Applied Mechanics and Materials Vols. 401-403

Paper Title Page

Abstract: This paper describes an object-oriented model of simulation for multi-operator multi-robot system. A universal hierarchies and inheritances framework and messages passing patterns are proposed, which supply a unified modeling interface with reusability and extensibility. Developers can concentrate on the other related issues of application rather than programming issues.
1738
Abstract: To handle with the limitations of the existing shooting trainingsystems that have large volume, heavy weight,small effective distanceand low evaluation effect, we propose an outsidelight based shooting trainingevaluation system. It records the trace of the aiming point in a shooting process by capturing the images of the outside light source. After that, this system automaticallycomputes target-scoring,and makes the intelligent evaluation of theshooter’s technique level. It can diagnose the holdingstability, trigger controlling, aiming accuracy and other technicalstandards. This system has beensuccessfully applied in the shooting training for police.
1742
Abstract: The optimization program of intelligent and strong power supply system in coal mine is put forward on the basis of the Hu Sheng coal power supply system status. It achieves intelligent and integrated protection and real time monitoring dynamic process of supply network system based on WAMS; at the same time it achieves rapidity and selectivity of leakage protection based on the principle of pulse-polarity and RE identification method. And the program can prevent grade-skip trip, improve the mobility and reliability of mine supply system.
1747
Abstract: The existing routing algorithm of Wireless Sensor Networks (WSNs) pays more attention to the energy efficient. However, Quality of Service (QoS) supported and the validity of packet transmission unveil additional challenges. Based on the Particle Swarm Optimization (PSO), this paper presents a trust QoS routing algorithm for WSNs. Hierarchical structure is adopted and the trust value of the node is constructed with the direct trust value and the indirect trust value. In addition, delivery delay and packet loss are considered as main QoS metrics. Finally, under the optimization ability of PSO, the proposed algorithm tries to find the route with maximum residual energy and reliability in order to maximize network utilization as well as meets QoS constraints. Compared to typical routing algorithms in sensor networks, this new algorithm has better performance.
1751
Abstract: WebGame translated into Chinese is "web game", "web game" user interface uses browser as direct media to communicate with game and users, which has big difference with interface design of other games. Web game has huge potential audience, it simplifies game experience process to the extreme. The industry has recently treats browser as a virtual operating system, which makes a better prospect for web games. We hope that we have come to effective principles and methods and can guide future web game interface design.
1756
Abstract: Multipath Transmission Control Protocol (MPTCP) is proposed by the IETF working group in 2009, can provide end-to-end multi-channel communication, can greatly increase the utilization of network resources and reliability. The study of the details is underway. Congestion control is one of the main issues in MPTCP study. Its goal is to ensure network throughput, to ensure the fairness of the network and to balance congestion .So this paper mainly studies congestion control algorithm. In terms of resource pooling, we propose a MPTCP congestion control algorithm based on packet loss. The algorithm can guarantee the network throughput and improve the fairness among users ,at the same time, the algorithm greatly achieve resource pooling.
1760
Abstract: Multipath Transmission Control Protocol (MPTCP), a transport layer protocol, proposed by the IETF working group in 2009, can provide multipath communication end to end. It also can improve the utilization of network resources and network transmission reliability. However, that how to select multiple paths to improve the end to end overall throughput, and how to avoid the throughput declining by the performance difference, become the focus of this study. We propose a path selection strategy based on improved gray relational analysis, and set the optimal values of the QoS parameters for the selected paths as the reference sequence. According to the value of improved grey relational degree (IGRD) which is compared with reference sequence, we select the paths with better performance, smaller difference for transmission.
1766
Abstract: For existing airspace fragile authentication watermarking algorithm positioning accuracy and security issues, this paper presents a fully-fragile watermarking based on chaos for the integrity of the image content authentication and tamper localization. The algorithm uses the original image block, the calculation of each pixel in the image block high-bit gray value as the image feature watermark information. The chaotic sequence is encrypted and determines the position of the watermark bit is embedded watermark information, tampering with the positioning accuracy of an image block of 2 × 2 pixels. Experimental results show that the algorithm is simple, safe, with good practice.
1772
Abstract: Aim at the feasibility of using electromagnetic emanation side-channel to detect hardware Trojan in IC chips, the structure of EM side-channel signal of chip is analyzed and the leaked model about signal is designed. With explaining the principle of Karhunen-Loeve transform, a method that uses KL transform to obtain characteristic signal of EM emanation side-channel is introduced. It detects hardware Trojan by analyzing the difference between the characteristic signal of chip with and without Trojan. Experiments of detecting hardware Trojan in FPGA cipher chip show that we can distinguish effectively the difference between the EM signals of Trojan chip and genuine chip, then the Trojan in chip can be detected.
1776
Abstract: Subject to the delay restrictions of different traffic, a novel resource allocation based on traffic prediction is proposed for satellite communication. Firstly, different types of traffic are queued in the buffer with partition coefficient according to the priorities. Then, an access control algorithm is implemented by traffic prediction instead of demand. The theoretical analysis and simulation results show that new algorithm can efficiently improve delay performance of multi-type traffic in satellite resource allocation.
1781

Showing 381 to 390 of 519 Paper Titles