Advanced Materials Research
Vol. 1001
Vol. 1001
Advanced Materials Research
Vol. 1000
Vol. 1000
Advanced Materials Research
Vols. 998-999
Vols. 998-999
Advanced Materials Research
Vol. 997
Vol. 997
Advanced Materials Research
Vol. 996
Vol. 996
Advanced Materials Research
Vol. 995
Vol. 995
Advanced Materials Research
Vols. 989-994
Vols. 989-994
Advanced Materials Research
Vol. 988
Vol. 988
Advanced Materials Research
Vols. 986-987
Vols. 986-987
Advanced Materials Research
Vols. 984-985
Vols. 984-985
Advanced Materials Research
Vol. 983
Vol. 983
Advanced Materials Research
Vol. 982
Vol. 982
Advanced Materials Research
Vol. 981
Vol. 981
Advanced Materials Research Vols. 989-994
Paper Title Page
Abstract: Although the simple structure and easy operation of completing data process depending only on the real-time request of database, the database call time is far longer than the lookup time. If the database is called too frequently, the processing speed will surely be cut down and the real-time performance will be degraded. Based on the situation, this paper will put forward one method, which combined cache with database can improve the performance of the system in the main controller of integrated security system of equipment management.
4447
Abstract: In the experiment of Neutral Beam Injection (NBI), Experimental Data Publishing Software (EDPS) is developed to get experimental data monitored remotely. Adopting B/S module, EDPS publishes information, such as experimental configurations and results on the Internet dynamically. The design and implementation of how EDPS uses the present information source in NBI Control System (NBICS), the procedure EDPS handles the requests from clients and displays the information on web pages are introduced in this paper.
4452
Abstract: With the development of information technology, the three networks convergence are making progress on technology, policy and market fields in China. This research analyzed the CATV, telecommunication and internet industries based on SWOT theory. It found they have different strengths, weakness, opportunity, threats in different industries. So we found the problems on three networks convergence and proposed the suggestions.
4456
Abstract: To further improve the quality of service of communication business for power distribution and utilization, and to meet the needs of communication network for smart power distribution and utilization, we propose a multi-network switching model based on AHP; First, this model analyzes the performance of LTE, WCDMA and WiFi, to determine the integrated weights of optional network by solving the relative weight of rules and index, then select a network which is based on guarantee the performance index of QoS; In the process of transmission of power distribution and utilization business, take the transmission efficiency as the optimization target, the network of which weight is larger is priority to transfer power distribution and utilization business; Simulation results show that the model can improve the quality of service of communication business for power distribution and utilization.
4461
Abstract: This paper analyzes two important problems of thematic map cartography facing, namely which technique solution is appropriate and how to simplify the cartography process. Firstly, contrasts some popular technique solutions of thematic map, and points out the bottlenecks and inconveniences of thematic map cartography process nowadays, then brings out active online thematic map cartography based on the technique solution of RIA (Rich Internet Applications). In addition, this paper gives out RIA-based implementation framework of active online thematic maps mapping, which is contrasted with RIA-based implementation framework of general online thematic maps mapping, and main methods of building knowledge of active cartography of thematic map.
4466
Abstract: Military camouflage is one of the critical measures taken by some key military forces to disguise weapons and facilities, military projects and combat fighters. Digital camouflage is a novel form in this field. Preliminarily verified by Edge Detection, one method is proposed to digitize large-spot painting patterns, to generate random spot-modification and richer patterns.
4470
Abstract: This study is to propose a wavelet kernel-based support vector machine (SVM) for communication network intrusion detection. The common intrusion types of communication network mainly include DOS, R2L, U2R and Probing. SVM, BP neural network are used to compare with the proposed wavelet kernel-based SVM method to show the superiority of wavelet kernel-based SVM. The detection accuracy for communication network intrusion of wavelet kernel-based SVM is 96.67 %, the detection accuracy for communication network intrusion of SVM is 90.83%, and the detection accuracy for communication network intrusion of BP neural network is 86.67%.It can be seen that the detection accuracy for communication network intrusion of wavelet kernel-based SVM is better than that of SVM or BP neural network.
4474
Abstract: This paper puts forward the composition of geospatial information and its definition. The author designed and implemented the attendance management system based on Micro-cellular and the geographic information system (GIS) technology. The function of the geographic information system (GIS) was achieved by transforming Japan Geographical Survey Institute's Digital Map 2,500 base plate data into G-XML data. The function of location information system was accomplished according to micro-cellular mobile terminal-in the GIS's Real-time positioning and tracks. At last, the attendance management system based on micro-cellular and GIS technology was implemented by comparing the work schedule with the mobile tracks of its related mobile handheld terminals.
4478
Abstract: Mobile Ad Hoc network is a self-composing network with a highly dynamic network topology. Although it has many advantages, there are still some safety problems in it. One of these problems is the black hole attack. The black hole attack is a typical attack to the Ad Hoc network and is also the main threat facing it. In this paper, the safety problems exist in the AODV protocol, which is a kind of routing protocol in the Ad Hoc, has been analyzed in detail. In the meanwhile, an improved Secure Ad Hoc On-Demand Distance Vector Routing called OSAODV has been proposed and realized based on the NS2. Finally, three set of experiments have been made, the results have shown that the OSADOV can avoid the black hole attack very well.
4482
Abstract: To solve the problem of user demand dynamics in the development of management information system, an automation development framework based on database is proposed. Software code is generated automatically in the framework that includes three-tier software architecture design, code generation engine, the common code template design and the constraints of the conceptual models design, thus adjusts to change in demand and increases development efficiency. The comparison between the test and analysis shows that the layered architecture can meet the requirements of software applications. The application in the actual project shows that automation development framework can reduce development cost and promote software quality effectively.
4488