Applied Mechanics and Materials Vols. 687-691

Paper Title Page

Abstract: For the problems of wear real-time, compatibility and intelligence, we have designed computer network test and failure diagnosis system based on VXI bus technology. The hardware and software of the system have been improved. To implement real time, high speed data communication and transmission, the functions of VXI test board have been extended. The degree of intelligence and automatization has been improved through introducing expert system in the design of software. These will provide new references for improvement of existing test and diagnosis systems of computer network equipments.
2967
Abstract: Information hiding in a resources section’s redundancies has large amount of watermark embedding, and the software watermarking based on PE file resources section format has high concealment. This paper combined this two algorithms’ advantages, and embedded the watermark information in these two ways. It also introduced the information hiding technology based on ICON file and binder technology to realize the tamper-proof function of the watermark. Experiments shows that this scheme not only improves the embedded information capacity, but also overcomes the problem that the embedded watermark are susceptible to tamper-proof attack. So the new scheme improves the watermark’s comprehensive performance, and create a more secure and robust software watermark.
2971
Abstract: Multi-radio wireless mesh network (MR-WMN) is one of the key access techniques in Mobile Internet. However, current 802.11-based MR-WMN is not able to provide low multicast end-to-end delay. To address this problem, we first propose a layered and analytical model by combining overlapping channel assignment with multi-path routing strategies. The proposed model can be used as a guide on multicast design. It decoupled multicast delay into transmission delay in the MAC layer and queuing delay in the Mesh layer based on that it derived a new multicast routing metric that had low end-to-end delay. Second, we prove that finding the minimum global flow interference solution is a NP-Complete problem an<I the relationship between global flow interference and network node densities is distributed in accord with double-Pareto lognormal (dP1N) distribution. Based on these two results, the DCA algorithm is proposed in order to minimum global flow interference which can efficiently reduce the multicast transmission delay in MAC layer. Last, to avoid the best wireless link being congested, we propose the flow adaptive-based MMRA algorithm by making use of the M R-M ED routing metric and the multi-path routing design philosophy, which took local channel congestion into account and can efficiently reduce the queuing delay in Mesh layer. Simulation result and comparison of the common algorithm MCM both show that the proposed model accurately characterizes the multicast delay in multi-radio wireless mesh network and the combination of the DCA and MMRA algorithms efficiently reduce the multicast end-to-end delay.
2975
Abstract: TCP protocol is a connection-oriented transmission protocol with mechanisims such as sliding window,data acknowledgement,slow start and congestion avoidance to ensure reliability[1].But these machanisims bring low efficiency because of delay and loss.Thus,we need to design an improved TCP protocol to achieve the purpose of WAN acceleration.This paper mainly introduces two kinds of WAN accelebration technology of TCP flow optimization and data cache technology.TCP flow optimization uses TCP transparent proxy technology based on an improved TCP protocol to solve the problem of large delay and high packet loss rate.The improved TCP protocol includes slow start improved,large receive buff, the improvement algorithm of congestion avoidance,etc.Besides,data redundancy elimination and compression technology[2] are also used in TCP data interation to reduce link load and improve transmission efficiency.
2979
Abstract: In modern society with Internet rapid development, information system takes digital form of 0 and 1, this information system and public channel are very fragile in the case of without defensive measures, and they are easily attacked and destructed by hackers and intruders. This article is mainly based on the knowledge of discrete logarithm, studies public key cipher algorithm, especially elliptic curve cryptosystem. First this paper introduces the basic concepts and knowledge of cryptography, and discusses the relation between discrete logarithm and public key cryptography algorithms. Finally in detail it discusses elliptic curve cryptosystem, and presents the realization and running effect of encryption system.
2984
Abstract: The barrier free transplantation of software is critical to the development of intelligent software. On different software platform, there are great differences between the software interfaces and the communication protocols, resulted in software cannot be directly transplanted on different platform. Once the platform is different, the differences of software characteristic are big, and the software compatibility will become worse rapidly. The incompatibility problem is occurred in the transplantation process, the effective software transplantation cannot be completed. An improved software features compatibility elimination method is proposed based on K-means indefinite feature clustering algorithm. The incompatible software features probability is obtained in difference platform, software features are obtained. The incompatibility of software transplantation is eliminated on the difference platform, to ensure that the software transplantation is operated successfully. The experiment results show that, the parallel efficiency of software transplantation is improved on the different platform, the performance is better than traditional method. The efficiency and stability of the software transplantation is good, and it is an effective software features incompatibility processing method.
2989
Abstract: An anti-lost data security storage system for Smartphone has been proposed in this paper. The encryption key of data and the identity are stored in USBKey, so as to realize the physical separation of the encryption key and data, and the matching of USBKey and Smartphone. The System solves the problems of data recovery and backup in Smartphone after the phone is lost. The results indicate that the system has good data protection features, such as encryption and decryption fast, secure and reliable transmission, anti-lost, etc.
2993
Abstract: Network virtualization is recognized as an important enabler technology to diversify the future Internet and the Virtual Network Embedding problem is major challenge to fulfill it. In this paper, we proposed a parallel Virtual Network Embedding algorithm with Path splitting on the basis of membrane Computing (VNEPC). And more importantly, it is one phase embedding algorithm that maps virtual nodes and virtual links in the same phase without decomposing the VNE problem. Extensive simulation results show that our proposed VNEPC algorithm outperforms the existing algorithms in long-term average revenue, acceptance ratio and long-term R/C ratio.
2997
Abstract: At present, the growth of the Internet has brought us a vast amount of information that we can hardly deal with. To solve the flood of information, various data mining systems have been created to assist and augment this natural social process. Data minig recommender systems have been developed to automate the recommendation process. Data mining recommender systems can be found at many electronic commerce applications. In this paper, a recommendation mechanism of web data mining in electronic commerce application is given. Then, presents the workflow of the web data mining in electronic commcer. Lastly, the usage of the tools of web data mining is described.
3003
Abstract: Wireless Sensor Network security is not only threatened in the time of passing information between nodes, but also in processes of data generation. Cryptography is therefore unable to prevent attacks from nodes inside the network after those nodes have been captured. The trust model can play an important role in this aspect. It can effectively identify malicious nodes, self-ish nodes, and low competitiveness nodes in the network to improve its performance. This paper focuses on the technical characteristics of trust management and design. It classifies existing trust computation models into several types according to their computing theories at first. Then it discusses several classic trust management frameworks and analyzes their advantages and weaknesses. At last, the paper concludes general problems of current models and points out future research directions.
3007

Showing 681 to 690 of 1182 Paper Titles