Advanced Materials Research
Vol. 1001
Vol. 1001
Advanced Materials Research
Vol. 1000
Vol. 1000
Advanced Materials Research
Vols. 998-999
Vols. 998-999
Advanced Materials Research
Vol. 997
Vol. 997
Advanced Materials Research
Vol. 996
Vol. 996
Advanced Materials Research
Vol. 995
Vol. 995
Advanced Materials Research
Vols. 989-994
Vols. 989-994
Advanced Materials Research
Vol. 988
Vol. 988
Advanced Materials Research
Vols. 986-987
Vols. 986-987
Advanced Materials Research
Vols. 984-985
Vols. 984-985
Advanced Materials Research
Vol. 983
Vol. 983
Advanced Materials Research
Vol. 982
Vol. 982
Advanced Materials Research
Vol. 981
Vol. 981
Advanced Materials Research Vols. 989-994
Paper Title Page
Abstract: With the development of the electronic technology, the processors count in a supercomputer reaches million scales. However, the processes scale of a application is limited to several thousands, and the scalability face a bottle neck from several aspects, including I/O, communication, cache access .etc. In this paper, we focus on the communication bottleneck to the scalability of linear algebraic equation solve. We take preconditioned conjugate gradient (PCG) as an example, and analysis the feathers of the communication operations in the process of PCG solver. We find that reduce communication is the most critical issue for the scalability of the parallel iterative method for linear algebraic equation solve. We propose a local residual error optimization scheme to eliminate part of the reduce communication operations in the parallel iterative method, and improve the scalability of the parallel iterative method. Experimental results on the Tianhe-2 supercomputer demonstrate that our optimization scheme can achieve a much signally effect for the scalability of the linear algebraic equation solve.
4934
Abstract: In current software architecture evolution community, Trusted attributes of component are less considered; and the concept of trusted software architecture evolution has not generally agreed. Focused on above shortages, This paper propose the idea of trusted software architecture evolution, it helps to increase the trustworthiness of evolution; on the basis of graph transformation rule, establish some basic evolution rules, Evolution operations are implemented according to these evolution rules. It can ensure the exactness of evolution process. The paper also introduce E-R diagram to represent trusted software architecture evolution; and finally through an evolution case, exactly and visually describes the sophisticated evolution process of trusted software architecture evolution.
4940
Abstract: Based on CityEngine as software platform, this paper put forward 3D graphic expression of environment noise, and establishes the environmental noise monitoring model of 3D space by CSG and B-Rep hybrid algorithm. Then, according to the noise data and the legend of the color grade, we render the surface area of the 3D monitoring geometric model with the expression of grid method. Finally, the simulation shows that this method can be applied to 3D graphical expression of environmental noise.
4945
Abstract: Since CDIO talents training informatization system is employed in Big Data era, this paper shows some studies on the application of the internet of things , cloud computing, Big Data service and other advanced technologies in CDIO talents training informatization system, an informatization framework for the internet of things and cloud computing is constructed based on CDIO talents training, in order to solve the difficulties in managing and monitoring the fully distributed architecture, a distributed resource scheduling mechanism with QoS is proposed.
4949
Abstract: Due to the large communication network, represented by the Internet such as: biological cell protein interaction networks, collaboration networks, air transport network, many real-world networks are proved to have the characteristics of small world network and scale-free (scale-free) connection properties, research on complex networks and dynamics mechanism has increasingly aroused people's attention.[1] For to the network, people are most concerned about is how to realize the information interaction without congestion, so in scale-free the basic connection problems of information flow transmission structure on the network is becoming a hot research.
4953
Abstract: The era of big data is an inevitable trend of world development, environmental changes poses severe challenges around the local government of information construction in China. On the basis of the full analysis of the content and features of the era of big data, clarify the urgent need of the local government to further deepen the Information Construction in the era of big data, analysis the challenges for local governments of building big data era. On this basis, we propose a solution in the angle of the user, government resource integration, demand forecast and the government's responsibility.
4957
Abstract: As networks to be flattened, a direction has been put forward clearly by Telecom operators that Optical Line Terminals (OLT) of Gigabit Passive Optical Network (GPON) should become aggregation [1] OLTs, which makes them to work as both aggregation switches and edge access devices. According to this requirement, a scheme that realizes Routing [2] Information Protocol (RIP) on GPON OLT is put forward after deep analysis of GPON system [3] [4] [5] and RIP. Results shows that IP routing on GPON OLT is realized, which allows OLTs to work on the network layer, at the same time simplifies the broadband network levels and increases the reliability of the network.
4962
Abstract: Based on the background of Wuxi Software Park, building cloud platform system was proposed. The concept of cloud computing and cloud platform functionality was outlined. This paper studied the cloud platform application framework. Discoursing Park Intelligent Property Services cloud platform subsystem, park integrated services cloud platform subsystem and Park enterprise IT services cloud platform subsystem. The system can take advantage of cloud platform mobile terminal to provide application modes for companies, employees, park agencies, Software Park, operators and so on.
4966
Abstract: Advanced persistent threat (APT) has become a serious chanllenge to network security in recent yeas. Characteristics of this kind of network attack involve purposiveness,concealment,sustainability and variability, and it is hard to protect for critical infrastructure, financial systems, elements of national power, etc. These threats range from unwitting hackers to nation-states, each at various levels of competence. For performing security protection, five typical cases of APT including Night Dragon attack, Google Operation Aurora, RSA SecurID attack, Stuxnet attack and Shady Rat attack were analyzed. Its commonly attack process and technology characteristics are summarized. Finally, some suggestions and opinions on secrutiy protection were presented.
4970
Abstract: As the Internet is developing fast, network security issues are rising. Data mining technology is applied to the analysis and understanding data, revealing hidden data secret inside knowledge. Especially high dimensional data mining can be used in information security data analyze, making the study of high-dimensional data mining very important. In this paper, traditional data mining is introduced; the concept and core ideas of high dimensional data mining are described, as well as its applications in network security.
4974