Advanced Materials Research
Vol. 1056
Vol. 1056
Advanced Materials Research
Vol. 1055
Vol. 1055
Advanced Materials Research
Vol. 1054
Vol. 1054
Advanced Materials Research
Vol. 1053
Vol. 1053
Advanced Materials Research
Vol. 1052
Vol. 1052
Advanced Materials Research
Vol. 1051
Vol. 1051
Advanced Materials Research
Vols. 1049-1050
Vols. 1049-1050
Advanced Materials Research
Vol. 1048
Vol. 1048
Advanced Materials Research
Vol. 1047
Vol. 1047
Advanced Materials Research
Vol. 1046
Vol. 1046
Advanced Materials Research
Vols. 1044-1045
Vols. 1044-1045
Advanced Materials Research
Vol. 1043
Vol. 1043
Advanced Materials Research
Vol. 1042
Vol. 1042
Advanced Materials Research Vols. 1049-1050
Paper Title Page
Abstract: With the gradual improvement of the level of college informatization, it has become more and more important to build a stable and efficient service platform. In this paper, by analyzing the problems in the process of information construction of colleges, the research focuses on the platform of front-end server technology, reliability, security and manageability to complete the design and implementation of campus network virtualization service platform by adopting server virtualization technology. This research also provides the reference for small and medium-size campus network service platform construction and management.
1781
Abstract: This paper presents the model of satellite planar array, and interference localization via direction of arrival (DOA) estimation. We derive a dimension reduction DOA estimaton algorithm therein. The proposed algorithm, which only requires a one-dimensional local searching, can avoid the high computational cost within two-dimensional multiple signal classification (2D-MUSIC) algorithm. We illustrate that the proposed algorithm has better angle estimation performance than estimation method of signal parameters via rotational invariance technique (ESPRIT) algorithm, and has very close angle estimation performance to 2D-MUSIC algorithm. Furthermore, our algorithm requires no extra pairing. Simulation results present the usefulness of our algorithm.
1788
Abstract: This paper proposes a structure model of security middleware suitable for mobile Internet, describes the functions of its main part and the running process of the whole middleware, and makes a detailed design of security services layer based on CORBA service and mobile agent technology. The new design aims at providing an effective solution to the security of mobile Internet.
1792
Abstract: When senors transmit their data to the sink via multi-hop communication, the sensors closer to the sink are burdened with heavy relay traffic and tend to die early. On the contrary, if all sensors transmit datas to the sink via single-hop communication, the sensors further from the sink will die much more quickly than those closer to the sink. In this paper, we first develop an analytical model to derive the optimal cluster radius. Then we propose a mixed communication method on grid-based where the sensors can transmit data to the sink in either single-hop or multi-hop. Finally, we conduct extensive experiments and show that our method outperforms LEACH and HEED in terms of network lifetime by balancing energy consumption.
1797
Abstract: To adapt to the changing requirement of task data interface under the situation of far distance, multiple segment, multiple circle, multiple satellite and multi-station visibility for satellite misson in transfer orbit segment, the web incremental maintenance system based on materialized view was achieved through applying incremental maintenance principle, database technology, synchronization mechanism and maintenance proxy, and realizing the synchronization and consistency of data interface about the distributed experiment information surveillance software system. The result shows that web incremental maintenance system can ensure the real-time and consistency of data processing and transmission.
1803
Abstract: For implementing jewelry cert print in the web environment, based on web service and ActiveX technology, an online jewelry cert print service is proposed by encapsulation the jewelry cert print module running in the local network environment. The service can implement the cert typesetting and batch print, and can communicate soap message with other web services. The practicability and validity of the online jewelry cert print service is verified through the application in the jewelry inspection business management system.
1808
Abstract: Shao et al. proposed a novel method for computing private set intersection based on searchable encryption. Compared with the traditional protocols, their technique requires much less computation for the client to obtain the intersection. Concretely, the client only computes m (the cardinality of the client’s input set) multiplications, m hashes, and one modular exponentiation. However, their protocol only satisfies security against semi-honest behaviors. In this paper, we aim to promote the security of Shao et al.’s protocol. Our solution woks in the CRS model, and is based on the non-interactive zero knowledge proof and the succinct non-interactive argument. The proposed protocol satisfies security against malicious adversaries and needs only one round interaction.
1812
Abstract: DDoS attack threatens the stable development of internet and national information security seriously. IP traceback technology can track the attack packages to the attack source, and is making an important significance in against DDoS attack. For the DDoS attack, the basic theory and advantages and disadvantages of several common IP traceback technologies are analyzed and compared. Some ideas to improve the technologies are proposed by analyzing some current problems of IP traceback and source-finding technologies.
1820
Abstract: At present the majority of streaming media files is large and it requires a lot of network bandwidth and disk bandwidth. We propose an adaptive segment-based method, the cache replacement method and the multi technologies combined optimized transmission policy. Simulation results indicate that they are highly efficient methods for use of caching proxy server resources, reducing the startup latency and save of bandwidth of backbone network.
1824
Abstract: The wireless sensor networks (WSNs) are usually deployed among widely area for environmental monitoring, data collection and other applications. In order to reduce the energy consumption and extend the lifetime of WSNs, as well as receive the data quickly, a source-based data aggregation algorithm (SBDA) for clustering wireless sensor networks is proposed. The method aggregated the data from sensor nodes and marked different transmission priority for the data. Simulation results show that, compared to existing protocols, the proposed method achieves a longer life time, and a lower packet drop ratio.
1828