Applied Mechanics and Materials Vols. 519-520

Paper Title Page

Abstract: For the widespread application of XML technology in network, the security of XML documents is particularly outstanding. XML encryption technology can ensure the confidentiality and integrity of an XML document effectively, and provide important technical for the safety of the XML document transmission. This paper will first introduce the XML encryption technology and encryption standard, and three models of XML document encryption, and then the paper will give three simple implementation of the XML encryption document in the. NET Framework platform. It preliminary ensures the safety of XML document and shows the flexibility and simplicity of XML encryption technology.
202
Abstract: The peer-to-peer (P2P) Computing is one of the key technologies of next generation network, how to search resources efficiently on the P2P network is the most critical problem in the design of P2P network. This paper introduces the characteristics and classification of P2P network. On the basis of analyzing the basic search methods of P2P network, all kinds of search methods are analyzed and studied.
206
Abstract: Complex networks can describe a variety of systems in biology and chemistry, especially the systems containing the autocatalytic set (ACS). However, the robustness of the ACS has not been explored in details. Now we investigate the evolution process to reveal the robustness of the ACS. By defining two variables on the dependency of every node, we find that the ratios of the fraction with maximum and minimum value are invariable. Moreover, the robustness of the ACS depends on the fraction with maximum value extremely.
212
Abstract: Multi-input multi-output wireless mesh networks (MIMO WMNs) act as backbone broadband networks for ubiquitous access. Topology model is a crucial factor in interference avoidance, simplifying channel allocation, and discussing optimal scheduling and routing. Cartesian product of graphs (CPG) is introduced for MIMO WMN as a virtual topology. By putting orthogonal channels into different channel layer meshes, some conclusions are explored on channel allocation, routing and scheduling. A path coherent realization is composed of combinatorial edges over multiple channels for all hops. Some important property propositions in CPG are also given, such as path hops with node address and path number counting. Practical mesh node addressing scheme and path number counting theorems are useful virtual topology properties.
216
Abstract: In MANET, the scheme for maintaining an inter-zone route in ZRP makes ZRP take more lost packets and more route re-discovering times; the former makes ZRP take lower delivery ratio of data packets, which makes ZRP take less reliability; the latter makes ZRP take more transmission delay and more routing overheads. Aiming at the problem above, a MANET-based reliable zone routing protocol (MRZRP) was proposed. In MRZRP, each node saved multiple backup routes from the node to each intra-zone node by maintaining an directed acyclic graph based on an intra-zone topology, and an inter-zone route was repaired by using backup segment routes as much as possible. The simulation results show that MRZRP improves delivery ratio of data packets, which shows that MRZRP improves the protocol reliability, and MRZRP also reduces the transmission delay and routing overheads.
222
Abstract: According to the traditional shortest path algorithm is not suitable for the routing choice in community model of Opportunistic Networks, we propose an improved Floyd shortest path algorithm. This improved algorithm not only considers the space factor between the nodes in opportunistic networks, but also takes into account the time factor of the wireless links.The simulation results show that, compared with the existing FC(First Contact), DD(Direct Delivery) routing algorithm, this improved algorithm can more effectively get the shortest delay paths in opportunistic networks.
227
Abstract: To solve the problems of low efficiency and poor flexibility in modify the form in traditional forms technology, A method of custom form is proposed. The method which is based on the current popular CKeditor open source tools generate the XML file using DOM4J, at the same time generate HXML files to define the form process as the basis of form show page, finally realize the custom form by separating the realization form data control. Experiences show that it can create and modify more flexible and convenient in the model.
231
Abstract: Currently, the generic WLAN authentication protocols have the problem of low security intensity, or the problem of only one-way identification. It cannot completely adapt to the wireless LAN access certification requirements, under the condition of high security. The article analyzes the disadvantage of WAPI protocol, and then puts forward a kind of improved WLAN access authentication mechanism. It implements the mutual authentication, privacy protection, and also it can resist man-in-the-middle attack and impersonation attack. It fulfills the requirement of wireless terminals security access. The effect on security and efficiency is analyzed.
236
Abstract: Mobile devices are popular used in peoples life. Generally, most of portable mobile devices are carried by people. Thus, the mobility of mobile devices is influenced heavily by peoples social relationship. Socially-aware Opportunistic Networks are used in intermittently connected networks by use of store-carry-and-forward fashion. It is mainly based on social relationship to design solutions for problem such as routing protocol or data dissemination. In this paper, we exploit social relationship about friendships information among people and use them to predict the contact opportunities. We present Friend-based Prediction routing protocol (FBP) and establish experiment based on ONE. The simulation results show that the efficiency of FBP outperforms Epidemic and PROPHET in higher delivery ratio, lower overhead and shorter average latency.
241
Abstract: In order to maintain high network QoS (quality of service) against new high-distributed low-rate QoS violation, this paper proposes a novel recognition scheme with the consideration of multiple network features in both macro and micro side. This scheme uses Multi-stream Fused Hidden Markov Model (MF-HMM) in automatic low-rate QoS violation recognition for integrating multi-features simultaneously. The multi-features include the I-I-P triple and TCP header control Flag in a data packet at a micro level, and R feature in network flow at a macro level. In addition, based on the successful experience of Load-Shedding, Kaufman algorithm is used to adjust and upgrade threshold value dynamically. Our experiments show that our approach effectively reduces false-positive rate and false-negative rate. Moreover, it has a high recognition rate specifically for new QoS violation by High-Distributed Low-rate Denial of Service attacks.
245

Showing 41 to 50 of 336 Paper Titles