Advanced Materials Research Vols. 791-793

Paper Title Page

Abstract: In this paper, we address the problem of real-time network traffic monitoring in the communication network of smart grid. And we propose an effective distributed network traffic monitoring approach. In our algorithm, instead of measuring all the origin-destination pairs, we just need to measure partial origin-destination pairs that flows our communication network. From the measured origin-destination pairs, we can obtain all the origin-destination pairs via our recovery algorithm. Finally, we validate the properties of our method by real network data.
892
Abstract: The development of computers wireless network monitoring system mainly includes steps such as the selection of transmission protocol, the calls of database program, data display and automation implementation and so on. The transmission speed of protocol TD-SCDMA is faster. In addition, it also can transmit voice and pure data files. Thus, this article selects TD-SCDMA protocol as transport protocol of wireless sensor networks. On the basis of the software OLEDB, this paper has developed ActiveX Data Object program, and has implemented the safety supervision automation process of wireless sensor network technology. Finally, this paper uses VC++ software to make a numerical simulation experiment on computer programs by taking an example of coal mine gas monitoring. At the same time, through the display on the window, it is the gas concentration monitoring curve that is obtained when the mine safety is abnormal, which provides the safeguard for mine personnel safety and normal work.
897
Abstract: With the fast development of Internet, the ideological and political work in colleges is faced with new opportunity and challenge. Network public opinion has become the key impact factors of college students' ideological and political and the behavior, so that the network public opinion monitoring also has become one of the main subject in college ideological and political education reform for experts and scholars in the field of education. Firstly, based on the characteristics of the network public opinion and its production process, the article analyzes the penetration relations produced by the network public opinion on modern ideological and political education. On this basis, combining the characteristics of modern ideological and political education in colleges, it has put forward constructing a new mode of education from the multi-angle field of view based on .NET framework. Finally, by the confirmatory analysis, ideological and political education under the mode can better guide the students ideological and political education work.
902
Abstract: In recent years, college is a place where sports injury is the highest and the most frequent. Therefore, it arouses a great concern in the society. In this paper, we use SIIR survey instrument to investigate part of the primary and secondary colleges in Shandong Province. We analyze the determination factors and characteristics of empirical treatment cases of the multiple sports injury. We use data analysis and processing principle of SIIR survey instrument to analyze the characteristics and causes of sports injuries. The multiple regression procedure of SIIR survey instrument is used to build the model. The model is built on the base of the relationship between the age, sex, grade of the students and the injury. We integrate the influence factors of society and college to analyze the sports injury factors. Through the scrutiny of SIIR survey instruments, we can improve the working capacity of the college to prevent sports injuries. We can also reduce the frequency of college sports injuries.
907
Abstract: Least square support vector machine (LS-SVM) can solve small sample, high-dimensional and non-linear multi-classification problem well, so it is applicable to the power transformer fault diagnosis. However, the parameters of LS-SVM have significant effect on the classification results.In this paper, the adaptive differential evolution algorithm (ADE) is applied to optimize the parameters of LS-SVM. The scaling factor and crossover rate are adjusted dynamically in the whole evolution process, so the robustness of the algorithm is improved greatly. The optimized LS-SVM is applied to fault diagnosis of power transformer, the results obtained demonstrate superiority of the proposed approach.
912
Abstract: With all kinds of structured data and unstructured data between intranet and external information network interacted frequently, a kind of safety device has been produced that achieved effective control of information network data access to ensure normal operation of the isolation system and related business and make the data of intranet safe and reliable. In order to ensure that every release version could run stability, automation testing solution based on keyword driven has been designed to realize the separation of test data, test scripts and test logic. The main design were keyword structure and hierarchical key separation. Regression testing has consisted of test Cases configured flexibility and selectively to realize reasonable arrangement of testers and improve test efficiency.
917
Abstract: The significance of reliability researches are described first. It is necessary to know concepts of reliability without a doubt, and most common measures of reliability are discussed, including reliability function and failure rate. It emphasizes two important analysis approaches: Failure Mode, Effects, and Criticality Analysis (FMECA) and Fault-Tree Analysis (FTA). Last, it provides the quantified result of reliability analysis of a test-bed system with FTA-based RiskA software as a case study, which shows the usefulness of FTA-based reliability measurement.
922
Abstract: With the development of the computer wireless communication technology, wireless sensor detection is being widely applied to engineering practice. Combined with the advantages and disadvantages of the two algorithms LEACH and PEGASIS, this paper proposes a new algorithm BEAHR algorithm. At the same time, this paper establishes mathematical model algorithm of wireless network detection energy consumption for BEAHR algorithm. Finally, this paper calculates the numerical value of the three algorithms LEACH, PEGASIS and BEAHR by using the general numerical simulation software of MATLAB software. Through the numerical simulation experiments, it is found that with the increase of time, the average energy consumption of three algorithms will also be increased. Among them, the fastest increase of energy consumption is LEAC. However, the energy consumption of BEAHR algorithm is small. When the time is 1000 s, power consumption is 0.5 J, which verifies the validity and reliability of BEAHR algorithm and proves that BEAHR algorithm has the excellent performance to save energy and improve the network life cycle.
926
Abstract: With the wide application of cloud platform, how to better utilize virtualization technology has become a great challenge for many IT enterprises. This paper proposed an I/O monitoring framework for XCP-based platform. Combining mobile technology, monitoring tools on both server and client side are developed respectively. Functional testing is carried out on the I/O monitoring tools, whose effectiveness and reliability are verified. The XCP-based I/O monitor platform is able to supervise the I/O of virtual machines, which provides a great way for cloud platform operation management.
931
Abstract: The innovation and development of software and information technology has stimulated the mature of service-oriented architecture (SOA) platform technology, while the loosely coupled, modular, dynamic loading feature of OSGi service platform has made itself a popular architecture within the SOA community. To embody the advantages of the OSGi framework application with a longer lifecycle and ensure the quality of OSGi applications, we need to run a series of rigorous testing, especially integration testing. Existing tools do not support separation of testing and development, testing records playback or redundant test cases auto-generation. In this paper, we have analyzed the current OSGi testing techniques and tools as well as their inadequacies. Our research into OSGi testing technology has enlightened us to expand the function of the testing tools on the basis of Pax-exam and then integrate them into the OSGi testing platform. Finally, we discuss the framework design of our OSGi integration testing platform and demonstrate the correctness and validity of the platform.
936

Showing 211 to 220 of 509 Paper Titles