Advanced Materials Research Vols. 546-547

Paper Title Page

Abstract: Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. This paper presents the enhanced attack trees for MANET attacks, which is completed by extending the basic attack trees. The enhanced attack trees add the types between nodes and the attributes of nodes. Finally this paper shows how to represent the Block hole attacks in MANETs by means of the enhanced attack trees.
1217
Abstract: With the development of wireless networks and embedded systems, it is increasingly popular to make use of these technologies to tracking and location detection applications. ZigBee is a low power, low cost, low data rate and low complexity wireless technology for personal-area and device-to-device networking. In this paper, a practical ZigBee based tracking and positioning system for objects and personnel is proposed. Besides, the system architecture, system components as well as their functionalities are presented. Furthermore, the commercial application results have shown that the proposed system is suitable for tracking and location detection.
1223
Abstract: This paper aims to study VHF channel planning and solve the problem of minimum numbers of relay stations distribution, and to provide distribution of relay stations which different users can communicate at the same time by method of geometry and the building the optimized mathematical model of stations distribution.
1229
Abstract: Rapid development of Internet technique and electronic commerce change the way of operation and management in enterprises and organizations, of which information storage systems will be affected greatly. Researchers are now more and more interested in finding a way to access information effect and efficient. We design and implement a web content management system which allows content creators to create, submit and manage contents conveniently. In our web content management system, data can be defined as documents, movies, pictures, phone numbers, scientific data, and so forth. We analyze the destination and function of web content management system first, and then design how files are organized and managed. In web content management system, the content is stored and managed at the sub-document or component level for greater content reuse. With web content management system, users can maintain security, manage objects, manage servers, and manage auditing easily.
1235
Abstract: In this paper, an objective way to evaluate artistic voice of singing is discussed. The model transforms artistic voice evaluation indicators into qualified data as BP network input and takes fuzzy synthetic evaluation results as output. The authors take F1(the first Formant), F3(the third Formant), vocal range, perturbation of F1, perturbation of F3 and average energy as the evaluating parameters and assess the quality of singing voices with BPNN(back propagation neural network). The results are then compared with the subjective evaluation of experienced professionals. Experiments show that BP neural network is effective to evaluate the singing voices, thus to be helpful to scientific guidance of selecting and training the talent of artistic voice.
1240
Abstract: This paper presents an eID based solution to use for mobile internet, namely a platform structure and some key devices to realize the solution, in order to bring us an approach more secure and convenience to access online banking services and avoids some privacy leaking and online banking fishing problems.
1245
Abstract: Distributed file systems use file lock mechanism to ensure consistency when the shared data are accessed by multiple nodes. In this paper, using the feature of distributed systems that the same file would be accessed frequently and the advantage of high concurrency of range lock, the semi-preemptible range lock for pNFS is proposed. Clients locally cache the finer-grained locks for ranges of files they hold. Clients retain or cache range locks even without the file instances. When an access lock is cached, a client answers some requests without a server message, improving performance by exploiting locality. Simulation results indicate that the proposed locking mechanism can effectively increase concurrency and decrease the communication cost of pNFS.
1250
Abstract: In this paper, based on the traditional fixed telephony features to increase the short message processing module. To meet the voice communication between users, the fixed telephone can realize mutual development between the SMS function .The main telephone lines in the completion of the CAS signal detection, and traditional communications in FSK and DTMF signal reception and transmission.
1256
Abstract: Due to the unique characteristics of underwater acoustic channels, most wireless protocols need necessary modifications before being applied to underwater acoustic networks. In order to match underwater environment better and achieve higher performance, underwater acoustic networks are calling for cross-layer design with integrated functions implementing. This paper discusses about how to integrate the ranging technique and media access control (MAC) together. Ranging plays a key role in forming a network topology. However, the independent ranging process in an underwater acoustic network requires frequently media access and affects the performance of MAC protocols. In this paper, a joint design of ranging and MAC was proposed to solve the problem. MAC signals are reused to estimate the range. By applying ranging solutions for Aloha and MACAW, good range estimation was obtained in underwater networks. An undersea experiment was carried out to verify this solution. The experimental results show that the joint design of ranging and MAC is capable to work well in underwater acoustic networks.
1261
Abstract: In this research, we focus on distributed network management in network coding. Web Services Distributed Management (WSDM) is one of the industry standards for distributed management. With the advantage of WSDM, we improve the efficiency of topology management in network coding and propose Distributed Topology Management System (DTMS). Under the campus network as our experimental environment, we analyze the performance of our system in this paper. Further, we compare the performance of our system with AdventNet Web NMS which is one of popular network management tools. Our work is the first solution to distributed network management in network coding. It is also the first to introduce WSDM specification to network coding. WSDM brings us a loosely coupling topology management system which is user-friendly and performs well.
1270

Showing 211 to 220 of 279 Paper Titles