Applied Mechanics and Materials Vols. 380-384

Paper Title Page

Abstract: Collection Tree Protocol is a data collection protocol for wireless sensor network, which is based on an embedded operating system --TinyOS. This article briefs the mechanism of Collection Tree Protocol, analyzes the principle of data transmission. Especially, when mass of data must be transferred, it solves the reliability of Collection Tree Protocol. This improves its performance and has wide development prospects.
2897
Abstract: With the increasing development of information technology, the scope of the application of multimedia technology is more and more widely. The application of multimedia technology in teaching has become more and more mature, which has formed a complementary relationship with traditional education. But the application of modern multimedia technology in the physical teaching is relatively lag, which has become one of the urgent problems to be solved in this field. Based on the characteristics of the integration of inside and outside class teaching and multimedia technology, it constructs the multimedia system of the integration of inside and outside class teaching. According to the aerobics rhythm continuity characteristics, the spatial discretization code of the interlaced scanning image makes the integration of inside and outside class of aerobics teaching of mutual learning come true. And it applies the data envelopment analysis to make experiment exploratory empirical analysis on the whole teaching system, which can be able to provide scientific support for modern education and teaching with positive feedback nature of the teaching advantages.
2901
Abstract: Due to the particularity of vocational education, vocational colleges teacher had a lot of tacit knowledge in skill, which was very difficult to be coded, summed and expressed. The platform was built to promote the conversion of tacit knowledge and improve teacher professional development by some tools and technology. The structure of the platform used B/S mode, and there were some functional modules which were Resource Database, Teacher Studio, Teaching Activities Room and Watching the Video Room. The platform had been developed by Microsoft Visual Studio 2010, C#. Net and Microsoft SQL Server 2008.
2906
Abstract: This article on cloud computing and data mining to a more comprehensive study to introduce the concept of cloud computing and data mining, pointed out that the traditional data mining techniques in the case of network test system of massive data mining, processing speed is slow, the load is not balancing and node efficiency is not high enough, Apriori algorithm based on the Map/Reduce parallel programming model, the distributed nature of cloud computing environments, make full use of cluster computing resources to support the parallel execution of algorithms by examples of cloud computing after Apriori algorithm in cloud computing environment to get higher efficiency of frequent itemsets mining algorithm performance than traditional data mining.
2911
Abstract: Traditional massive data mining with BP neural network algorithm, resource constraints of the ordinary stand-alone platform and scalability bottlenecks and classification process serialization due to classification inefficient results, and also have an impact on the classification accuracy. In this paper, the Detailed description of the flow of execution of the BP neural network parallel algorithm in Hadoop's MapReduce programming model.Experimental results show that: the BP neural network under the cloud computing platform can greatly shorten the network training time, better parallel efficiency and good scalability.
2915
Abstract: This study deals with devising and implementing a novel technique for image authentication and secured message transmission based on hiding large volume of data into gray scale images. A grayscale image fragile watermark authentication system in spatial-domain is proposed. First it preprocesses the watermark image and resizes it to a quarter of the size of the original image. Then, it generates a random key matrix K and 128bit message authentication code from the original image. It replaces the 128bit message authentication code for the former 128bit of K to obtain a new key matrix KH. Then, it calculates the embedded position P=KHi xor (b7,b6,b5.b4) i MOD 3. b7,b6,b5,b4 are the high 4 bits of the original images pixel. It embeds the watermark image according to P value to the lower 4 bits of the original images pixel. The system is made in experiment. The result shows the system has good imperceptibility.
2920
Abstract: Image authentication has achieved a sharp attention now a day due to broad availability of internet services. Maldistribution and illegal copying of image volatiles the authenticity of image-ownership. In this regard the digital watermarking-based image authentication system is studied. A color image authentication system is proposed. This system converts a color image into a grayscale image, and divides the grayscale image into 8*8 small pieces. Each small piece is made into DCT transform and extracted low frequencies to form the watermark. Then, the original image uses LSB algorithm and hash algorithm in watermark image to form authentication code. The system makes the authentication code as watermark information to embed watermark. The system is made in experiment. The result shows the system has good imperceptibility.
2925
Abstract: Smart meter reading system is the core of advanced metering infrastructure for Smart Grid. Wireless sensor network is an important means to realize the power information collection. Based on hierarchical strategy, this article proposed a method to establish routing in wireless smart meter reading system. This method provides reliable two-way communication routing, but also greatly reduces the collision probability of network communications. In order to verify the feasibility of the approach, a large number of simulation experiments were carried out. This idea has been applied in actual engineering practice.
2930
Abstract: To improve the way of traditional remote control controlling home appliances and solve the problems of the traditional remote control, such as redundancies and inconvenience result from the "one on one" working mode, a new design was proposed to overcome this shortcoming, introducing the design and realization about how to construct the Zigbee network node and the infrared converter's main function module, which was working on "one on many" mode. It was based on embedded system technologies where CC2530 was used as the core of hardware platform.The design also realizes a friendly user interface based on PC machine.
2937
Abstract: Provided by ALTERA FPGA/CPLD Quartus II development software development platform. programmable timer/counter 8253s functions and internal circuitry as the basis, combined with programmable gate array (FPGA) products FLEX10KE characteristics, using VHDL hardware description language and schematic Figure two ways 8253 for hierarchical, modular, parameterized logic design. The completed design will be configured to the chip of FLEX10KE,and Proved to be correct.
2941

Showing 651 to 660 of 1095 Paper Titles