Applied Mechanics and Materials
Vol. 289
Vol. 289
Applied Mechanics and Materials
Vol. 288
Vol. 288
Applied Mechanics and Materials
Vols. 284-287
Vols. 284-287
Applied Mechanics and Materials
Vol. 283
Vol. 283
Applied Mechanics and Materials
Vol. 282
Vol. 282
Applied Mechanics and Materials
Vol. 281
Vol. 281
Applied Mechanics and Materials
Vols. 278-280
Vols. 278-280
Applied Mechanics and Materials
Vols. 275-277
Vols. 275-277
Applied Mechanics and Materials
Vol. 274
Vol. 274
Applied Mechanics and Materials
Vol. 273
Vol. 273
Applied Mechanics and Materials
Vols. 271-272
Vols. 271-272
Applied Mechanics and Materials
Vols. 268-270
Vols. 268-270
Applied Mechanics and Materials
Vol. 267
Vol. 267
Applied Mechanics and Materials Vols. 278-280
Paper Title Page
Abstract: Based on difficulties of software upgrade and maintenance of vehicle terminals, this paper proposes a kind of hardware and software scheme using In Application Programming (IAP) which can realize vehicle terminals remote upgrade. The main function module and the interface circuit of the module with the MCU are designed respectively. Also, the software of the remote upgrade is introduced to realize the upgrading and resume broken transfer. The system controlling software is also designed to ensure the reliability.
1928
Abstract: With the development of science and technology, the booming era of information acquirement and transmission is coming, represented by the increasing level of intelligence, information and modernization in management and the enlarging coverage area of wireless network can provide an effective platform for oilfield information management. In this paper, we use the web service, cross-platform and cross-language information transfer technology, connecting the wireless terminal with the oracle database by the WIFI wireless network, a system of real-time mobile query information using PDA (Personal Digital Assistant), notebook and other mobile terminals comes into being. Finally, an information platform has been established to manage various parameters of the oilfield site, such as the parameters of well drilling, mud logging, directional drilling and so on.
1933
Abstract: The paper elaborates OFDM technology and its advantages and disadvantages, analyzes the basic principles on random access preamble sequence design ,and defines and analyzes Zadoff sequences and its excellent characteristics . After that, the paper analyzes the frequency offset exists and ZC sequence cyclic shift for the reasons for the decline of the autocorrelation peak of Zero, as a relative frequency offset .Finally,the paper proposes and emphasizes on the design of random access preamble sequence.
1937
Abstract: Emergency rescue platform of electric vehicles based on natural selection PSO
1941
Abstract: Publicly verifiable secret sharing schemes based on Lagrange interpolation utilize public cryptography to encrypt transmitted data and the validity of their shares can be verified by everyone, not only the participants. However, they require O(klog2k) operations during secret reconstruction phase. In order to reduce the computational complexity during the secret reconstruction phase we propose a non-interactive publicly verifiable secret sharing scheme based on the Chinese Remainder Theorem utilizing ElGamal cryptosystem to encrypt data, whonly requires O(k) operations during secret reconstruction phase. Theoretical analysis proves the proposed scheme achieves computation security and is more efficient.
1945
Abstract: This paper introduced an integrated control teaching system of building completely based on the technique of Lon bus. This system has the typed configuration of IBMS system-two classes network and three layers management (control), and overcomes the limitation of island of information and use protocol conversion gateway in building integration system, it’s a kind of building control integration system with truly open and with standard equivalent system network structure. The system has the characteristic of structure completed, technology.
1952
Abstract: According to the requirements of distribution and consumption concept of smart grid, adaptive communication techniques are compared through the analysis of kinds of communication techniques. And detailed suggestions are given in this paper. Finally, several typical construction schemes of communication systems for distribution and consumption concept are presented according to the requirements of circumstance, operation and management of different cities.
1956
Abstract: Proposed a new trust model based on P2P technology in the cloud computing environment. The model takes into account more than one cloud computing platform, that is, considering the different cloud computing service provider provide the service of a cross-cloud platform. Such cross-platform cloud (Cross Cloud) can be called the composite cloud computing platform or cloud associated cloud computing platform.The nodes in the cloud computing environment are divided into two categories: customers and providers. According to the different roles of these two nodes, we designed a different trust mechanism, to divide the trust domain with independent single cloud, considered node independence and manageability of domain to process trust choice and trust update, and proposed a new kind of cloud computing service - trust recommendation service.
1962
Abstract: Due to the radio transmission nature of RFID, the challenge of security and privacy has seriously hindered the large-scale development of RFID technology. However, low-cost RFID tags have the characteristic of extremely limited resources, traditional security primitives cannot be better applied in RFID system. Hence, Designing an effective ultralightweight security protocol applying to low-cost tag is crucial for the various applications of RFID system. In this paper, we propose an ultralightweight secure protocol with mutual authentication. Without adopting classical cryptographic primitives, the protocol proposed only employs simple bit-wise operations such as xor and module addition. Meanwhile, the protocol can resist various attacks and has features of low computation cost and communication traffic.
1966
Abstract: Today, numbers of documents that firms must process and with the extensive amounts of information available on the Internet, an automated intelligent method is needed to sort through all available documents or sites. It would be beneficial to start with grouping similar documents or sites together based on similarities. Classifying documents and sorting them into categories could be beneficial since in most cases, no one user would be interested in all the different categories of documents at the same time. Classifying a large number of documents would also make it easier to locate a specific document. In this paper, neural network computing based text mining (TM) and its application will be discussed.
1972