Applied Mechanics and Materials Vols. 380-384

Paper Title Page

Abstract: Wireless network optimization is an important link in the beginning of the wireless communication network construction process, which decides the construction of wireless communication network whether scientific. This paper focuses on the method and content of the LTE wireless network optimization, mainly involves in the planning process and key technologies of LTE wireless network. First, this paper discusses LTE network parameters optimization include PCI, Cells, RS, C\N and RSC\RSRP. Then, verify the scheme scientific based on Automatic Cell Planning. Finally, through the network experiment examine the feasibility of the scheme.
1931
Abstract: With the development of educational information technology, the traditional training mode cannot meet the requirement of the times. So exploring a new training mode is an imperative necessity. This paper analyzes the feasibility of tertiary in-service EFL teachers online training mode according to the responses from the investigation and interviews, and attempts to prove online training is an effective way for teachers professional development and life-long learning.
1935
Abstract: There is an immense amount of data in the cloud database and among these data, much potential and valuable knowledge are implicit. The key point is to discover and pick out the useful knowledge, and to do so automatically. In this paper, the data model of the cloud database is analyzed. The relationships among different areas in the data are then analyzed, from which the new knowledge can be found. The basic data mining model based on the cloud database is defined, and the discovery algorithm is presented.
1939
Abstract: Wireless sensor network is one of the three emerging technologies which have changed peoples life in the 21st century. More and more scholars at home and abroad are interested in wireless sensor network because of its vast potentials for future development. However, because of openness of the wireless sensor network, it is easily attacked by several network aspects. This paper will introduce the basic concept of wireless sensor network first and then present potential safety hazards on each protocol stack layer of the wireless sensor network from the perspective of layered network. An overview of the current popular means of defense on each protocol stack layer will also be summarized and the future research trend of attack and defense means of the wireless sensor network will be put forward finally in this paper.
1943
Abstract: Constructing the tree type logic structure of a file and introducing the view mechanism of database system into the file system, the hierarchical structure of view files is created. Different files ( view files ) are provided to different users according to their levels or interests by mapping layer by layer with beginning of the minimum access unit (the logic block). It can solve the problem of the discrepancy of users views.
1947
Abstract: In recent years, cloud computing and Internet of Things have been the focus of research at home and abroad, the application of them is becoming increasingly wider, and smart campus is the outcome of the application of intergrading the cloud computing and the internet of things. In this paper we first introduce the application of the IOT and the cloud computing in education. Then we raise the model and application framework of smart campus. By the means of analyzing the model and application framework of smart campus base on the cloud computing and the internet of things, we study its function apply. At last we discuss the issues of smart campus to be widely applied.
1951
Abstract: Nowadays, it is common that people have several identities in different online social networks where their identities information is stored as user profiles. Matching cross-platform user profiles becomes a spotlight in the future research. In the paper, we propose a profile matching framework. Depending on the format of each field, different string similarity measures are adopted. Meanwhile, each fields importance is considered. At last, we evaluate the effectiveness of our proposed methods by experiments.
1955
Abstract: Nowadays, more and more people use microblogs to share information. Consequently, mining microblog users behavior features is very valuable. In the paper, we propose a user interest mining framework. After data pre-processing, VSM is used to generate the feature vector of the tweet sets. Furthermore, k-bit binaries called interest hash-value and continuous interest hash-value are generated by use of Simhash algorithm. The user interests and change patterns could be mined by analyzing the hamming distance sequences between adjacent two hash-values. Taking Sina microblog as background, a series of experiments are done to prove the effectiveness of the algorithms.
1959
Abstract: This paper discusses the developing situation of China mobile e-commerce, analyzes its development trends and bottleneck, analyzes the technical characteristics of NFC, and discusses the specific application and development trend of NFC in the mobile e-commerce payment.
1963
Abstract: Traditional network processors (NPs) adopt either local memory mechanism or cache mechanism as the hierarchical memory structure. The local memory mechanism usually has small on-chip memory space which is not fit for the various complicated applications. The cache mechanism is better at dealing with the temporary data which need to be read and written frequently. But in deep packet processing, cache miss occurs when reading each segment of packet. We propose a cooperative mechanism of local memory and cache. In which the packet data and temporary data are stored into local memory and cache respectively. The analysis and experimental evaluation shows that the cooperative mechanism can improve the performance of network processors and reduce processing latency with little extra resources cost.
1969

Showing 431 to 440 of 1095 Paper Titles