Applied Mechanics and Materials Vol. 443

Paper Title Page

Abstract: The most important and concerned problem with the Internet electronic registration is security problem. This contribution uses conic curve method to verify the generating license in servers. In order to ensure the validity and security of license, the process of license distribution apply a verifiable code distribution scheme based on conic curve to make the electronic registration process more secure. In this paper, we propose a distributed electronic authentication scheme based on conic curves. As an alternative algebra curve technology, we believe conic deserves the further study in cryptography.
546
Abstract: Security is one of the major concerns in network coding. Although intrinsic confidential security is provided because different flows of information are mixed, network coding is still vulnerable to modification attack and wiretapping attack if the wire tapper knows the transmission mechanism. In this paper, a kind of encryption scheme is proposed to secure the network. This scheme has such advantages as the number of encryption is small and the wire tappers are not restricted to only part of the transmission links, but all the links are admissible. In general, the number of encryption is only 1/n of traditional encryption, in which n is the degree of one dimension of source message. Whats more, the integrity of network is also checked in every intermediate node which could make the scheme more efficient compared to the sinks detection only.
551
Abstract: This paper describes a system; CODESSEAL can provide protection and evaluation to system software. CODESSEAL was designed to protect embedded systems with sufficient expertise and resources to capture attack equipment and manipulator, not only to protect software but also to protect hardware. By using the reconfigurable hardware allows CODESSEAL to provide confidentiality, integrity of security services and a platform-independent program flow without having to redesign the processor. System uses software and data protection technology and designs cycle simulation methods for data analysis. Experimental results show that the protected instructions and data with a high level of safety can be realized a low, which in most cases the performance loss can be reduced to below 10%, so the research of software protection methods of the embedded operating system of hardware compiler has important practical significance.
556
Abstract: The payment system of wireless communication is a whole of the various types of software used by the wireless communication network, wireless payment terminals and payment terminals, which together constitute the user applications. Compared to traditional network, wireless communication network is an more open system. According to this, users personal is easier to be stolen in the transfer process and the type of attack has become more diverse and innovative. The article introduces two types attack and solutions. Fishing Wifi is a common means of attack in the wireless network nowadays. Mobile banking is a typical example too. It involves the security of payment in mobile banking which becomes the new problem within e-commerce.
561
Abstract: Informed coding and informed embedding have received considerable attention as a method of digital watermarking with side information in resent years. We designed a new type of codes called structured dirty-paper trellis in which each message is replaced by amount of alternative vectors. This method is very efficient to prevent brightness scaling. A Viterbi decoder is used in the detecting part to find out the highest correlation path. The correct message will be detected no mater how the brightness has been changed for it has no relativity with brightness. In embedding part, watermarking message is adapted by SNR. The original image is divided into several blocks which are transformed by DCT and the adaptive parameter is calculated based on SNR for each block, then watermarking components with different strength are inserted into some middle-frequency coefficients. The experimental results demonstrate that the watermarks generated with the proposed algorithm in this paper have good imperceptibility and robustness.
566
Abstract: Development and making of multimedia courseware also become the focus of instruction and research. This paper researches several key technologies in making multimedia courseware based on Authorware software, including multimedia materials loading, PowerPoint file calling, full screen realization and screen resolution recovery, program package, etc,In order to better reflect the Authorware multimedia teaching courseware making characteristics and function.
571
Abstract: This project designed a kind of intelligent home system the general structure and the software and hardware solutions. Based on Arm cortex-M3 core,STM32 F103VCT6 carrys currently popular open-source mobile operation platform Android, and embeded wireless module CC2430 based on IEEE802.15.4, the system constitute the mobile base station and information processing center in Intelligent Home System Embedded ZigBee wireless module in mobile intelligent terminal, designed general module drives and develop kinds of applications by Android, the system process various data from all of the ZigBee node.
576
Abstract: This paper introduced how to configure a cluster environment for Cognos BI in Connection Metrics and how to troubleshoot the issues. Cognos Clustering greatly enhance the load capacity of the report server, improve the performance, effectiveness and capacity, make the server more stable, ensure the user quantity concurrency
580
Abstract: In this paper, we put forward a differential service-oriented and self-adaptive job scheduling system in Cloud Computing environment. Analysis and number results show that our approach for job scheduling system can not only guarantee the QoS requirements of the CCUs jobs, but also can make the maximum profits for the CCSP. To the best of our knowledge, the job scheduling system in our paper maybe the first paper to consider both the QoS requirement of jobs and Cloud Computing service providers profits.
584
Abstract: This paper discusses the application of cloud computing in the logistics information platform, First introduced the basic concept and advantages of cloud computing, cloud computing architecture, cloud computing applications in the logistics information platform mode and the basic framework.
589

Showing 111 to 120 of 152 Paper Titles