Applied Mechanics and Materials Vols. 608-609

Paper Title Page

Abstract: Paper study the MAC layer security mechanism and data frame structure in ZigBee protocol, improve the algorithm for random Fuzzing test technology, and test method of attack fusion boundary, structure of Fuzzing and the node clone, proposed a ZigBee routing protocol for the MAC layer security comprehensive detection algorithm. Fuzzing test show that the testing algorithm can not only greatly improve the test efficiency in Fuzzing, more than the structure of Fuzzing is increased by 50% in path coverage.
503
Abstract: This article analyses in detail the safety hazards and risks among all levels of the enterprise from the point of view of the structure, there may be in accordance with the overall balance, principle, technology integration, propose a network security requirements of the enterprise, and further puts forward a whole network security solutions. Moreover, the paper takes Web service composition documents as the research object, through the analysis of the server, the port and address on the Web file, to establish Web intrusion detection model. The core of the model is the monitoring of host resources in Web server, finally discusses in detail the design and Realization of resource monitoring system.
507
Abstract: This paper introduces the software radio technology model and multi mode modem technology based on software radio, and analyzed and designed in detail the multi mode modem technology and current communication field, finally, and it is realize on the FPGA. Multi mode modem greatly improving communication system reliability, flexibility, increase system capacity, will have broad market prospect.
512
Abstract: In this paper we design a wireless sensor network of Zigbee technology, which consists of sensor nodes, sink nodes and monitoring software design. Through laboratory test, the design of the system is stable and reliable. Although the system can meet the requirements of Zigbee wireless communication hardware, but part of system hardware is relatively simple. If it is applied to the more complex place, we must add the corresponding module in the hardware and software. Adding node function module and the monitoring function in the Zigbee wireless network, it will meet the actual needs.
517
Abstract: An efficient Single Source Single Relay Cooperative Automatic Repeat Request (CARQ) protocol for TDMA-based High Delay Wireless Networks is proposed in this paper, which enables both of the Source and the Relay to retransmit packets to the Destination based on the special nature of TDMA-based time frame structure, and increases the successful transmission probability of a packet from the Source to the Delay using the high delay between the Source and the Relay.. By means of comparison of the system throughput between the two ARQ algorithms (the traditional and the proposed algorithms), we proved that the proposed protocol gave a better performance in poor channel conditions.
521
Abstract: With the development and popularization of the computer network, the security problem has increasingly become the focus of common concern. The computer network safety problems mainly include: protocol design issues, awareness, management system and technical operation. Hackers on the computer network attack techniques: Deceptive attack, masquerade attacks, vulnerability attack, covert attack and technical attack. Accordingly, we should take the corresponding safety countermeasures: strengthen network security education, using the network protection technology, detection technology and anti-virus technology. This paper mainly analyzes the defects and the security problems of computer network, discusses about the maintenance of computer network security and the way for computer network attack technology defense strategy.
526
Abstract: This paper analyzed current network security of the small and medium-sized enterprise, and discusses the existing problem in small and medium-sized enterprises and the existing technology, and network security and management. Finally the paper points out the network security and proposed network security model with four layers (application layer, system layer, network layer, physical layer) network defense in depth security solutions and network security deployment plan based on the MPDRR (safety management, safety protection, safety inspection, safety, security response recovery).
531
Abstract: One being developed intelligent vehicle security system, need to estimate if anyone on a certain range ahead is authorized users then intelligently open the car door or not, in order to ensure work convenience and anti-theft security. This paper proposed a method using face recognition technology to predict the data of image sensor. The experimental results show that, the proposed algorithm is practical and reliable, and good outcome have been achieved in the application of instruction.
536
Abstract: For simple RF network's proprietary of RF protocol: simpliciTI network protocol, in the design and implementation of wireless sensor network, this paper completed the selection and circuit connection for sensor network node of each function of RF module, and given the software design process of each function node, using C language completed the development of related procedures in the IAR development environment, and design the hopping mechanism to avoid noise interference.
541
Abstract: With the rapid development of GIS, it is applied to network management gradually. We can get the distributed trend of the topological nodes and the topology relation between each other through GIS. In order to reflect the topology relation when we change the zoom level of the map, it is a critical problem that how to realize a large numbers of topological nodes be aggregated quickly and accurately. In view of this situation, this paper introduced two common aggregation algorithms firstly, and then proposed an aggregation algorithm for aggregating the topological nodes in GIS with the advantages of hierarchical clustering algorithm. The paper also explained the basic idea and realization of the aggregation algorithm. The experiment results show that the algorithm provides an effective solution for aggregating topological nodes.
545

Showing 101 to 110 of 228 Paper Titles