Advanced Materials Research
Vols. 690-693
Vols. 690-693
Advanced Materials Research
Vol. 689
Vol. 689
Advanced Materials Research
Vol. 688
Vol. 688
Advanced Materials Research
Vol. 687
Vol. 687
Advanced Materials Research
Vol. 686
Vol. 686
Advanced Materials Research
Vol. 685
Vol. 685
Advanced Materials Research
Vol. 684
Vol. 684
Advanced Materials Research
Vol. 683
Vol. 683
Advanced Materials Research
Vol. 682
Vol. 682
Advanced Materials Research
Vol. 681
Vol. 681
Advanced Materials Research
Vol. 680
Vol. 680
Advanced Materials Research
Vol. 679
Vol. 679
Advanced Materials Research
Vol. 678
Vol. 678
Advanced Materials Research Vol. 684
Paper Title Page
Abstract: Information science focuses on understanding problems from the perspective of the stakeholders involved and then applying information and other technologies as needed. In this paper, the notion of orthogonal nonseparable four-variable wavelet bundles is introduced. A new method for designing them is presented by iteration process. A nice approach for constructing four-variable biorthogonal wavelet bundles is developed. The biorthogonality property of four-variable wavelet bundles is discussed. Biorthogonality relations concerning these wavelet four-variable bundles are derived. A constructive method for affine frames is presented. Moreover, it is shown how to get new Riesz bases of from the wavelet bundles.
522
Abstract: On-line education, as a new teaching method, introduces Web data mining into on-line education to develop intelligentized and individual construction of resource library and on-line education. Web data mining technology can help to find out education laws and modes to meet different students’ individuation, reaching Network level teaching and improving Network teaching quality. This paper analyses problems existed in current on-line education by pointing out necessary Web data mining technology and its application in on-line education.
526
Abstract: Radio frequency identification (RFID) has been applied to a variety of domains. RFID tag search problem becomes significant when the total number of tags is very large and only the data of a particular tag or a small group of tags are required. This paper proposes a lightweight serverless RFID tag search protocol in conformity with EPC C1G2 standards. The computation operations in the protocol are only PRNG and XOR. The security analysis shows that the protocol achieves authentication, data confidentiality, untraceability and data integrity.
531
Abstract: Seamless connectivity in wireless networks is critical for various applications. So, a dynamic beamforming antenna is utilized to improve wireless connectivity. However, using a dynamic beam steering scheme has a key problem when processing a handover between access points (APs). This paper proposed a dynamic beamforming handover (DBH) scheme using the relationship between beam pattern and topology information. Each AP preconfigures the neighbor list and tries to meet what candidate APs are available during handover process. Performance evaluations indicate that the handover latency can be significantly reduced by applying the proposed scheme and the network throughput can be enhanced.
535
Abstract: With the wireless communication technology and world-wide Internet, living styles have become more and more convenient and smart, especially, for the application of context-aware systems based in wireless sensor networks. Furthermore, mobile devices provide users timely information browsing and mobile data access. In this study, the ZigBee wireless sensor network combined with sensor data observed Services (Sensor data Observation Service), and PostgreSQL database systems is developed to implement a remote access ZigBee wireless sensor network through an IP Internet browser. This system includes: (a) the integration of ZigBee CC2430 sensor sensing light, humidity and temperature; (b) PostgreSQL database tools accessing data; (c) via the sensor data Observation Service (SOS ) technologies; (d) through mobile devices to master the relevant environmental information.
539
Abstract: PRoPHET uses its delivery predictability of node encounters and transitivity to forward bundles to its neighbor node. Regardless of their distance, it faces delivery dilemmas in a source node and drawbacks of low delivery ratio and high delay in case two or more neighbor nodes carry equal delivery predictability. To solve such consequences, we propose a Distance and Probabilistic Routing Protocol using History of Encounters and Transitivity (DPRoPHET) with the use of cross layer implementation for distance value retrieval. Our simulation results show that, by adding distance metric to the existing delivery predictability vector, DPRoPHET outperforms PRoPHET.
543
Abstract: Mobile Ad-hoc Network (MANET) is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks. One of these attacks is BlackHole. In this attack, a malicious node advertises itself as having a high sequence number and a shortest path to a specific node to absorb packets. The effect of BlackHole attack on ad-hoc network using AODV as a routing protocol will be examined in this research. We also propose a new mechanism, called DPBA-AODV, to detect and prevent BlackHole attacks on AODV protocol. Simulation result, by using NS2, depicts the efficiency of our proposed mechanism in packet delivery ratio under the presence of BlackHole nodes.
547
Abstract: Since smart grid construction started, the intelligent substation network has become the hot topic. This paper combined with IEC61850 in the smart substation data sampling, analyzes the frequency and bandwidth characteristics of the wireless network for the current smart substation missing information content. It studies the application of wireless network reliability verification. The article discusses the application program from three following important respects: the WLAN design coverage, flow and load, application needs. It describes the key problems of the wireless network data sampling implement from the data sampling time. At the same time the futures application of the wireless network sampling in the smart substation is prospected.
551
Abstract: Improvement of the expert system shell Pro/3 sentence record input function is introduced. The function of the Pro/3 inputting disposable a large quantities of sentence records corresponding to a sentence, i.e., batch inputting the sentence records, was implemented . The basic security condition assessment method of some desktop terminal computers in the power supply company was explored to achieve the expert system about these desktop terminal computers basic security condition assessment. Experimental results show that the batch inputting sentence records function is more effective and the desktop terminal computers basic security condition assessment expert system is feasible.
555
Abstract: The core technology of load balancing is the task scheduling. Different tasks have different resource occupation rate on the server node and influence the current server load also different. This paper presents a dynamic load balancing algorithm and we design some experimental environment. We do some simulation experiments based on some reasonable assumptions and actual state of network, to evaluate our dynamic load balancing algorithm. The experimental data shows that compared with the least weighted connection scheduling algorithm, the algorithm of this paper can make full use of machine resources. The system data retrieval efficiency is also improved.
559