Applied Mechanics and Materials
Vol. 659
Vol. 659
Applied Mechanics and Materials
Vol. 658
Vol. 658
Applied Mechanics and Materials
Vol. 657
Vol. 657
Applied Mechanics and Materials
Vol. 656
Vol. 656
Applied Mechanics and Materials
Vol. 655
Vol. 655
Applied Mechanics and Materials
Vol. 654
Vol. 654
Applied Mechanics and Materials
Vols. 651-653
Vols. 651-653
Applied Mechanics and Materials
Vols. 644-650
Vols. 644-650
Applied Mechanics and Materials
Vol. 643
Vol. 643
Applied Mechanics and Materials
Vols. 641-642
Vols. 641-642
Applied Mechanics and Materials
Vols. 638-640
Vols. 638-640
Applied Mechanics and Materials
Vols. 635-637
Vols. 635-637
Applied Mechanics and Materials
Vols. 633-634
Vols. 633-634
Applied Mechanics and Materials Vols. 651-653
Paper Title Page
Abstract: This paper discusses the application of wireless sensor network in the smart grid and information security requirements, such as confidentiality, integrity, availability, and data freshness. We also analyze the physical attack and several typical network attacks of WSNs in smart grid. We elaborate the implementation process, characteristics and the hazards to the power grid of these attacks. In the paper, we propose a communications security policy of WSNs in smart grid and corresponding information security technologies, we analyze the characteristics and existing solutions of such information security technology, then we propose corresponding solutions of security technology applicable to smart grid. In the end, we summarize some issues in the realization of WSNs security technologies in smart grid and discuss the latest trends.
1992
Abstract: In this paper, pseudo-random sequences are designed as encrypting secret keys by the hyper-chaotic system model. Based on the H.264 coding standard, selecting encryption is designed to encrypt intra-prediction modes, MVD symbols and CAVLC residual coding datum. Experiments show that the encryption algorithm has higher security without changing the structure of code streams.
2000
Abstract: Grid-enabled vehicles (GEVs) can draw and store energy from the power grid to support their propulsion systems as well as feed back power to the grid via power converters. They are regarded as one of the most effective tools to address environmental and energy issues. This paper provides an overview of wirless communication networks that support the GEVs application. More specifically, the operation modes of Grid-to-Vehicle and Vehicle-to-Grid are described, and representative wireless communication technologies which may be adopted for the premise networks and field area networks/neighborhood area networks (FAN/NAN) are discussed.
2004
Abstract: The smart home is a kind of brand-new life concept, with the development of science and technology, people’s pursuit of quality of life is more and more high. The living concept "Safe and comfort, health and environmental protection, natural and harmony, people-oriented, efficient and convenient, personalized" has been received by most. With the rapid development of 4G networks, the Internet access technology based on mobile terminal and the family high-speed broadband network connectivity built a high-speed communication platform for the control and application of intelligent household life, and the high-speed platform created the condition for developing the richer remote intelligent household control application. Smart phones carry-on become bonds connecting smart home system and high-speed mobile communications platform, and remote control for smart phone will bring our life into a new field.
2008
Abstract: In this paper, it proposed the function structure of distributed network data acquisition and processing system; based on the analysis of Agent, Agent principle and functional module, according to the characteristic of the servo control system fault diagnosis which is the electro-hydraulic position of the electrical and mechanical equipment, it puts a data acquisition and diagnosis system of Agent network structure, the specific function of the dynamic monitoring control Agent and fault identification Agent, it establishes their models and discusses the multi Agent coordination mechanism, the task decomposition and the control strategy of fault diagnosis.
2013
Abstract: The digital battlefield environment plays an important role in the construction of information army. The basic thought of 3D scene comprehensive construction is firstly recommended in the paper, then the terrain data texture expression and feature modeling and processing based on vector map is analyzed, the fusion scheme of object model that independent and dependent with terrain model is selective analyzed, the fusion algorithm of object model and terrain model is finally presented.
2020
Abstract: This paper elaborates the necessary part of kansei engineering in costume innovative design ,with the analysis of kansei engineering. It proposes the frame of costume innovative design based on kansei engineering, helps designers discover the interest of customers in costume products, and elaborates the relationship between the establishment of kansei and elements of costume design which provides evidence for guidance of costume innovation and evaluation of design effect. In the end, this paper points out that kansei engineering has a broad prospect applies in costume design to better satisfy the kansei requirement of users.
2024
Abstract: At present, the facial recognition is largely using in the criminal investigation for the identification of suspects, the information from the informants, however, is very hard to obtain the main feature and to draw it accurately because of the affection of mood, light, visual differences and so on. However, with some computer technology, combining the resource from big data and cloud computing platform, the success rate of the search and recognition could be greatly improved. Therefore this article will bring out a facial drawing system based on big data and cloud computing platform.
2028
Abstract: In order to detect Internet Explorer browser vulnerabilities, the miner distributed with test method based on the DOM tree are designed and implemented, it also implemented dynamic selection of the test case execution, experiment results found 50 IE vulnerabilities.
2032
Abstract: Compared with conventional a single, “monolithic” satellite, fractionated cluster spacecraft system has the advantages of enhancing the adaptability and survivability of space systems while also shortening development expense. A novel wireless communication system that combines both microwave and laser technology has been investigated and demonstrated. The experiment results show that the hybrid laser/microwave wireless communication can offer excellent information services and meet the cluster system requirement.
2036