Advanced Materials Research
Vols. 450-451
Vols. 450-451
Advanced Materials Research
Vols. 446-449
Vols. 446-449
Advanced Materials Research
Vol. 445
Vol. 445
Advanced Materials Research
Vols. 443-444
Vols. 443-444
Advanced Materials Research
Vol. 442
Vol. 442
Advanced Materials Research
Vol. 441
Vol. 441
Advanced Materials Research
Vols. 433-440
Vols. 433-440
Advanced Materials Research
Vols. 430-432
Vols. 430-432
Advanced Materials Research
Vol. 429
Vol. 429
Advanced Materials Research
Vol. 428
Vol. 428
Advanced Materials Research
Vol. 427
Vol. 427
Advanced Materials Research
Vol. 426
Vol. 426
Advanced Materials Research
Vols. 424-425
Vols. 424-425
Advanced Materials Research Vols. 433-440
Paper Title Page
Abstract: Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. There are many algorithms for clustering. One of the cluster based algorithm in wireless sensor networks is LEACH algorithm. In this paper we proposed a new clustering method for increasing of network lifetime. In proposed method Clustering is done symmetrically and the best node with respect to remained energy and distance of other nodes in comparing with each that selected as a cluster head. Although in this protocol we didn’t use GPS but we could find geographical position nodes so easily. However, failures in higher level of hierarchy e.g. cluster-head cause more damage to the system because they also limit accessibility to the nodes that are under their supervision. In this paper we propose an efficient mechanism to recover sensors from a failed cluster. In this performance of the proposed algorithm via computer simulation was evaluated and compared with other clustering algorithms. The simulation results show the high performance of the proposed clustering algorithm.
3223
Abstract: Grid computing is a new and quickly developmental calculation model with the development of Internet technology, focuses on integrating distributed, heterogeneous and idle computers from the Internet to be a service system with high performance. This paper gives a brief introduction of grid computing, and do research on the architecture and implementation of a data mining system based on grid computing, that is DMSGrid, a grid computing data mining applications, not only considers efficient parallel computing as a crucial aspect, but also takes into account dynamic resource configuration and provides an engine to execute the algorithm flow specified in an application.
3230
Abstract: This paper studies the security problems of campus network and summarizes the current on the current security risks and threats that campus network faces, focusing on analysis of attack-defense strategies on DOS network layer, proposing the security program of campus network which uses firewall as well as network security intrusion detection system snort. This paper analyzes the functional advantages of the program and presents in details the setup deployment and collocation methods of network security intrusion detection system based on snort in the campus network, and its application results are also summarized.
3235
Abstract: This paper analyzes the control principle of DC-side voltage from the aspect of instantaneous conversation of energy of active power filter, On the basis of these, to deal with the weakness of larger static error and overshoot about PI control method, a combined controller constituted PI controller and fuzzy controller is proposed. This method combines the merits of PI control and fuzzy control, and has some advantage of small overshoot, fast responses and small static errors. The Matlab simu1ation results show that the proposed method is valid and feasible.
3241
Abstract: Fingerprint identification technology is one of the biometric identification technologies that match and recognize the collected fingerprint image to determine the identity of the person. Fingerprint identification technology compared to other biometric identifications is more unique, practical and workable. Therefore, the fingerprint identification as the most popular, most convenient and most reliable authentication method, it has been widely used in many aspects of social life. This paper introduced the whole structure of the fingerprint identification system and the function of every part in fingerprint identification system, mainly introduced the part of fingerprint image pre-processing and implemented one of the algorithms for fingerprint image preprocessing with MATLAB. The result of the experiment shows that the algorithm for fingerprint image preprocessing that used in the paper meets the fingerprint image preprocessing requirements and it provides a basis for fingerprint characteristics extracting and fingerprint characteristics matching.
3247
Abstract: This is intended to promote the ability of solving problems of university students by using computer ,test the students’ master level of knowledge and ability of computer appliance scientifically and comprehensively. It designs and develops exam system of VFP language course on computer.
3252
Abstract: Voltage stability of AC/DC hybrid power grid is closely related to Voltage Dependent Current Order Limiter (VDCOL). The effects of VDCOL to voltage stability along with serious voltage reduction during or after faults are analyzed in detail. Considering that VDCOL with fixed parameters is difficult to adapt the complexity of operation conditions and ac faults in the receiving-end power grid of dc system, a kind of dynamic self-adaptive VDCOL control strategy is proposed based on the voltage of ac side of converter transformers at inverter side. Simulations of Shandong power grid of China show that the new type of VDCOL is beneficial to voltage stability of receiving-end power grid.
3256
Abstract: This paper proposes an efficient method for personnel identification which is based on Triangular Points of human hands and Wavelets Packet Transformation. In the stage of preprocessing, depending on position of the triangular points, a unique method to divide the Region of Interest (ROI) is proposed; at the same time, the distances among these points constitute an eigenvector which is the first feature of the palm. In the next stage, another palmprint feature is extracted by the Wavelets Packet Transformation. The two features are used as indexes to the palmprint templates in the database and the searching process for the best matching is conducted by a layered fashion. The experimental results illustrate the effectiveness of this method.
3262
Abstract: According to current research review of KNX technology, a hardware platform which core processor is ATMega32 is designed to implement KNX communication kernel. The software architecture of KNX communication kernel is key research in this paper, which is divided into three parts: communication, management and application. Meanwhile, working principle and achieved function of KNX communication kernel are discussed in detail. Finally, an application example is used to test the function of kernel. Research and implementation of KNX communication kernel based on new hardware platform will significantly reduce development costs of KNX device, benefit for application for KNX, and prompt market penetration.
3269
Abstract: This paper, guided by market demand, puts forward the mining enterprise performance management system for the purpose of enhancing the competitiveness of the enterprise. According to the scarcity of the mineral resource, the system improves the current situation of the separations of the operations management and the performance management. The system associates the operations plan, the budget plan and the performance management, integrating the strategic process and the operations process, which constructs the core of the enterprise executive ability. The system continuously improves the level of the business operations management and meets the requirements of the enterprise strategic management and of rational exploitation and utilization of the mineral resource, supporting mining enterprises to make decisions on the business strategy.
3276