Applied Mechanics and Materials
Vol. 345
Vol. 345
Applied Mechanics and Materials
Vol. 344
Vol. 344
Applied Mechanics and Materials
Vol. 343
Vol. 343
Applied Mechanics and Materials
Vols. 341-342
Vols. 341-342
Applied Mechanics and Materials
Vol. 340
Vol. 340
Applied Mechanics and Materials
Vol. 339
Vol. 339
Applied Mechanics and Materials
Vols. 336-338
Vols. 336-338
Applied Mechanics and Materials
Vols. 333-335
Vols. 333-335
Applied Mechanics and Materials
Vol. 332
Vol. 332
Applied Mechanics and Materials
Vol. 331
Vol. 331
Applied Mechanics and Materials
Vol. 330
Vol. 330
Applied Mechanics and Materials
Vol. 329
Vol. 329
Applied Mechanics and Materials
Vol. 328
Vol. 328
Applied Mechanics and Materials Vols. 336-338
Paper Title Page
Abstract: The filtering problem is studied for a class of discrete-time systems under the effect of the networks. The investigated issues involved by the network include the consecutive packet dropouts and the one-step transmission delays which can be described by a sequence of mutually independent Bernoulli distributed stochastic variables. A full-order filter is designed such that the filtering error system is exponentially stable in the mean square and the performance is also achieved. Sufficient conditions are developed for the addressed problem and the desired filter is derived by means of the feasibility of certain linear matrix inequality. Numerical example is given to illustrate the effectiveness of the proposed method.
2381
Abstract: This paper analyses the master station redundancy technology in the POWERLINK network. Through the monitoring network and data refresh to achieve the master station redundancy function. The Managing Node redundancy ensures the POWERLINK cycle production continuance after the failure of the current master station, the switch-over time (recovery time) of the POWERLINK system is in the two POWERLINK cycle time at least. That ensures a very fast restoring of normal operation without any downtime for the control system.
2388
Abstract: In order to protect sensitive information of the nuclear materials recognition system from leaking, this article combined with the functional requirements of information barriers and design elements, designed neural network verification system solutions and hardware and software. Taking into account the dual function of information barrier requirements, verification display terminal and main control analysis unit are separated in the design of hardware. To achieve the tiered management system categories, multi-user permission management and special features of the individual authorization are used in the design of software. In the end, the authentication method of the system is discussed.
2392
Abstract: Information barrier technology could meet the dual requirements to protect sensitive information and have a high confidence in the verification. It is an integrated mature technology in many fields which include nuclear detection science, nuclear electronics, and data encryption processing, and so on. It uses mature hardware and software technology to form multiple layers of protection to get the purpose of the protection of sensitive information. In this paper, the information barrier functional requirements and objectives are combined, the verification information barrier program is designed, and the system authentication method is discussed.
2397
Abstract: The paper aims at the security issues of the mobile agent system to propose a mobile agent system based on tracking mechanism which has a third-party certification center similar to an authority sector, whose hosts and mobile agents in mobile agent system are required to be registered in the third-party certification center so as to obtain a digital certificate issued by the third-party certification center. Each server launching mobile agent has a static communication agent Tracker, responsible for maintaining the context information launched by the mobile agent and agent migration thereby solving problems in the labyrinth and authentication of mobile agent in traditional mobile agent system so that the existing mobile agent system can become more secure and reliable.
2401
Abstract: With the rapid development of communication technology, embedded technology, sensor technology, and the constantly emerging of micro-sensor nodes performing perception, computation, communications. Design of sink node is reliable in monitoring environmental elements. A communicated architecture of Wireless Sensor Network is presented in this paper, and hardware design of sink node for transmission data is also discussed.
2406
Abstract: Logistics systems can be abstracted to complex networks which are composed of logistics nodes and transport routes. The structure and geometric properties of the complex network has an important impact on the logistics industry development and management. The article use a provinces logistics network as the prototype and build a complex network. Apply complex network theory to analyze the logistics network. The article found that the logistics network has small-world properties. Also, the article discussed the important nodes based on the statistical indictors. Finally, compare the results with the real planning nodes level.
2410
Abstract: The wireless sensor networks are widely used in many fields because of its characters such as large-scale, self-organization, dynamic, reliability and so on. But its developments have encountered many problems and the security is an important problem. The traditional security protection method cannot be applied directly to the wireless sensor networks such as the intrusion detection system due to its special characteristics with limited memory and storage space. In this paper, the security problems and related protection mechanisms in the wireless sensor networks are discussed and the intrusion detections are introduced. The essential reasons of security issues in wireless sensor networks are analyzed and some intrusion attacks methods are illustrated. The security pattern in the wireless sensor networks is provided and analyzed.
2415
Abstract: The efficiency of pattern matching algorithm used in detection engine decides the performance of intrusion detection system. This paper improves the data structure of SBOM Algorithm, which is well-known keyword matching algorithm, by adding or removing keywords dynamically. The results of experiments on 1999 DARPA intrusion Detection Evaluation Data Sets indicate that the implemented NIDS(Network Intrusion Detection System) is comparatively excellent for large keyword sets.
2419
Abstract: On the basis of analysis of the existing ZigBee network routing strategy, to save network energy consumption and balance the network load, the paper proposed an energy-efficient improvements and applied it in the marine environment, designed a marine monitoring the Internet of Things with ZigBee wireless monitoring network, satellite communications and remote monitoring management in the integration. The strategy improved ZBR routing algorithm based on the cluster-tree algorithm and AODVjr algorithm. The improved strategy can reduce the routing overhead while fully consider the protection of low energy nodes, effectively reduce network energy consumption, balance the network load to maximize network lifetime.
2423