Applied Mechanics and Materials Vols. 687-691

Paper Title Page

Abstract: In this paper we propose an adaptive MAC Protocol for WSN with mobile nodes, namely RM-MAC (RSSI-Based Mobility Support MAC).The protocol at first uses RSSI to quantify the nodes’ receiving range for the creating of a list of neighboring nodes. Then, it adopts Kalman filter model to predetermine the mobile nodes’ position after a certain period of time. Finally, by referring to the RSSI values and the predetermine position vector, it builds an adaptive model to coordinate dynamically the synchronizing cycle within the virtual clusters so that the clusters can maintain a high connectivity with the mobile nodes. Simulation results shows that compared with S-MAC, RM-MAC can obtain a higher network connectivity and delivery ratio by dynamically coordinating the synchronizing frequency at the cost of some energy. Furthermore, we find that the delivery ratio has close relationship with the quantification level and the cluster switch thresholds.
1782
Abstract: In order to avoid any risk of new computer network environment accounting information system, build an effective computer accounting information system of internal control system is very necessary. Intends to figure out the issue and risk control system of computer network environment accounting information system, this paper conducts the in-depth analysis to explore preventive measures under the network environment risk and internal control system computer accounting information system innovation.
1787
Abstract: Network represents the progress of civilization, the rapid development of the network to promote the upgrading of the Marriage Law, the mode of transmission, the network media to replace the paper-based printing, making the network culture in a real and unreal attitude in public view inside. In this paper, the network media as the carrier for Marriage Law, its vicissitudes are inextricably linked media network. The network makes a given media publicity and the free dissemination of Marriage Law. Through the network media platform where people can be open to the general public of the Marriage Law of mass communication, which can engage in horizontal and vertical organizational communication, it can also be spread from person to a particular object. Network communication marriage law have a correct understanding and proper management, it will be enable the network to get the healthy development of the spread of the Marriage Law, and dissemination activities for human and spiritual exchanges make a positive contribution.
1791
Abstract: We developed an evaluation method of architectural degree of order for the Weapon Equipment System on the basis of complex networks, and an evaluation framework for the combat capability of weapon equipment systems based on the entropy measure. Specifically, it comprehensively evaluated the architectural degree of order of the weapon equipment system according to the time efficiency entropy, quality entropy and anti-congestion entropy of complex networks. We got the index weight by means of Group-AHP, and accordingly the results of the architectural degree of order of the weapon equipment system. Finally, we employed an example to testify our model.
1795
Abstract: Existing security authentication schemes are mostly concentrated on the key management and cryptographic algorithms. However, there are few authentication schemes designed according to the application needs. To solve this problem, considering the limited resource of wireless sensor networks and the practical application, a partially distributed authentication scheme is proposed. We use hierarchical network structure. Centralized authentication is used between the base station and cluster head nodes, while cluster head node and ordinary nodes use a distributed authentication. Analysis shows that this method has some advantages in the overhead of the storage, computing and communication, while network security can be guaranteed.
1802
Abstract: Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals. This paper analyzes the performance form and main features of computer networks crime and proposes several control measures based on their form and features.
1806
Abstract: Enterprise information system is based on the condition of the computer network technology information platform. It has an important value for enterprises to enhance its brand influence, enhance customer management, promote the development of e-commerce processes, promote enterprise management level, adapt to the current situation of information and other aspects of economic development. There are some problems in the current enterprise information system construction. The current information system should make scientific plan, expand information systems development space, play a catalytic role in the government promote, emphasis on information security, strengthen of human resources and team building starting implementation of enterprise information systems building strategy.
1810
Abstract: Network is the foundation of education informationization, supporting campus teaching and scientific research. Data center functions as the nerves center of the whole network that plays the crucial role for the stable operation of the network. Thus it should be guaranteed stable operation. Regarding to the problem that high-precision air conditioner remains high energy consumption of the entire data center, embedded web system - based technology is put forward in this paper. The technology uses MSP430 microprocessor, CS8900A network chip and temperature humidity sensor to construct long-distance intelligent monitoring system based on Zigbee terminal node equipment. Consequently it can be realized that high-precision air conditioner can be conducted quadratic optimal control through the system of the sum of environment temperature acquisition and control, and air condition linkage feedback. It is stated by the results that PUE of data center is reduced and a green and energy-efficient data center can be built by deploying the system.
1814
Abstract: This paper analyzes the application of computer database system in information management and proposes the related countermeasure describes. With the continuous development of society, the application of network technology in people's lives is more and more widely, information management are implemented in various enterprises, and computer network is used for data collection and collation.
1819
Abstract: For severe energy constraint problem of wireless sensor networks, a non-uniform energy efficient clustering routing protocol (EUCRP) is proposed based on the analysis of the existing clustering routing protocol the characteristics and shortcomings. In EUCRP, we use a limiting cluster size optimization formation algorithm to produce clusters in descending order of the size of the cluster. Improved multi-hop inter-cluster data forwarding, saving energy cluster head and energy consumption of inter-cluster is balanced. Propose using “watering pot path” in the last hop to effectively solve the “hot zone” problem caused by uneven load energy. Simulation results show that the protocol can effectively reduce network energy consumption and prolong the network lifetime.
1823

Showing 401 to 410 of 1182 Paper Titles