Applied Mechanics and Materials Vols. 321-324

Paper Title Page

Abstract: The core principle of the operation of the non-touched IC card is the mechanism of the three times of identification. In the 16 sectors, the key and the control for storage and access of each sector are independent. With the key generated by the Crypto-1 privacy encryption algorithm, the location of the keys and the table of the control to storage and access are given beforehand. The Crypto-1 privacy encryption algorithm can be used to manage the information of the non-touched IC card by C# calling code in the managed execution environment or DLL calling code in the unmanaged execution environment. As a conclusion, the technical monopoly can be broke down by feasible methods.
2678
Abstract: Now IPv6 has been considered as one of the core standards for the next generation Internet Protocol. The network behavior and attack are quite different in IPv6 environment because of the difference between IPv4 and IPv6 Protocol. The increasing expansion of network scale and the exponential growth of network application are urging the research that a firewall for IPv6 environment should be deployed and implemented. This paper studies Netfilter architecture in detail, and explores the Shorewall6 firewall source codes. Furthermore, an IPv6 firewall based on Netfilter is implemented by modifying the Shorewall6 firewall source codes and adding some iptables rules according to the application environment. The implemented IPv6 firewall based on Netfilter makes it convenient for administrators to simplify IPv6 network administration tasks and has furthered the development of IPv6 firewall to some extent.
2684
Abstract: This paper presents an original video based on DCT (Discrete Cosine Transform) and SVD (singular value decomposition) algorithm combined adaptive watermark embedding algorithm. Algorithm will first split the video stream into different scenes, each frame of the discrete cosine transform, and its singular value decomposition of the DC coefficient; the original watermark image and after scrambling algorithm using singular value decomposition singular value sequence, and finally watermarked image. Experiments show that the algorithm meet the invisibility requirements also meet the robustness requirements, efficiently against attacks as frame dropping, Gaussian Noise and Compression attack.
2688
Abstract: This paper briefly describes the current security situation of the mobile Internet, compares the difference between mobile terminals and PC terminals in terms of security, and discusses the security-related research of mobile terminals. After analyzing the feasibility and expected effect of the implementation of access control in a mobile terminal, we propose a Willingness-based Access Control scheme for mobile Internet. We design and complete the pay function with variable difficulties on the basis of MD5. Then, we build an experimental environment with mobile phone programming, test the scheme and analyze the results. The conclusions are given in the final.
2693
Abstract: Server operating system of the integrated supervisory control system (ISCS) in urban rail transport is very important, this article analyzed and compared the main server OS Unix, Linux and Windows server from security, reliability, ease of use and cost. Finally using the Shenzhen Metro 3rd Line as an example, summed up that current the server operating system of the ISCS system will continue to Unix and Windows Server-based, and gradually transitioned to Windows Server.
2698
Abstract: Using the derivative of H Boolean functions and the e-derivativedefined by the authors as the research tools, we go deep into the internal structure of the Booleanfunction values​​, additionally,by the methods of cascade calculations and analytic combinatorics, cryptographic properties such as structural features, existence,balance and algebraic immunity of rotation symmetric H Boolean functions withdiffusibility are studied. Then we get the results that the Second Order rotation symmetric Boolean functionsare H Boolean functions,andthe results to the issues such asthe balance and algebraic immunity of rotation symmetric H Boolean functionsand the existence of the Third Order symmetric H Boolean functions are also be established.
2704
Abstract: Imported clock synchronization and time-triggered strategy in standard Ethernet, Time-Triggered Ethernet has its unique features. This paper introduces its traffic features, clock synchronization, standard configuration and scheduling strategy. Due to its new features Time-triggered Ethernet will have completely new application areas.
2711
Abstract: Crossed cube is a variation of hypercube, but some properties of the former are superior to those of the latter. However, it is difficult to extend the scale of crossed cube networks. As a kind of hierarchical ring interconnection networks, crossed cube-connected ring interconnection network CRN can effectively overcome the disadvantage. Hence, it is a good topology for interconnection networks. In this paper, we prove that there exist n internally vertex-disjoint paths between any two vertexes in CRN, and analyze the lengths of the paths.
2715
Abstract: A new mobile information environment has been gradually formed with the rapid development of the computer network technology in the world. In this environment, the mobile information service in the university library is able to meet the changing need of readers for the specific information online and need not visit libraries. The potential demand, opportunities and challenges of the mobile information service in the university library are analyzed respectively. At last, some advices are proposed to provide a better mobile information service in order to meet readers’ need for information in today's society.
2721
Abstract: Recently, P2P networks play an important role in network. However, there exist a large amount of malicious actions in P2P networks resulting from the lack of reputation system. For example, nodes are willing to share resources each other and may withdraw from networks at any time. Thus, the system is difficult to guarantee effectiveness and availability. According to the behavior of fish school, A novel optimizing, Fish-swam Algorithm, was proposed in this paper, which can decide the next step when nodes have no interactive experience with others. The algorithm based on the model of autonoms animals and was presented to be a kind of efficient incentive mechanism, through a series of experimental study.
2725

Showing 531 to 540 of 610 Paper Titles