Advanced Materials Research Vols. 1079-1080

Paper Title Page

Abstract: The rapid development of information technology makes the construction of computer information system possible, greatly facilitates people’s lives and improves the efficiency of learning and production. Computer information system is also applied in many sensitive areas. To improve the management efficiency of information and data, the behaviors that related computer information systems are illegally invaded are increasingly rampant and have seriously endanger national security, territorial security, sovereignty security, political security, military security, economic security, cultural security, science and technology security, ecological security and information security. In terms of the crime of illegal invasion into computer information system, this paper studies from several aspects, the cognizance of crime and non-crime, the accomplishment and attempt of the crime, subsequent criminal behaviors and legislative perfection.
733
Abstract: For large amounts of data generated by the e-commerceplatform, combining with the actual needs of e-commerce recommendation system,make research on a common technique of association rules which orientede-commerce Web mining association analysis, introduces the association rules ofApriori mining algorithm, and the specific application of Apriori algorithm isanalyzed through a practical example, Finally, point out the shortcomings ofclassical Apriori algorithm, and gives directions for improvement.
737
Abstract: This research mainly according to automotive modular production characteristic, proposed for tracing method module production in batches; parts relation and order information system construction of internal and external traceability system model; using the mass matrix and the batch list theory, research on the above two kinds of design theory of quality traceability scheme based on distributed management system, and establish the integrated application model and parts material network technology suppliers; tracing back combined back and realize the goal of batches of the product quality control in advance and the defects of the products. Through the research on the theory of reference to the use of the Internet of things technology, technology focus of the study lies in the application of IDEF modeling method, the integrated use of Excel's powerful data processing tools and Pareto Diagram, combined with the RFID tag technology, and achieve the goal of defective product traceability and batch tracking combined. The key technology for the RFID radio frequency technology, the IDEF method and the two dimensional code identification etc.
743
Abstract: On the basic of multiple populations of immune algorithm and clonal selectionalgorithm, the purpose of this paper is to further improve the detectionefficiency and reducing the false alarm rate. This paper uses the kddcup99 dataset as the experimental data set, and chooses four types of attack data groupof experiment data set as initial population of multiple populations of clonalselection algorithm, through the algorithm to create the optimal model. Basedon the principle of normal data larger than the abnormal data, in turn,experimental data set matched with the normal data set and the optimal model bythe improved R matching algorithm. The results of this paper show that thedetection rate increased significantly
747
Abstract: Spreadspectrum orthogonal frequency-division multiplexing (SS-OFDM), which appliesspread spectrum technique into OFDM, performs robustly in severely multipathfading underwater channels. However, this technology is sensitive to thefrequency shift. Furthermore, communication in underwater acoustic (UWA)channels is more vulnerable to Doppler effect than other wireless channels dueto the low speed of acoustic signal propagation. It presents challenges forcommunication between underwater mobile nodes. Therefore, accurate Dopplerfrequency shift estimation and compensation is important. Aself-designed receiver structure for SS-OFDM system including a novel Dopplerscale estimation method and channel estimation via compressed sensing method isproposed. The simulation and experimental results offer strong proofs for ourscheme to be a viable option for acoustic communication between underwatermobile nodes and compressed sensing method outperforms the conventionalleast-squares (LS) method in channel estimation.
752
Abstract: According to the problem that multi-frequency weak signal under the full frequency coverage constraint is hard to detect, this paper puts forward a detection method by adaptive flexible stochastic resonance. Based on frequency band decomposition of input signal, each function modules of flexible stochastic resonance system are configured for different frequency bands. Parameters including system structural parameters, frequency compression factor and frequency of modulation signal are optimized adaptively by genetic algorithm. Then each signal component distributed on each frequency band is processed by stochastic resonance effect to realize the enhancement of multiple weak features under the full frequency coverage constraint. Finally, through simulation analysis and an example of rolling bearing fault diagnosis, the effectiveness and comprehensiveness of this presented method in the detection of multi-frequency weak signal is verified.
757
Abstract: A certain delay jitter will impact the time synchronization accuracy of PTP system in the IP packet switched network. Look the network delay jitters as independently distributed random noise, and use the Least Mean Square (LMS) filter to filter out the noise, that will help to relieve the delay jitter on the system synchronization accuracy. The simulation results show that, by using the LMS algorithm, the research can increase the synchronization accuracy and decrease the bad impact on master and slave time synchronization of packet delay jitter.
762
Abstract: Security alarm algorithm is the key technology in the application of automotive active collision avoidance system, both at home and abroad are in-depth study. The main basis for security alarm is the distance between vehicles, when the distance between the two vehicles arrive at certain critical range, the alarm system will alarm, to remind the driver brake or deceleration. This paper mainly introduces the safety distance between vehicles of the problem, based on the research at home and abroad, is improved to make it more in line with the real traffic environment on the existing model.
766
Abstract: Traffic index hasbeen used to provide accurate traffic information to users. Many models havebeen developed to calculate the index for a road, but how to define andcalculate the index for an area still needs more investigation. Here we proposea new model for area index, including a definition of area index itself and a methodto calculate it. But this model can’t be widely used, for some innatelimitations. So we put forward another method based on well-known algorithmPageRank to calculate area index. To test the effectiveness, we apply ouralgorithmto conduct several experiments. Our experiments using standard trafficstatistics provided by ShanghaiTraffic Information Center (STIC), show our method have values for real-time traffic information system.
769
Abstract: As the core technology of network security, encryption technology has great significance to the new era network development and application and making full use of encryption technology can ensure the security of critical data and effectively deal with a variety of network intrusion and attacks. While from the current development situation, basing on the complexity of encryption technology, we did not rationally make full use of the advantage of encryption technology. In fact, encryption technology is an invaluable safety tool that can ensure the security of sensitive information and easier than virus scanning and data backup procedures and has broad application space in future aspects like preventing leaks.
776

Showing 151 to 160 of 278 Paper Titles