design.
1761
Abstract: A sensor network flooding routing algorithm based on sector area nodes selection (RABSA) is proposed and evaluated to improve shortcoming hidden terminal, information implosion and emerging redundant packet copies which consume more node energy in the flooding algorithm. Source node selects the nodes located in the sector area of arc angle for ɑ and radius for node communication distance as next hop routing nodes. Performance analysis and simulation experiment shows that the new protocol effectively reduces the data redundancy, reduce the energy consumption and prolong the network lifetime.
1766
Abstract: This paper describes the meter concentrator design and the Linux system transplant on it. The process of Linux transplant include the establishment of a cross-compiler tool, At91bootstrap and u-boot transplant, Linux kernel customizing and compiling, jffs2 file system making. The embedded Linux with small size, high stability and reliability runs well on the platform of concentrator.
1770
Abstract: In this paper, an energy-efficient multicast routing algorithm in multi-hop wireless networks is proposed aiming at new generation wireless communications. Different from the previous methods, this paper targets maximizing the energy efficiency of networks. In order to get the optimal energy efficiency to build the network multicast route, our proposed method tries to maximize the network throughput and minimize the network energy consumption by exploiting network coding and sleeping scheme. Simulation results show that the proposed algorithm has better energy efficiency and performance improvements comparing with the existing methods.
1775
Abstract: With the development of spacecraft control technology, the traditional control methods could not meet the collaborative work between target system and ground control system. Most existing spacecraft control languages are based on the instructions of the target system, the control programs are poor readability and difficult to develop. General spacecraft control language (GSCL) is readability with rigidly structured and keywords in English. GSCL uses the target system configuration file as interface of combination with the target system. GSCL is independent of target spacecraft and easy for developing.
1780