Applied Mechanics and Materials Vols. 427-429

Paper Title Page

Abstract: This paper describes the use of Arduino on Android open-source platform in an experimental way to develop a remote control multi-player game. Android mobile is programmed to be a remote control device used to send sockets via Bluetooth network to Arduino microprocessor embedded in a toy car to control movements in all directions along its pathway. We applied the open-source microcontroller Arduino and the Java-Based technology Android in developing a multi-player mobile game in distributed network computing and mobile telecommunication, which strongly focuses on the emergence of technologies that embrace android mobile and Arduino open-sources. Our investigation focuses on an extended form of microprocessor network computing which game software developers utilize to develop remote control games for multi-players. We call this study an experimental mobile computing application in which the Arduino embedded in the toy car can sense the color pattern changes with infrared along its pathway and instantaneously send the data via Bluetooth piconet to the connected Android mobile device. In turn, the Android mobile device sends the data to game server via web services on internet. Currently, mobile computing feeds information into the game server. However, designing concurrent network broadcasting and real-time remote control game is still a daunting task and much theoretical and practical research remains to be done to catch up with the mobile computing and telecommunication era. In this paper, we present the overall architecture and discuss, in detail, the implementation steps taken to create the Arduino and Android based remote control context-aware game. We have developed a multi-player game server and prepared the client and server codes in mobile computing, providing adaptive routines to handle connection information requests in telecommunication and delivery for speedy throughput and context-triggered actions.
2192
Abstract: The popularization of mobile intelligent devices has greatly enriches the function of intelligent district. The intelligent district system which is IP-centric and provides multimedia services such as voice, fax, data, and images has becomes focus of the field. In this article, a mobile intelligent district value-added service platform based on SIP and Web Service is introduced, with the intelligent terminal devices, district residents can get customized service information on their own initiative, and they can communicate with the terminals in the district. Based on the implementation of the platform, information pushing function, weather forecast service and SIP message service are tested, and the result shows the feasibility of the platform, which can be used to satisfy the growing needs of district residents.
2197
Abstract: With the popularity of mobile devices, the communication mode based on speech is increasing obviously. The cognitive load of speech interaction is small, and will not always arouse the user's attention, at the same time, it needs a small physical space, but has great amount of interaction information and high interaction efficiency. The challenge Internet speech information service is facing is speech interaction. This paper analyzes four key technologies: the user behavior modeling of speech service in Internet era, multi-channel perception technology in speech interaction, speech information service platform architecture, and visual analysis of speech information. It also presents the development and application prospect of speech interaction.
2201
Abstract: Internet MIS security technology includes mainly: Authentication, Encryption, Access Control, Auditing and so on. Role-based access control (RBAC) is an access control method that has been widely used in Internet, operation system and relation database many years. Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties. By means of enterprise office automation system (EOA), the enterprise can easily migrate the release of information and communication functions to the Internet, which makes people convenience. The EOA system also provided a combination of enterprise management process reengineering, construction and optimization of the internal management information systems, decision support systems, and office automation systems. The system can get high level technical and advisory support for the management of enterprise information to fulfill the needs of specific business, affairs, and the conferences. This paper introduces EOA system strategy based on role-based access control (RBAC). The system centers in day-to-day office management service, achieves division of authority between different departments and staff through the introduction of data rights and function rights, so as to achieve the office management platform with the coordination of information, management, and service. This paper provides the method of realizing the work flow through RBAC management, the concept of authority is broken down to each operating procedures; realization of user operational procedures are reflected in the achievement of right-matching and right-series, office processes are standardized, the management level and quality are improved; the goal of improving office efficiency is achieved.
2206
Abstract: We proposed a maximum concurrent network flow based channel assignment algorithm (MCFCA) for wireless networks. In the MCFCA algorithm, we first use the maximum concurrent network flow algorithm to compute the maximum network capacity, then we assign each link a priority according to its link throughput, finally the channel is assigned to minimize the interference between neighbor nodes in the priority order. Performance simulation shows its effectiveness in channel assignment.
2212
Abstract: We proposed a distributed broadcast algorithm which is based on master/slave dominator partition, it not only guarantees the full coverage of the network, but also has better scalability. In our algorithm, each node first selects its connected domination set (CDS) from its two hop neighbor graph, then partitions the domination nodes into master and slave dominators, master dominators forward the broadcast packet, slave dominators monitor the network coverage and forward the broadcast packet when necessary.
2217
Abstract: The I2P network has been widely used to protect user privacy via an open network of onion routers run by volunteers. To the best of our knowledge, the behavior of peers in the I2P network has not been well investigated in the existing researches. In this paper, we first present a simple and effective way to collect peers in the I2P network. Each day over 82% peers has been collected compared to the statistics from the statistics web site. With the data collected, we perform an empirical evaluation, revealing the phenomenon about IP address aliasing and identity aliasing. As identity aliasing makes bad impact on the availability and anonymity of the I2P network, we introduce family concept into the I2P network to mitigate the impact.
2223
Abstract: When some links or nodes on the path break down, a rerouting path should be found in trustworthy network. In this paper, a fallback based k-hop backtracking trustworthy QoS (Quality of Service) rerouting mechanism is proposed. First,the network model and user trust evaluation model are constructed. Then the description of users requirements, the calculation methods of users satisfaction and the criterion of path judgments are presented. Considering users QoS requirements, trustworthy requirements and decrease of the algorithm cost, fallback is used for backtracking rerouting at the previous node of the failure node (or link) in the proposed mechanism. It reuses original links of the path as much as possible to reduce the time of rerouting. The simulation results show that the proposed mechanism is both feasible and effective. In contrast to existing mechanisms, both the rerouting success rate and user satisfaction degree are increased and the rerouting time is reduced under uses requirements.
2229
Abstract: Survivability is an important concern in the optical network. In order to offer an effective and efficient protection mechanism that meeting both delay constraint and availability guarantees for real-time services in the optical network, a shared path protection mechanism based on delay constraint is proposed in this paper. Thinking of the processing delay and the propagation delay as main factors which have great effect on the delay of real-time services, the mechanism designs the routing and wavelength assignment schemes for the working path and the protection path. Simulation results show that the proposed mechanism is both feasible and effective.
2237
Abstract: In this paper, an ABC (Always Best Connected) supported QoS (Quality of Service) unicast routing scheme is proposed. In the proposed scheme, in order to overcome difficulties on accurately measuring network link parameter values and exactly expressing user QoS requirements, the knowledge of the fuzzy mathematics and probability theory is introduced, and the range is used to describe these parameters; both of the users utility and the network providers utility are computed, and gaming analysis is taken to deal with profits of both the user and the network provider; EDPGA (Elitist Distance-based Pareto Genetic Algorithm) is used to find the specific QoS unicast path with Pareto optimum under Nash Equilibrium among all parties utilities achieved or approached. While comparing with unicast routing scheme based on Dijkstra and the game theory based fuzzy unicast QoS routing scheme, simulation results show that this proposed scheme is both feasible and effective.
2245

Showing 491 to 500 of 657 Paper Titles