Applied Mechanics and Materials
Vol. 437
Vol. 437
Applied Mechanics and Materials
Vol. 436
Vol. 436
Applied Mechanics and Materials
Vols. 433-435
Vols. 433-435
Applied Mechanics and Materials
Vol. 432
Vol. 432
Applied Mechanics and Materials
Vol. 431
Vol. 431
Applied Mechanics and Materials
Vol. 430
Vol. 430
Applied Mechanics and Materials
Vols. 427-429
Vols. 427-429
Applied Mechanics and Materials
Vols. 423-426
Vols. 423-426
Applied Mechanics and Materials
Vol. 422
Vol. 422
Applied Mechanics and Materials
Vol. 421
Vol. 421
Applied Mechanics and Materials
Vol. 420
Vol. 420
Applied Mechanics and Materials
Vol. 419
Vol. 419
Applied Mechanics and Materials
Vol. 418
Vol. 418
Applied Mechanics and Materials Vols. 427-429
Paper Title Page
Abstract: In the article the constitution of cyberspace is analyzed from three layers which are physical layer, logical layer and social layer. And representation methods of each layer are given. On the basis, the description methods of Cyberspace actions are analyzed. So the meaning and nature of cyberspace could be understood deeply according analyzing.
2477
Abstract: MIPI RF Frond-End Control Interface (RFFE) is a specification of a bus interface specifically designed for the needs of current and future mobile wireless systems to control the slave devices in an RF front-end.This new technique has so many advantages over I2C and SPI interface.So in this article I give an overview of MIPI RFFE and the stratege to realize the IP for RFFE,finally I describe the results getting from simulating the IP through VCS.It is convenient to implement and control the specified IP,and which can be used wisely in so much fields.
2481
Abstract: In the paper, a design and implementation of real-time video transport system based on MPC860T is introduced. The key technologies and system implementation steps are discussed from the hardware architecture and software design, focusing on the process of the hardware design and software platform composition. Finally, the operation process analysis of system platform is given. The test results show that the system can achieve better real-time performance and reliability.
2485
Abstract: Rich information is contributed to microblogs by millions of users all around the world. However, few work has been done on the study of microblog web page extraction so far. We proposed a unified structured information extraction method based on hierarchical clustering which is suitable for microblog web pages of any microblog websites. The experiment result on microblog web pages of some popular microblog service providers indicates the high performance of our method.
2489
Abstract: In the paper, the region of the number of equilibrium points of every cell in cellular neural networks with negative slope activation function is considered by the relationship between parameters of cellular neural networks. Some conditions are obtained by using the relationship among connection weights. Depending on these sufficient conditions, inputs and outputs of a CNN, the regions of the values of parameters can be obtained. Some numerical simulations are presented to support the effectiveness of the theoretical analysis.
2493
Abstract: As wide applications of wireless sensor networks, privacy concerns have emerged as the main obstacle to success. When wireless sensor networks are used to battlefield, the privacy about base-sation-locations become a crux issue. If base-sation location will be exposed to adversary, the consequence is inconceivable. Random data collection scheme has a problem that message latencies become larger higher for protecting mobile-base-station-location privacy .In this paper, BDGW (Bidirection Greedy Walk) is proposed to preserve mobile-base-station-location privacy. In BDGW, data are forwarded by greedy walk and stored at pass nodes in the network, the base-sation move in bidirection greedy walk to collect data from the local nodes occasionally, which prevents the attackers from predicting their locations and movements. Compared to random data collection scheme, BDGW has smaller message latencies, while providing satisfactory mobile-base-station-location privacy.
2497
Abstract: As wide applications of wireless sensor networks, privacy concerns have emerged as the main obstacle to success. When wireless sensor networks are used to battlefield, the privacy about base-station-locations become a crux issue. If base-station location will be exposed to adversary, the consequence is inconceivable. Random data collection scheme has a problem that message latencies become larger higher for protecting mobile-base-station-location privacy. In this paper, GROW (Greedy Random Walk) is proposed to preserve mobile-base-station-location privacy. In GROW, data are forwarded and stored at pass nodes in the network, the base-station move in greedy random-walk to collect data from the local nodes occasionally, which prevents the attackers from predicting their locations and movements. Compared to random data collection scheme, GROW has smaller message latencies, while providing satisfactory mobile-base-station-location privacy.
2502
Abstract: In the paper, we use the principle of hyperlink analysis method to mine the website data according to the indicators of the hyperlink analysis. This method can evaluate the impact of the website based on the data which is mined from the website. The application of the results of its evaluation can be used in two hands. On the one hand, the analysis of website impact can help to find the status and problems of the website and propose improved strategies; on the other hand, it can help to analysis the applicability of the evaluation indicators of the hyperlink analysis method for the evaluation of the impact of the website.
2508
Abstract: Based on the security OS (SLinux) designing and implementing, this paper adopted information flow sequence to represent information flows and covert channels. Categorized the covert channels according to their information flow characteristics and discussed the integral method of dealing with covert channel. On this basis, proposed a genera l framework for covert channel identification founded on information flow analysis, and designed the optimization rules of covert channel identification. The framework and the rules can decrease the illegal flow of misinformation by restricting in formation flow combination spread, and provide the basis process for improving of analyzing covert channel.
2512
Abstract: In LTE-Advanced (LTE-A) system, coordinated multi-point (CoMP) technology can reduce inter-cell interference effectively, and improve the communication quality of the cell edge users. The main purpose of this paper is to optimize the precoding algorithm and enhance the overall cell throughput in LTE-A CoMP downlink. Based on CoMP-JP, we focus on zero-forcing (ZF), block diagonalization (BD) and signal-to-leakage-plus-noise-ratio (SLNR). We propose an improved precoding algorithm (ZF-SLNR) which combines the advantages of ZF and SLNR . Simulation results suggest that ZF-SLNR algorithm provides appreciable performance improvement.
2519