Applied Mechanics and Materials Vols. 651-653

Paper Title Page

Abstract: This paper first introduces the types and characteristics of HWSN, expounds its typical architecture, through comparing with homogeneous wireless sensor network, the performance of HWSN is quantitative calculated, analysis results show that HWSN can improve the reliability of data transmission, reduce the energy consumption of data transmission, reduce the delay of data transmission, and with the increase of network scale, highlight the advantages of heterogeneous networks. HWSN covering algorithm performance evaluation indexes are given finally.
1909
Abstract: Today's society, IT technology has rapid updates, data is growing at an alarming rate of accumulation, the era of big data had come. The intelligent terminals are the main source of data sensor data big data era. Big data to people's lives is brings a lot of convenience, to the enterprise is provide more business opportunities. On the other hand, big data increases the risk of leaks important information, information security technology at this stage cannot meet big data information security needs, how to provide information security protection, strengthen information security, construction-related law is also the attendant problems.
1913
Abstract: This paper analyzed the important effect on network attack, and present a method of network attack training simulation based on attack tree, as a result of testing procedure, the method make trainee operate efficient and get target quickly, improved trainees capacity of analysis and decision-making, and more available,provide clearly visible help for commander of attacker to organize leaguer cooperate.
1917
Abstract: An optimal heterogeneous sensor differentiated deployment schemes based on simulated annealing algorithm is proposed to solve the problems of the high density of distributing heterogeneity nodes in WSN and geographical irregularity of the sensed event. This method can not only apply to Boolean perception model of the node, but also apply to perception model. The algorithm uses the cost of sensors deployment as objective function in the context of assuring the coverage and fault tolerant of networks. The simulation results show that, the optimization method proposed in this paper can effectively convergence, under the premise to ensure network fault tolerance and robustness, reduces the cost of network deployment, improve the quality of target monitoring network.
1921
Abstract: A dynamic sensor deployment strategy for heterogeneous mobile wireless sensor networks is proposed, so-called virtual force-directed differential evolution algorithm (VFDE). To ensure efficient coverage of networks, VFDE combines the virtual force (VF) with differential evolution algorithm (DE), where the position vector of each population is updated according to not only the historical local and global optimal solutions but also the virtual forces of sensor nodes. The key motivation of this strategy is to use the virtual force to direct the updating of DE for improving the convergence speed, and DE is used to enhance the global searching ability. Simulation results show that VFDE has better performance on regional convergence and global searching than VF algorithm and DE algorithm, and it can implement dynamic heterogeneous mobile sensor deployment efficiently and rapidly.
1925
Abstract: In NBSP, the mobility network keeps its connectivity with its own HA through its registration procedure therefore leading to pin-ball route in nNEMO, especially incurring serious latency for nest NEMO in aeronautical communications. To solve these limitations, we present RONAC which does some improvements on RA and UNA based on MIPv6 and IPv6 neighbor discovery protocol respectively and without introducing any new network entities.
1929
Abstract: This paper focus on the schedulability analysis of fixed priority servers. A number of fixed priority servers and their schedulability analysis are reviewed, these results and properties can be used for constructing systems with different timing constraints, where real-time tasks with hard deadlines and the soft aperiodic tasks can be scheduled in the same system. The aperiodic tasks in the fixed priority servers are not preemptable, and they are scheduled in a first-come first-served manner. There is only one server with many periodic or sporadic tasks in the system. The tasks and the server are scheduled by a fixed priority algorithm such as rate monotonic or deadline monotonic.
1933
Abstract: With the constant innovation and development of micro-electronics technology, and large scale integrated circuit in-depth research, more advanced embedded microcontroller processors are applied to all kinds of instruments and equipment, which has brought a new technological revolution to the modern industrial control field. And it results to the embedded system, as an important field of computer application, has gone deep in all aspects of society, and got more and more attention from people. Now the designing and implementation technique of dependable computer is one of the most important research fields. The research on security, one of the important characters of dependable computer, is becoming increasingly important.
1937
Abstract: The main task of spectrum sensing in cognitive radio network is to decide whether the primary user is occupying the specific spectrum band or not. So the main purpose of spectrum sensing is to design a detector with better detection performance. This paper studies a spectrum sensing method with clustering under cognitive radio networks. We studied the cooperative spectrum sensing model with clustering by hard fusion rule, and also proposed the simulation model and steps of this cluster-based spectrum sensing problem under Majority rule. Simulation results show that the spectrum sensing method with clustering has better performance than the other methods.
1941
Abstract: The twenty-first century is an era of information technology, all the information communication technology industry showed its vitality. The advanced information technology also played an important role in the development of the civil litigation. With the fusion of new information technologies and the development of the computer, the development of new products have been widely used,then, a new combination from technology and civil litigation--electronic delivering service is emerged, which has the characteristics of low cost and high efficiency. At the same time, it is very likely to become the main mode of delivering service in the future.
1945

Showing 401 to 410 of 544 Paper Titles