Advanced Materials Research
Vol. 937
Vol. 937
Advanced Materials Research
Vol. 936
Vol. 936
Advanced Materials Research
Vol. 935
Vol. 935
Advanced Materials Research
Vol. 934
Vol. 934
Advanced Materials Research
Vol. 933
Vol. 933
Advanced Materials Research
Vols. 931-932
Vols. 931-932
Advanced Materials Research
Vols. 926-930
Vols. 926-930
Advanced Materials Research
Vol. 925
Vol. 925
Advanced Materials Research
Vol. 924
Vol. 924
Advanced Materials Research
Vol. 923
Vol. 923
Advanced Materials Research
Vol. 922
Vol. 922
Advanced Materials Research
Vols. 919-921
Vols. 919-921
Advanced Materials Research
Vol. 918
Vol. 918
Advanced Materials Research Vols. 926-930
Paper Title Page
Abstract: Computer science (abbreviated CS or CompSci) is the scientific and practical approach to computation and its applications. It is the systematic study of the feasibility, structure, expression, and mechanization of the methodical processes (or algorithms) that underlie the acquisition, representation, processing, storage, communication of, and access to information, whether such information is encoded in bits and bytes in a computer memory or transcribed engines and protein structures in a human cell. A computer scientist specializes in the theory of computation and the design of computational systems. Its subfields can be divided into a variety of theoretical and practical disciplines. The computational complexity theory which explores the fundamental properties of computational and intractable problems, are highly abstract, while fields such as computer graphics emphasize real-world visual applications.
2406
Abstract: This research is mainly designed and implemented the RFID middleware based on embedded Linux system. This middleware uses compositive control framework for design and development, by doing this, it makes middleware function modules can be dynamically loaded, installed and uninstalled by plug-in application form, witch will improve the flexibility and stability of the use of the RFID middleware. In the complex event processing, the paper introduced Esper engine to promoted the ability to filter, analyze, aggregate and some other complex event processing to dulling with the tagged data. This paper realized the main function module design by strictly compliance with the ALE protocol witch is made by the EPC Global Organization. The RFID middleware in this article establish the interactive interface with the external application. This middleware application can be deployed on the embedded Linux system, and it has obtained the expected effect and function after the test of this middleware application.
2410
Abstract: GPU Clusters which use General-Purpose GPUs (GPGPUs) as accelerators are becoming more and more popular in high performance computing area. Currently the mainly used programming model for GPU cluster is hybrid MPI/CUDA. However, when using this model, programmers tend to need detailed knowledge of the hardware resources, which makes the program more complicated and less portable. In this paper, we present StreamMAP, an automatic task assignment system on GPU Clusters. The main contributions of StreamMAP are (1) It provides powerful yet concise language extension suitable to describe the computing resource demands of cluster tasks. (2) It maintains resource information and implements automatic task assignment for GPU Cluster. Experiments show that StreamMAP provides programmability, portability and performance gains.
2414
Abstract: As an open-source Linux system, firewall security and defense capability is very strong. In the whole process of network firewalls,and multiple monitoring points are based on netfilter. This paper analyzes the structure of the netfilter and ipt_entry store,look in everyday applications, Linux modular system can be better integrated,so that the speed and stability of the system is improved more.
2418
Abstract: Management information system is a system comprising of personcomputer used for collection, transfer, storage, maintenance and application of information.The development method of MIS in enterprises mainly has the three ones of Structured System Development Methodology, Prototyping Approach and Object Oriented Design Method. Each development method has its own limitations. In actual application, the optimal development method is to select an appropriate development method in accordance with the comprehensive scale, degree of complexity and development instrument.
2422
Abstract: To achieve a good physical training effect, it not only needs hard training of athletes, but also a scientific and rational approach. This paper describes the development background of computer-aided sports technology, definitions and classifications. The work analyzes the traditional sports training process, points out its shortcomings, and describs the computer-aided sports technology detailedly, and cites some aspects of its application in sports training. A large number of practice show that computer-aided sports technology plays an important role in improving the level of training, and with the constant advances in computer and information technology, it certainly has broader application prospects in physical exercise.
2426
Abstract: Along with the popularization and development of computer technology, computer has become the most basic tool. The computer in the sports training has been widely used, especially the computer technology is playing a more and more important role in sports training. This paper discusses the application of computer in physical training. The specific techniques and some research results provides the theory basis for further widespread application of computer in school physical training in the work.
2430
Abstract: IPV6 is the next generation networking protocol. It can provide more address space than IPV4 and more secure service. This paper studies the technical features of the IPv6 protocol, discusses IPv6 network security mechanisms.
2434
Abstract: The recent growing interest for indoor localization-based services has created a need for more accurate and real-time indoor localization solutions. Indoor localization based on existing WiFi signal strength is becoming increasingly prevalent and ubiquity. In this paper, we utilize the information of the signal strength received from the surrounding access points (APs) to determine the user localization. The propose algorithm based on support vector machines (SVM) algorithm, and comparing with three kernel functions, radial basis function (RBF) performs best of all. Experimental results indicate that the proposed algorithm leads to improvement on localization accuracy.
2438
Abstract: The best is to read these instructions and follow the outline of this text. AODV protocol is usually used to establish path in MANET while not consider energy controlling, this will lead to some nodes become invalid quickly. This paper presents an routing protocol called EAODV base on AODV, it selects the path where the average energy is the maximal and the minimal residual energy of node is higher than the threshold value to transmit data, it also can prolong the network lifetime. the simulation results show that EAODV can efficiently reduce node failure rate and the average end-to-end delay.
2442