Advanced Materials Research
Vol. 135
Vol. 135
Advanced Materials Research
Vols. 133-134
Vols. 133-134
Advanced Materials Research
Vol. 132
Vol. 132
Advanced Materials Research
Vols. 129-131
Vols. 129-131
Advanced Materials Research
Vols. 126-128
Vols. 126-128
Advanced Materials Research
Vols. 123-125
Vols. 123-125
Advanced Materials Research
Vols. 121-122
Vols. 121-122
Advanced Materials Research
Vols. 118-120
Vols. 118-120
Advanced Materials Research
Vol. 117
Vol. 117
Advanced Materials Research
Vols. 113-116
Vols. 113-116
Advanced Materials Research
Vol. 112
Vol. 112
Advanced Materials Research
Vols. 108-111
Vols. 108-111
Advanced Materials Research
Vol. 107
Vol. 107
Advanced Materials Research Vols. 121-122
Paper Title Page
Abstract: Mobile ad-hoc networking (MANET) is a collection of mobile nodes that want to communicate to each others, but has no fixed links like wireless infrastructure networks to provide group applications and services. Therefore we need concern about providing each node with a secure and efficient key management system for dynamically discovering other nodes which can directly communicate with. Due to the network topology of an ad hoc network changes frequently and unpredictable, so the security of multicast routing becomes more challenging than the traditional networks. In this paper, we describe how any users in the multicast group can compose the group keys and propose a hierarchical group key management to securely multicast data from the multicast source to the rest of the multicast members in wireless ad hoc networks. This approach has a hierarchical structure where the group members are partitioned into rendezvous-location based clusters which can reduce the cost of key management. It not only provides the multicast routing information, but also fits the robustness of the wireless networks and reduces the overhead for the security management.
657
Abstract: In this paper ,we proposed and analyzed a frame-level synchronization (FLS) algorithm for the UWB direct-sequnce transmitted-reference (DS-TR) receiver. In DS-TR systems, Symbol-level synchronization is not enough for data modulation , the position of low duty cycle signal in each frame is still unknown. The algorithm which we proposed has a moderate accuracy but a very low complexity and fast synchronization speed compared with conventional approaches requiring subnanosecond-level accuracy. Detailed analysis of the algorithm is carried out based on our in-depth analysis.
663
Abstract: Satellite constellation, emerging as a new paradigm for next-generation communicating, enables large-scale application of the geographically and spatially distributed heterogeneous resources for solving problems in science, engineering, and military affairs. The resource allocation in such a large-scale distributed environment is a complex task.
Due to the factors that trigger the deployment of resources in satellite constellation communication system, the artificial immune theory is applied to resource allocation field to propose the task-oriented common mathematic model about resource allocation of communication system, which is aimed at the purpose of improving the effectiveness of resource allocation and is based on the 2 important indicators that are communication task’s effectiveness factors and the degree of satisfaction in the communication system. As the immune system has characteristics of self-adaptive, self-learning and self-organization, an immune allocation algorithm that fuzzy processing time is presented by applying the immune theory to resource allocation. Simulation results show that these methods are feasible and efficient in solving the problems of resource allocation for satellite constellation communication system, and the research on this object is a meaningful exploring.
669
Abstract: Multi-view Video Coding (MVC) is very promising in applicable field for its 3D effect and interactive functions (multi viewpoint). In this paper, a network-friendly architecture for MVC is proposed. To exploit temporal as well as inter-view dependencies between adjacent cameras, two main features of the coder are used: hierarchical B picture and FGS (fine granularity scalable). Coding results are shown for the proposed multi-view coder and compared to the traditional coding architectures to show that our presented coding scheme outperforms the other approaches for the tested sequence.
678
Abstract: Adding element tridiagonal matrices play a very important role in the theory and practical applications, such as the boundary value problems by finite difference methods, interpolation by cubic splines, three-term difference equations and so on. In this paper, we give a fast algorithm for the Inverse Matrices of periodic adding element tridiagonal matrices.
682
Abstract: Removed due to plagiarism. Original paper is published by IEEE: J. Javier Martinez-Alvarez, et al, "A Multi-FPGA Distributed Embedded System for the Emulation of Multi-Layer CNNs in Real Time Video Applications" 2010 12th International Workshop on Cellular Nanoscale Networks and their Applications (CNNA), February 2010
687
Abstract: This paper proposes two protection algorithms SBP and PBP with the waveband grouping in fault-tolerant multi-domain optical networks. We also present the concept of layered auxiliary graph to achieve the multi-domain waveband grouping. Simulation results show that PBP performed better than SBP.
693
Abstract: The safety control tools in CSN perform supervision and analysis of the parameters of security systems, so these tools are an important part of the security system. The crucial problem is to develop effective methods and tools for the adaptive control of CSN safety. The suggested adaptive safety control module for CSN based on the safety monitoring tools provides the flexible, correct and effective reaction of security system to the intruder actions. This module allows dynamical evaluation of the information value of each CSN resource and setting the optimal parameters of security system. As a result, the suggested tools allow decrease of the possible damage to the CSN resource from successful intrusions, along with decreasing of security system implementation cost.
699
Abstract: Fidelity ranks the top priorities when experts of the industry face the task of solving application problem of digitized ancient Chinese books in the process of their digitization. Starting from practice, this article probes into fidelity in the two links of carrier conversion and issuing ways of ancient Chinese books in the process of their digitization, and put forward new insights into solving fidelity problems.
705
Abstract: The security of food has a direct relationship with consumers’ health and safety, which is the most basic material condition for human society’s survival and development. In the food market, information asymmetry exists in the entire food supply chain process, and the member companies are in game relationship during the operating process about food safety. The solution to the problem of food depends on the establishment of a reasonable distribution mechanism about food suppliers. Based on game theory, this paper builds and analyzes the profit distribution model of food supply chain and points out that a reasonable profit distribution mechanism plays an important role on the safety of food.
710