Applied Mechanics and Materials Vols. 644-650

Paper Title Page

Abstract: Radio Frequency Identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects. It is well suitable for many fields and is expected to replace barcodes in the near future. However, it is a challenging task to design an authentication protocol because of the limited resource of low-cost RFID tags. Recently, a lightweight RFID authentication protocol presented by Kulseng et al uses Physically Unclonable Functions (PUFs) and Linear Feedback Shift Registers (LFSRs) which are well known lightweight operations. The number of gates which the protocol require can be significantly decreased. Unfortunately, their protocol faces several serious security issues. In this paper, based PUFs and LFSRs, we suggest a secure mutual authentication for low-cost RFID Systems. Security analysis shows that our protocol owns security and privacy.
4496
Abstract: Gradient Vector Flow (GVF) Snake has been extensively utilized in handling image segmentation and classification problems. However, GVF Snake has a drawback in that it sometimes may fail to stop the snake at weak edges, especially at the locations where a weak edge is very close to a strong one or some noise. To guide the snake toward the appropriate edges, we have added gradient directional information to the external image force to create a “directional snake”. Experiments prove that the new model limits the influence of false edge, avoid the edge leak, and obtains desired segmentation results.
4501
Abstract: Computer vision based mechanical parts recognition has been received much research attention in recent years. In this paper, we present a new framework to address this problem. The framework utilizes the computer graphic technology to model mechanical parts. Recognition is realized by comparing one query image to the instance images using improved affine transformation based on particle swarm optimization (PSO). Our experiment shows that the proposed framework outperforms the conventional invariant moments based recognition methods in recognition rates.
4505
Abstract: In the target-oriented imaging and identification process, irregular single-frame moving image will produce aberration and dynamic distortion of edge, the effective of imaging is not good. A new feature contrast correction technology for moving image method is proposed in this paper to realize the moving posture correction. Experimental results show that the obtained offset of posture correction by using the improved algorithm is less than the traditional method. In addition, the high correction precision and improved peak signal to noise ratio all show the superiority of the proposed algorithm. It has good application value in the moving image fusion, identification and other field.
4509
Abstract: KPI indicators of traditional user perception system can not accurately reflect user's perception. Based on the monitoring of Iu-PS interfaces, this paper describes a kind of user perception system of PS domain of TD-SCDMA network. Multi-index set, Multi-dimensional analysis and weight set are adopted to evaluate user perception. Through message decoding, CDR (call data record) synthesis and user perception model foundation, we can evaluate the sense of user perception synthetically, and it is applicable for fault location. First and foremost, the paper focuses on CDR synthesis algorithm and user perception model. According to the test of network data,it is verified that the test result is correct,and the effect is good.
4513
Abstract: s: Based on the field bus technology, the computer network communication technology, embedded control system, the rapid development of technology and fault diagnosis technology, train communication network system based on formal method and simulation method are reviewed. For the application as a starting point, makes a research from the formal modeling, train communication network node system, dynamic property verification etc., summarizes the problems existing in this field, and the node system and topology communication network on the modern high speed train is optimized, provides system level reference for the design of train communication network and node system.
4517
Abstract: This paper presents a method of base station positioning for smart phone. This method uses discrete points to represent small areas of the same barrier model, and positions by RSSI feature sampling and vector matching. By avoiding the effect of base station location, signal strength, and transmit model, this method can effectively reduce the error. Experiments in real environment show that the method can recognize two sides of a wall and has a very high accuracy in built-up area.
4521
Abstract: In this paper, based on the practice optical transport network (OTN) electric power communication network business, through the modeling analysis shows the specific influence dispersion optical pulses, then discussed the dispersion compensation technology, through modeling and simulation analysis of the dispersion compensation fiber (DCF) and dispersion compensation module (DCM), at the same time with reference to its OTN equipment dispersion tolerance, form a light layer of dispersion compensation quantity calculation method of the experience and grid OTN networking dispersion compensation scheme, reduce the effects of dispersion as far as possible.
4525
Abstract: A WDM optical access network architecture based on double-fiber-tangent rings is proposed. With the proposed architecture, both data convergence and link protection can be realized. OLT and RNs can automatically switch to protection mode to overcome fiber failure occurring no matter in both primary ring (PR) and sub-ring (SR). The RNs designed as tangent points can realize wavelengths adding and dropping between PR and SR, and they also can realize network expansion through adding more wavelengths. In addition to this, the design of double-fiber ring can better the survivability and self-healing ability of the network.
4529
Abstract: In this paper, the networking architecture for 5G system to WLAN interworking is studied. Firstly, the demands of 5G system to WLAN interworking were introduced. Then we elaborate 5G and HEW network which mainly refers to the network architecture. After summarizing the evolution of two networks, we propose the proactive networking architecture.
4533

Showing 1011 to 1020 of 1441 Paper Titles