Advanced Materials Research
Vol. 937
Vol. 937
Advanced Materials Research
Vol. 936
Vol. 936
Advanced Materials Research
Vol. 935
Vol. 935
Advanced Materials Research
Vol. 934
Vol. 934
Advanced Materials Research
Vol. 933
Vol. 933
Advanced Materials Research
Vols. 931-932
Vols. 931-932
Advanced Materials Research
Vols. 926-930
Vols. 926-930
Advanced Materials Research
Vol. 925
Vol. 925
Advanced Materials Research
Vol. 924
Vol. 924
Advanced Materials Research
Vol. 923
Vol. 923
Advanced Materials Research
Vol. 922
Vol. 922
Advanced Materials Research
Vols. 919-921
Vols. 919-921
Advanced Materials Research
Vol. 918
Vol. 918
Advanced Materials Research Vols. 926-930
Paper Title Page
Abstract: IPv6 is a core protocol of next-generation Internet. The current IPv4 is turning to IPv6, and it is imperative. Colleges are ahead ofthe curve of the research and application of IPv6 Internet. And they put forward several ways of deployment of IPv6 in Campus Network, and provide specific IPv6 configuration technical proposal.
2070
Abstract: As IPv4 address resource being exhausted, the transition from IPv4 to IPv6 is urgent. According to the status of the enterprise network, IPv6 forwarding performance and IPv6 transition technology of the enterprise network equipment was tested. Furthermore, IPv6 transition principles and process for the enterprise network were presented on this basis. In the transition program the cost, complexity, technology maturity and transition smoothness was taken into account. Test results and IPv6 transition program provide a reference for other enterprise network transition process.
2074
Abstract: An algorithm for constrained flooding based on negative selection is proposed due to improve delay of flooding and quality of operation when the network transmit the fault information. According to the network environment different demand between delay of flooding and quality of operation, cost function of flooding delay and operation losing are set, the optimizing objective function synthesize two factor is also set, and negative selection algorithm is used to compute the area of constrained flooding. The experimental result shows that this algorithm can improve the capability in network.
2079
Abstract: According to the trigger strategy of virtual machine dynamic migration based on features closed in the process of dynamic migration of virtual machines in the cloud computing, this paper puts forward a double threshold trigger strategy using timing prediction based on historical data (DTS Algorithms). Then simulation on the CloudSim platform, and analyze the results of the experiment. Experimental results showed that in the system virtual machine migration using DTS algorithm can reduce the number of migration and the energy consumption during the migration process.
2084
Abstract: In order to verify the protocol conformance of RRM (radio resource management) handover procedure in TD-LTE system, We proposed an implementation program of terminal RRM conformance test system with TTCN-3 (Testing and Test Control Notation version 3), designed the testing process of handover in cells, developed the corresponding test cases, and completed the protocol conformance test of Terminal RRM Handover procedure.
2088
Abstract: This paper mainly realizes scramble in TD-LTE system. It includes the introduction of scrambling; projects form; the process of FPGA implementation and the results analysis. Then it finishes simulation, synthesis and verification of board on Virtex-6.The implementation of results shows that this algorithm of modulation and scramble has a high effectively and good reliability to TD-LTE RF conformance testing instrument.
2092
Abstract: In this paper, SSR surveillance network double covering problem with obstructing affected by surface features is studied. The purpose is to improve the performance of SSR surveillance network, thus ensure the efficiency and safety management in airspace. The objective is to minimize the number of radar and the decision variable is the site of radar. Only one type of radar is considered. Firstly, radar network covering problem without obstructing affect is studied. The objective is to minimize the number of radar by arrange them in suitable position satisfying the requirement of complete coverage. For this problem, regular hexagonal expansion algorithm and tabu search algorithm is proposed. Worst-case analysis is provided. We conclude the performance of the algorithm is better when the ratio between the whole region area and radar coverage area is bigger. Secondly, double covering problem in the whole region is taken into account. For this problem, regular triangular expansion algorithm and tabu search algorithm is provided firstly which is more efficient for double covering problem. For those convex target areas worst-case analysis is provided also. Finally, SSR surveillance network covering problem with obstructing affected by surface features is studied. The constraint of complete coverage in whole region is also considered in this problem. This problem is more complex and no efficient optimal algorithm can be used. For this problem, improved hexagon expansion algorithm and tabu search algorithm is applied..
2097
Abstract: Research and application on wireless sensor networks in the future counterterrorism operations, including the target perception network, target guiding network, combat command control and the fire control network. Access to information and knowledge through the wireless sensor networks. Counterterrorism capacity can be upgraded, and precision strike over the horizon can be realized. The networks change the classical counterterrorism operations, reconnaissance and security mode. Qualnet simulation results show that packets loss rate of wireless sensor networks is small, and the peer to peer delay is short. The networks is suitable for counterterrorism operations environment.
2102
Abstract: An integrated model considering all complex factors was provided. Combined with data Loss Tolerance and build an asynchronous dynamic system consisting observer and controller in the closed-loop system. The necessary and sufficient conditions to make the system index stable were analyzed.
2106
Abstract: The JN5148 from Jennic is a kind of ultralow power, ZigBee wireless microcontroller. Its application is more suitable for popularization in practical application, because the wireless transmission distance is remoter than other similar products; however, it also has the energy loss during transmission. This article emphatically probes into the influence factors of the energy loss according to the practical situation, and lists some corresponding improving measures about the wireless communication distance.
2110