Applied Mechanics and Materials Vols. 556-562

Paper Title Page

Abstract: Based upon the synopsis of electronic information system and system integrated support, this paper puts forward integrated support model of electronic information system, and sets forth a series of policies and measures, such as strengthening technical practices of general quality characteristics, advancing system integration of integrated support information, and studying and applying software support technology. This will benefit the further development of electronic information system and integrated support engineering.
5556
Abstract: To satisfy the need of good quality and high yield primary production, the agriculture information management system based on wireless sensor networks has been proposed. This system can reduce manpower operation and the error of manual measurement in the course of practical production. Also, it can reduce the cost of agricultural production, and realize automation of agricultural production to the largest extent. Further more, it provides an effective way to realize good quality and high yield primary production. So, it has an important realistic meaning.
5560
Abstract: It is therefore important to implement into practice of uncertainty estimation of coordinate measurement new, correct and metrologically validated methods.because according to technological requirements, results of measurements are useful only when they are given with their accuracy. Currently used methods for uncertainty assessment are difficult and require knowledge and measuring experience. It is therefore important to implement correct and validated methods that will also be easy to implement and will not require broad metrological knowledge from the personnel. Presented here simulation method, based on Monte Carlo method is one of them. The article presents the conception, implementation and validation of this method.
5564
Abstract: Network coding (NC) in wireless sensor network (WSN) has been shown to achieve considerable throughput gains relative to traditional routing networks. While the data throughput capacity of WSNs is unknown, the scaling of capacity with the number of nodes has recently received increasing attention. This paper proposes a Complex Field Network Coding-based Multipath Routing (CFNC-MR) in WSN. The performance of this routing method is studied using NS2 and evaluated in terms of the packet overhead, packet delivery ratio, and packet loss ratio when a packet is transmitted. Simulation shows that the approach is efficient, promising and applicable in WSNs.
5568
Abstract: Aiming at the problem of artificial preservation in seafood transportation, this article has designed an intelligent preservation system during seafood transportation based on Proportion Integration Differentiation (PID) and Evolvable Hardware (EHW). This system can collect real-time humidity and temperature information by the sensor-module, and upload the data through GPRS network. We can analyze and process the data received in the remote control office, pattern-match it in the control-module libraries, and then take effective measures to preserve corresponding live seafood. The system is highly real-time and reliability and can solve the preservation problem in seafood transportation scientifically and effectively.
5572
Abstract: Sensor nodes easily suffer from failure, attack or capture because of the limited energy, storage, communication ability, complex and severe network environment when WSN is applied to emergency or battlefield environment. Thus, the basic scout mission is influenced. In this paper, a survivability route protocol named SRPC in cluster-based WSN is put forward. The protocol uses key negotiation and identity authentication mechanism to resist the attacks of malicious nodes; when the main cluster head is destroyed, monitoring data will be transmitted to the base station by the backup cluster head chain. The simulation results show that, SRPC protocol can not only resist the attacks of the enemy malicious nodes based on energy balance, but also assure reliable delivery of the packets after the cluster head is attacked or destroyed. As a result, the survivable ability of WSN in battlefield is improved.
5577
Abstract: To evaluate the compatibility quality of various H.264 codecs, and promote H.264 codec benign competition in the market, this paper proposes an objective evaluation method. Firstly, this method adopts video distributor, video capture card and other facilities to collect two-way videos, one of which is reference video, and the other is the video encoded and decoded respectively; Then it utilizes SSIM algorithm to find "the best similar frame" between the two videos in order to solve the problem of “Homologous Asynchronous”; Finally, it establishes codec compatibility matrix which can objectively evaluate codec compatibility quality using the proposed five indexes. Experiments show that the proposed method is simple, and can effectively evaluate codec compatibility quality. 
5582
Abstract: A WSN (Wireless Sensor Network) node self-locating means which utilized the position information of anchor nodes is proposed in this paper. There are two types of nodes in the objective network of the means. The first type is the anchor node that equipped GPS (Global Position System) unit, their exact position can be gained. The second type is normal node that supports RSS (Received Signal Strength) based ranging. With the help of anchor node, the normal nodes fulfill a low complexity, coarse-grained, RSS ranging based fuzzy logical locating algorithm, to determine their own positions. Theoretical analysis showed that, the proposed means can provide fine location accuracy with a relative low cost and complexity.
5587
Abstract: We present a cross-cloud storage architecture that protects both user’s data and privacy from cloud providers or potential adversaries by leveraging the concept of Oblivious RAM on a logical layer. Our architecture allows users to conceal reading/writing operations and access sequences from clouds in order to prevent the leakage of access patterns, which may be a threat to data security. In addition, an anonymity preserving mechanism applied in our architecture makes it difficult to track users' data or confirm users' identities, which can effectively protect users' privacy. One Cloud, the proof-of-concept prototype of our architecture integrates four major cloud storage services and implements all key techniques we proposed in our architecture. We deploy it in a real-world network environment to analyze and evaluate the performance and the scalability of our architecture.
5591
Abstract: This paper proposes scheme can achieve mutual authentication and session key agreement based on multi-factor. It improves the scheme proposed by Chuang et al on protecting from the stolen smart card attack, impersonation attack, server spoofing attack and man-in-the-middle attack, and guaranteeing on the forward security. It solves the problem of weak resistance to attacks in single-factor authentication approaches, by combining the smart card with biometrics and password. It also guarantees the security of mutual identity authentication between users and servers and that of session keys. It consumes more computing resources that the Chuang’s scheme, but it can resist to several known attacks efficiently.
5597

Showing 1241 to 1250 of 1532 Paper Titles