Applied Mechanics and Materials
Vol. 538
Vol. 538
Applied Mechanics and Materials
Vols. 536-537
Vols. 536-537
Applied Mechanics and Materials
Vol. 535
Vol. 535
Applied Mechanics and Materials
Vol. 534
Vol. 534
Applied Mechanics and Materials
Vol. 533
Vol. 533
Applied Mechanics and Materials
Vol. 532
Vol. 532
Applied Mechanics and Materials
Vols. 530-531
Vols. 530-531
Applied Mechanics and Materials
Vol. 529
Vol. 529
Applied Mechanics and Materials
Vol. 528
Vol. 528
Applied Mechanics and Materials
Vol. 527
Vol. 527
Applied Mechanics and Materials
Vol. 526
Vol. 526
Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials Vols. 530-531
Paper Title Page
Abstract: Electric energy consumption data acquisition system is an important part of the smart grid, with the construction and development of the State Grid Corporation electric energy consumption data acquisition, micro-power wireless communication is becoming one of the important local communication technologies for electric energy consumption data acquisition. However, many micro-power wireless provider different standards also brought many problems. This article describes the status of the domestic energy consumption data acquisition, the characteristics of micro-power wireless communications Interconnection and Interworking as well as prospects for the future research directions in the field of micro-power wireless communications.
751
Abstract: As an advanced information recognition and data capture techniques,RFID are widely used in many areas. However, due to the RFID tag works and cost constraints, information security through wireless channel is threatened. Through analyzing the security risks and existing defect of the RFID authentication protocol,this paper proposes a new RFID authentication scheme combined public key encryption algorithm and hash function. Analysis result shows that it has higher security and the smaller resources consumption in achieving.
756
Abstract: This paper presents a new WIA-PA network intrusion detection system -- Auto Regressive and Moving Average (ARMA) network traffic prediction model. This model can predict the network traffic quickly and accurately, and because this is a third party testing system, it does not need to take network resources, the security of the WIA-PA network design is of vital importance. The simulation results show that our proposed system can effectively detect intrusion attack, improve the performance of the entire network, prolonging the life of the network.
760
Abstract: In view of the rapid detection, parameter estimation and symbol (also or bit) timing of MSK communication, the paper proposes a non-cooperative detection processing method after doing some analysis on the characteristic of the delay-multiply signal of MSK communication. With the proposed method, the non-cooperative receiver may achieve the feature extraction of the system working frequency, symbol rate and symbol timing regarded, only by doing delay multiplication and filter processing on the received signals; And the corresponding parameter estimation and the timing can be easily achieved. Especially, the proposed method does not need any a priori information, it can fit the need of low signal-to-noise ratio of non-cooperative communication detection.
764
Abstract: For the study of the applications of partial network coding based real-time multicast protocol (PNCRM) in Mobile Ad hoc networks, the researches should be developed in the probability distribution of delay. In this paper, NS2 is used to obtain the delay of data packets through simulations. Because the delay does not obey the strict normal distribution, the maximum likelihood estimate method based on the lognormal distribution is used to process the data. Using MATLAB to obtain the actual distribution of the natural logarithm of delay, then drawing the delay distribution with the maximum likelihood estimation method based on the lognormal distribution, the conclusion that the distributions obtained by the above mentioned methods are basically consistent can be obtained. So the delay distribution of PNCRM meets the lognormal distribution and the characteristic of delay probability distribution can be estimated.
768
Abstract: First, as the 4G network, the introduction of IPv6 network layer security mechanism, security is enhanced at the same time, IPv6 security mechanism applied to the 4G network system security as well as new demands and challenges, followed by the core network based on IPv6 network security to face the next 4G threats and security problems, concludes with IPv6 technical analysis and 4G network defense and countermeasures.
773
Abstract: We propose and develop a passive alignment technique of 4 output waveguides of PLC-based 90° OH and a 1×4 PD array. This alignment technique only uses an infrared CCD camera and an infrared light.
777
Abstract: In this paper,we talk about the design and realization of the command and schedule system for radio and TV transmit stations.We first describe the whole system structure.Then,the paper gives a detailed description about the system function.Finally,we describe the simply implementation of this system and a design scheme is recommended.
781
Abstract: The system quickly build virtual scene and the scene of several aspects like transport, application layer interaction techniques were studied in this paper, to build an easy development and deployment, scalability, easy maintenance, based on experience and strong Internet roaming online interactive virtual reality systems. Rapid method for constructing virtual scene scene WebVR transport mechanisms and interactive virtual scene surface were studied, research has better practical value.
785
Abstract: The article introduced the basic data construction of RDS and how to use hardware and software combination to achieve RDS data reception and processing. Subcarrier demodulation is completed by ASIC that outputs RDS pulse signal to the decoding MCU. Discuss focuses on fast and efficient RDS signal sampling and processing. The algorithm is concise and easy to implement, so common MCU can complete the input data synchronization, verification and valid data extraction.
789