Advanced Materials Research Vols. 1049-1050

Paper Title Page

Abstract: The process of converting a data structure or object state into a storable format is referred to as serialization. For the simulation of complex electromagnetic interference test environment, to evaluate the ability of the communication system, based on the semi physical simulation test environment, this paper presents a kind of instruction serialization mode based on TCP protocol as the data transmission and control scheme of multi device control, design and implementation of various types of equipment centralized monitoring framework for the realization of all kinds of network communications equipment and status data centralized testing and monitoring purposes, to achieve a data device management control process is accurate, real-time transmission.
2049
Abstract: The firmware is an indispensable basic system in computer systems. With the increase of BIOS chip capacity and module functions, the hidden security problems of BIOS are also more and more. But there is no BIOS production capacity in Chinese mainland currently. The whole information security system has not really established completely. In the circumstances of computer widespread using in the government, institutions, commercial, schools and so on, how to ensure and monitor the security of BIOS system has important significance to ensure overall control of information security in China. This paper proposes the design and implementation methods for BIOS security testing procedures and testing system through the analysis of BIOS security, and provides a new way of thinking for BIOS security.
2054
Abstract: This paper proposes a new scale-free network BA Improved Model (BAIM) for the scale-free topology of WSNs intrusion tolerance issues. Through analyzing the power law index of the network invulnerability and topology of fault tolerance, the results of BAIM in the topology of the network survivability maximize the optimal network topology. Simulation results show that BAIM can not only keep the scale-free network robust to random failures, and but also improve the scale-free network vulnerability against intentional attacks and prolong the network lifetime.
2059
Abstract: massive MIMO (also known as Large-Scale Antenna Systems),which is one of the key technologies for the fifth generation (5G) mobile systems, brings huge improvements in spectral efficiency and energy efficiency through the use of a large excess of antennas for base station. This paper analyses and simulates the performances of several signal detection algorithms under the massive MIMO system model. The results show that when the number of base station antennas is considerably larger than the number of users, even the simple signal detection algorithms can achieve good system performance.
2063
Abstract: Traditionally, at the end of functional testing, testers resort to the numbers of problems reported and the test cases executed to evaluate the adequacy of the testing. This method generally results in that testers have no confidence in the test results. Therefore, we introduce coverage to settle this problem. EMMA is an open source testing tool which detects and reports Java code coverage. In this paper, two actual functional testing as examples to explain the processes of using EMMA command line and EMMA with Ant to obtain code coverage, further to explain how to increase test cases to accumulate code coverage based on EMMA. The final code coverage analysis reports testify that using EMMA can greatly ensure the integrity of the functional testing.
2069
Abstract: Measuring the influence of academic research publication is an meaningful work in academe. In this paper, the co-author and the citation networks are built to calculate the influence of a researcher and a paper in the way of networks separately with the discussion of further applications. At the beginning, the co-author network is built to determine the influence of co-authors. Then, based on the citations among the papers in the database, we build up the citation network with the help of graph theory. Thirdly, the method is implemented with the application of American Airline network analysis. As the final, the analysis of strengths and weaknesses is conducted.
2073
Abstract: In recent years, with the development of video surveillance systems, the cluster and load balancing technology need be applied to improve the system performance and the quality of service. In this paper, on the basis of common load balancing algorithms, considering the characteristics of the video surveillance system, design a new load balancing scheduling mechanism, by improving the weighted round robin algorithm and introducing the nodes cooperation strategy. The testing results show that the new mechanism can distribute the loads more reasonably and make use of the server resources more effectively.
2079
Abstract: For the using of multi-modulation, the precondition of receiving and demodulating signal is to determine the type of the modulation, so automatic recognition of modulation signal has significant influence on the analysis of the signals. In this paper, digital modulation recognition is studied respectively in different environment of White Gaussian Noise (WGN), stationary interference and multipath interference. The simulation results show that the recognition success rate is the highest in stationary interference environment and the lowest in multipath interference environment with the same signal to noise ratio (SNR).
2084
Abstract: With the rapid development of Internet and the growing, today's network structure complexity is increasing day by day, network scale, network security has gradually become the focus of attention. To build a stable and secure network management system naturally become the focus of attention, one of network traffic monitoring system is one of the important means. The network traffic load monitoring system from the perspective of packet traffic analysis, through real-time information collection and monitor network packets, to check the network performance. It is help to monitor and analysis the network running status, improve the efficiency of network management and network security status, having a basic and decisive significance.
2088
Abstract: 60GHz signal has very high time resolution and multipath resolution, thus having the potential of achieving high accuracy ranging and positioning at centimeter level or even millimeter level. This technology has great application value in fields like indoor robot navigation, hazardous area monitoring and accurate positioning. In this paper, after designing the pulse-based 60GHz wireless communication system, we proposed a pulse-based 60GHz ranging system. Theoretical analysis and simulations demonstrate that the proposed system can achieve good ranging performance.
2092

Showing 441 to 450 of 463 Paper Titles