Advanced Materials Research
Vol. 1001
Vol. 1001
Advanced Materials Research
Vol. 1000
Vol. 1000
Advanced Materials Research
Vols. 998-999
Vols. 998-999
Advanced Materials Research
Vol. 997
Vol. 997
Advanced Materials Research
Vol. 996
Vol. 996
Advanced Materials Research
Vol. 995
Vol. 995
Advanced Materials Research
Vols. 989-994
Vols. 989-994
Advanced Materials Research
Vol. 988
Vol. 988
Advanced Materials Research
Vols. 986-987
Vols. 986-987
Advanced Materials Research
Vols. 984-985
Vols. 984-985
Advanced Materials Research
Vol. 983
Vol. 983
Advanced Materials Research
Vol. 982
Vol. 982
Advanced Materials Research
Vol. 981
Vol. 981
Advanced Materials Research Vols. 989-994
Paper Title Page
Abstract: The main characteristics and hardware requirements of Virtual Reality Technology are described in this paper, which summarize the application of virtual reality technology in landscape architecture knowledge, learning, teaching, training and scientific research process, and explore the use of digital city and landscape architecture technology platform to create multiple virtual laboratories and training station conception; it also analyze the influence of the virtual reality technology to teaching concept, teaching content, teaching means . In recent years, computer technology plays an important role in landscape design. Not only can it calculate the garden earth, draw the design of the plane and elevation renderings giving people with static visual experience, but also it implements the three-dimensional landscape animation with the development of computer hardware and software technology, especially the wide application of AutoCAD and 3dsMAX, so that people in the completion of the project can appreciate the pre-built landscape, having the strong performance of the dynamic three-dimensional force. However, the output for the landscape animation avi video format does not have real-time interactivity, which cannot satisfy people autonomy roaming; whereas the production process in the landscape roaming animation, 3D volume data in the scene has certain limitations, can not meet the 3D data volume expansion. The status of 1virtual reality technology and its application in the garden of the 1.1 virtual reality technology, virtual reality (Virtual Reality, abbreviated as VR, also known as VR) refers to the use of computer technology at the core.
4229
Abstract: As telecommunication network is rapidly developing, modern telecommunication network is inclined to be in possession of large scale, sparse topology as well as high capacity. At present, these concerns have increased in network design and enhanced the exploration in the field of cyber topology. With network technology on the rise, especially the expansion of high-speed network telecommunication, scale of network is becoming larger and larger with much more volume of chains.
4233
Abstract: If we apply the system internal elements as nodes, and the relationship between the elements as connection, then the system form a network. If we put emphasis on the structure of the system and analyze the function of the system from the angle of structure, we’ll find that real network topology properties differ from previous research network, and has numerous nodes, which is called complex networks. In the real word, many complex systems can be basically described by the network, while the reality is that complex systems can be called as “complex network”, such as social network, transportation network, power grids and internet etc. In recent years, many articles about the complex networks are released in the international first-class publications such as Nature, PRL, PNAS, which reflects that the complex networks has become a new research focus.
4237
Abstract: With the rapid development of computer technology and telecommunication, the whole world has been interconnected by Internet which is playing an indispensable part in our daily life. Websites are like windows for users coming into the Internet and leading us to another world. A great amount of information can be browsed in a convenient way through websites, thus, they occupy largely important positions in the contemporary society.
Therefore, research on the laws users browsing the Internet will definitely help us better get an understanding of the features of Internet. This passage is to make every effort to research multiple websites as well as users’ browsing laws with some practical examples, effectively making full use of netizens’ documents and statistics such as Cookie.
4241
Abstract: This paper mainly analyzed the security of AES(Advanced Encryption Standard) protocol and virtual private network technology ,the network 802.3 and 802.1x/EXP security vulnerabilities: defects of Service Set Identifier and MAC Address Filtering, defects of User Authentication Method, security vulnerabilities of WPA Algorithm, defects of 802.1x / EAP and RADIUS Authentication, etc. The authentication and encryption method to improve network security measures.
4245
Abstract: MAC layer, a radio link control (RLC) layer and a broadcast and multicast control (BMC) layer exist in a second layer. The MAC layer maps various logical channels to various transport channels and performs logical channel multiplexing to map a plurality of logical channels to one transport channel.The MAC layer is connected to the RLC layer, which is a higher layer, through a logical channel. The logical channel is divided into a control channel for transmitting information on a control plane and a traffic channel for transmitting information on a user plane, according to the kind of transmitted information.
4249
Abstract: WIA-PA network is a kind of multi-hop wireless network, which is specially designed for industrial process automation control. It uses hybrid management pattern with star and mesh structure. Intra-cluster and inter-cluster communication is scheduled simultaneously based on TDMA as well as FDMA. In this paper, a real-time cluster resources scheduling strategy for WIA-PA networks is proposed and the specific algorithm is implemented by edge-coloring. Our algorithm combines with optimal routing mechanism and arranges the order of links reasonably, resulting in avoiding conflict and improving the original communication success rate. Furthermore, the algorithm makes full use of channel resources, which greatly reduces end-to-end delay. The performance analysis shows that our algorithm is close to optimal for WIA-PA networks. In addition, compared with RSCA algorithm, our algorithm has lower latency and higher network throughput.
4253
Abstract: According to the current mainstream architecture of the Internet of Things, Makes research on security threat of the Internet of things from the perception layer, network layer and application layer, Gives the corresponding security policies and measures. It provides the theoretical reference for security of the Internet of things and privacy protection.
4261
Abstract: With the technology improvement of computer communication and multimedia coding, real time communication such as audio and video is introduced to networks and become a dominant way of communication.In the control of network, the optimization problem of the network controller based on network Quality of service (QoS) is a very important problem in the research of network control. Considering the influence of network quality—of service (QoS) on the control performance,a system model combining the network parameters and the control parameters is established for networked control systems (NCSs). Based on this, the condition dependent on the network parameters and control parameters is presented for the existence of guaranteed cost controllers.LMI).Within the scope of QoS perturbation,the designed controller can not only make the system as hypnotically stable but also guarantee that the system performance index is not greater than the upper bound.
4265
Abstract: Currently it is difficult to use a single network computer application server to meet the demand of concurrent access to a large number of users. It is an ideal way to introduce in the cluster technology in the network for a computer system to solve this problem. In this paper, network computer server cluster on the basis of the existing network computer system is designed and key issues are studied.
4269