Applied Mechanics and Materials
Vol. 747
Vol. 747
Applied Mechanics and Materials
Vols. 744-746
Vols. 744-746
Applied Mechanics and Materials
Vol. 743
Vol. 743
Applied Mechanics and Materials
Vol. 742
Vol. 742
Applied Mechanics and Materials
Vol. 741
Vol. 741
Applied Mechanics and Materials
Vol. 740
Vol. 740
Applied Mechanics and Materials
Vols. 738-739
Vols. 738-739
Applied Mechanics and Materials
Vol. 737
Vol. 737
Applied Mechanics and Materials
Vol. 736
Vol. 736
Applied Mechanics and Materials
Vol. 735
Vol. 735
Applied Mechanics and Materials
Vol. 734
Vol. 734
Applied Mechanics and Materials
Vol. 733
Vol. 733
Applied Mechanics and Materials
Vol. 732
Vol. 732
Applied Mechanics and Materials Vols. 738-739
Paper Title Page
Abstract: Mobile e-commerce is the use of electronic business mobile phone, PDA and palm computer wireless terminals of the B2B, B2C or C2C. It will be the technology of Internet, mobile communication technology, the short distance communication and information processing technology the perfect combination, so that people can carry out a variety of business activities at any time, any place, whenever and wherever possible, the realization of online and offline shopping and trading, online electronic payment and various trade activities, business activities, financial activities and related comprehensive services activities etc.. Study according to the latest data analysis of domestic and foreign electronic commerce development present situation, summarizes the key technology of WAP and J2ME in mobile environment, and the prospect of the future development trend of electronic commerce.
1201
Abstract: Meteor burst communication is an important communication mode for a number of possible civilian and military applications. This paper proposes a channel modeling and simulation based on OPNET for meteor burst communications. Analyzing the characteristics of underdense meteor burst channel, the multi-layer node models of master station and slave station are presented to create practical simulation scenario of meteor burst communications. The simulation processes of half-duplex communication as well as full-duplex communication are designed to execute simulation. The results demonstrated that the channel model based on OPNET is consisted with meteor burst communication very well, and full-duplex communication is better than full-duplex communication in effectiveness.
1205
Abstract: Network intrusion prevention application are studied, analyzed vibration optical fiber, cable radiation, infrared radiation, tension fences, high-voltage pulse and other key technologies, proposed safe city, government investment, government rent, lease operator platform, operating mode, and applications in key areas of finance, police, parks and other surveillance industry.
1209
Abstract: The paper firstly analyzes security and stability existed in the DDS network, and then finds that present DDS regulations cannot guarantee information’s confidentiality and integrity when facing an attack. Based on this, the paper puts forward a core thought of data analysis. According to the draft of DDS information security regulation, the paper analyzes information security threats that the DDS system must face, provides corresponding information security strategies in accordance with data granularity and operation means, and designs and realizes an information security model based on DDS. The security model there into is divided into three levels: boundary security, transmission security and data application security of fine granularity. At the same time, the paper also analyzes several important elements which influence DDS network security in detail, and then designs again the data-centered publication/subscription model. Finally, through the model testing by a lot of experiments, the experimental results show that: the model not only largely improves security of DDS network information, but also has already promoted stability and reliability of data transmission process.
1213
Abstract: This thesis introduces some disadvantages of traditional Smart power-stealing prevention system and its transmission channel of wireless common grid at present, and proposes a new transmission technology. This new transmission technology is TD-LTE230M wireless power broadband private network technology, it is approved by National Radio Regulatory Commission in China and opened to electric power enterprises only. It has many advantages, for example, good anti-interference, reliability, security, so it is applied in Smart power-stealing prevention system. A new power-stealing prevention system is also proposed, and it is named TD-LTE230M smart power-stealing prevention system. This system is composed of load monitor, TD-LTE230M wireless data receiver, TD-LTE230M collection terminal, ammeter and host station. The thesis also introduces the TD-LTE230M wireless data receiver and its principle.
1217
Abstract: A certain type of communications system integrates various communication means and communication technology, covering more than 10 kinds of communication interfaces, which has a high demands for its maintenance and security personnel. By utilizing a variety of communication technology design and development of communication interface teaching platform detection of a comprehensive communication system, this paper solves the problems of no training facilities in the maintenance and support personnel training and non-intuitive and non-systematic testing training and so on.
1221
Abstract: Aiming at the study of key technology of the integrated test platform of wireless communication equipment, this paper consists of several technology contents, mainly including criterion of detection, fault diagnosis evaluation, equipment type matching, optimization of circuit detection point, signal acquisition and so on. Combined with the intelligent circuit detection techniques and the development of software and hardware, the specific testing and repairing techniques of the wireless communication equipment are given to realize the steps, methods and processes, and the testing platform united with technology verification and software and hardware is developed and achieved.
1225
Abstract: At present P2P is widely applied on the Internet. But it still has a safety hazard because of the special feature of dynamic and anonymity of P2P.This paper designs a model of P2P trust based on fuzzy degree of nodes' credit. It computes the fuzzy degree of nodes' credit according to the historic records and the theory of fuzzy mathematics, and the result is used as the basis of choice of P2P transaction. The fuzzy degree of nodes' credit will be increased and decreased according to the behavior of the node, establishing the dynamic and reasonable mechanism of rewards and punishment. Experimental results show that the model designed in this paper has a better performance in the parts of trade success rate and network load.
1231
Abstract: Research of technology CDMA has been made for use of data transmission in systems from the combined data and power supply transmission. As is known principles of code division of channels, are based on use of broadband signals which strip considerably exceeds the strip of frequencies necessary for usual message transfer, for example, in narrow-brand systems with frequency division of channels. In the article, As a result of multiplication of noise with an information signal energy of the last is distributed in a wide strip of frequencies. Its Spread spectrum, expansion of a spectrum with a passed signal, which is carried out by means of pseudorandom device for decoding the message should know coding sequence.
1236
Abstract: Based on the modernization of educational multimedia video technology is the primary means of education. Analysis of the Web-based virtual learning system design objectives and design ideas, describes the basic architecture of the virtual learning system, architecture, the role of the layers has been described, while the virtual learning system online experiment module design and virtual teaching scene were studied; Finally, the Web-based virtual system online browsing courseware, whiteboard and online experiments and other key technologies to achieve.
1240