Applied Mechanics and Materials
Vol. 697
Vol. 697
Applied Mechanics and Materials
Vol. 696
Vol. 696
Applied Mechanics and Materials
Vol. 695
Vol. 695
Applied Mechanics and Materials
Vol. 694
Vol. 694
Applied Mechanics and Materials
Vol. 693
Vol. 693
Applied Mechanics and Materials
Vol. 692
Vol. 692
Applied Mechanics and Materials
Vols. 687-691
Vols. 687-691
Applied Mechanics and Materials
Vol. 686
Vol. 686
Applied Mechanics and Materials
Vol. 685
Vol. 685
Applied Mechanics and Materials
Vol. 684
Vol. 684
Applied Mechanics and Materials
Vol. 683
Vol. 683
Applied Mechanics and Materials
Vol. 682
Vol. 682
Applied Mechanics and Materials
Vol. 681
Vol. 681
Applied Mechanics and Materials Vols. 687-691
Paper Title Page
Abstract: Based on Digital Elevation Model and watershed hydrology software WMS, Digital Aojiang Watershed was established.it Used the grid DEM and Position of watershed outlet and Computed according to Topographic Parameterization Program (TOPAZ), this paper delineated watershed boundary and structure of River, built the Topological relationships of River networks and defined Seven sub-watersheds. Then Parameters for sub-watersheds were computed, such as sub-watershed area, perimeter, shape factor and slope.
2157
Abstract: With the rapid development of Internet of Things technology, the application of it has extended to all areas closely related to people's life. In recent years, notebooks stolen on campus along with the widespread use of them are arousing people’s increasing concern. To solve this problem, an anti-theft system was developed based on Internet of Things and RFID technologies. By the test on the system, it shows that this system runs feasibly and effectively.
2161
Abstract: Certificateless-based signature can eliminate the need of certificates in the Public Key Infrastructure and solve the inherent key escrow problem in the identity-based cryptography. In 2012 Zhang et al. [J. Zhang and J. Mao, An efficient RSA-based certificateless signature scheme, Journal of Systems and Software, vol. 85, pp. 638-642, 2012] proposed the first certificateless signature scheme based on RSA operations and showed that their scheme is provably secure in the random oracle model. However, He et al. [D. He, M.Khan, and S. Wu, On the security of a RSA-based certificateless signature scheme, International Journal of Network Security, vol.16, no.1, pp.78-80, 2014] recently showed that Zhang et al.'s scheme is insecure against a type I adversary who can replace users' public keys. In this paper, we propose an improved version based on RSA which not only keeps the original security properties of the signature, but also is secure against a type I adversary.
2165
Abstract: This paper proposes an identity-based signature (IBS) scheme over lattices. The proposed scheme is designed directly by combining the pre-image sampling function (PSF) and the signature scheme without trapdoor over lattice. Based on the hardness of the small integer solution (SIS) problem, we prove that the proposed scheme is strongly unforgeable under the adaptive chosen message and identity attack in the random oracle model. Since there are without the dimension extension of lattice, the scheme is efficient with respect to the space size.
2169
Abstract: One of the major challenges in constructing wireless sensor networks (WSNs) is to ensure the quality of coverage (QoC) as well as save energy. Considering the cooperative sensing model and the random deployment policy, the judgment model of redundant node without location information is presented. Furthermore, the distributed collaborative scheduling algorithm (DCSA) is designed to guarantee the QoC of networks with the least number of nodes. It chooses the uniformly-located working nodes and makes sure that the energy consumption of each node consumes homogeneously. Simulation results show that the DCSA policy not only provides the desired QoC of networks, but also reduces the number of working nodes significantly, saves the energy of the networks, and extends the network lifetime.
2175
Abstract: This paper analyzed 44 metrics of application level, file level, class level and function level, and do correlation analysis with the number of software defects and defect density, the results show that software metrics have little correlation with the number of software defect, but are correlative with defect density. Through correlation analysis, we selected five metrics that have larger correlation with defect density. On the basis of feature selection, we predicted defect density with 16 machine learning models for 33 actual software projects. The results show that the Spearman rank correlation coefficient (SRCC) between the predicting defect density and the actual defect density based on SVR model is 0.6727, higher than other 15 machine learning models, the model that has the second absolute value of SRCC is IBk model, the SRCC only is-0.3557, the results show that the method based on SVR has the highest prediction accuracy.
2182
Abstract: Digital video, as a kind of large-scale resource, plays an important role in internet’s multimedia resources. Resource consuming is one of the major issues for extracting data from digital video. However, if it is possible to know the outline of a video by browsing several pictures describing it, that will save us a huge amount of time. Up till now, it is not common for video processing system using cloud environment (except video transcoding system). This demo shows an extensible video processing system based on Apache Hadoop cloud environment. Our system utilizes FFmpeg video encoder and OpenCV graphic processor. The basic process of building a video abstracting system includes segmenting scene, followed by exacting representative key frame. The source files of that video stores in HDFS, while the information of segmentation and key frame stores in HBase. In this way, fast searching can be achieved.
2186
Abstract: Currently, the main network security mechanisms (such as firewall, intrusion detection, and vulnerability scanning) cannot prevent malicious attacks absolutely from the public network. Therefore, how to ensure the security of the information in the private network is a hot topic. In this paper, a network physical isolation system is designed based on private protocol, in which internal and external networks are physically isolated during the data transmission. Thereby, the security of network information is protected and the network security problems can be solved effectively through this isolation system. This isolation system can be applied in high security network environment such as government departments and business units, etc.
2192
Abstract: Simulative training should include network simulation in information age, and network simulation needs to meet the real-time requirements. For the real-time implementation of Tactical Internet (TI) simulation, the paper proposed a "water-wave type" topology updating method for simulation, which solved the real-time problem of tactical radio network topology updating simulation. Secondly, the paper proposed a data packet transmission method based on characteristic information, which solved the large data problem of TI simulation, and then the real-time of simulation was improved. Finally, the paper proposed a transmission success-rate calculating method based on prediction, which solved the real-time simulation problem of transmission. The practical application proved that the paper’s methods had good effect.
2196
Abstract: Content-Centric Networking (CCN) aims to provide efficient and effective delivery of content wherever and whenever it is needed, through in-network caching and interest packets aggregation. It is different from the IP networking that we are using now. However, in the process of using the CCN, we found that the existing technology of CCN couldn’t provide the experience that we wanted, for instance, when we want to catch big files, the hit radio of Content Store (CS) is not ideal. Combining with the existing caching technology, we design and implement the service migration system with analysis of user behavior and use repository storage to solve this problem. With the system, we improved the CCN network utilization, reduce response time delay effectively.
2200