Advanced Materials Research
Vol. 763
Vol. 763
Advanced Materials Research
Vols. 760-762
Vols. 760-762
Advanced Materials Research
Vols. 756-759
Vols. 756-759
Advanced Materials Research
Vols. 753-755
Vols. 753-755
Advanced Materials Research
Vols. 750-752
Vols. 750-752
Advanced Materials Research
Vol. 749
Vol. 749
Advanced Materials Research
Vol. 748
Vol. 748
Advanced Materials Research
Vol. 747
Vol. 747
Advanced Materials Research
Vol. 746
Vol. 746
Advanced Materials Research
Vol. 745
Vol. 745
Advanced Materials Research
Vol. 744
Vol. 744
Advanced Materials Research
Vol. 743
Vol. 743
Advanced Materials Research
Vol. 742
Vol. 742
Advanced Materials Research Vol. 748
Paper Title Page
Abstract: Wireless sensor networks (WSN) cover many kinds of technologies, such as technology of sensor, embedded system, wireless communication, etc. WSN is different from the traditional networks in size, communication distance and energy-constrained so as to develop new topology, protocol, quality of service (QoS), and so on. In order to solve the problem of self-organizing in the topology, this paper proposes a novel strategy which is based on communication delay between sensors. Firstly, the gateway choices some boundary nodes. Secondly, the boundary nodes choose inner nodes. The rest may be deduced by analogy. Finally, a net-tree topology with multi-path routing is developed. The analyses of the topology show that net-tree has strong ability in self-organizing and extensible.
905
Abstract: With the development of Internet of things, the security has become moreand more important. In order to make clear the internet of things existing security threats, provide a theoretical reference for Internet of things Security and privacy protection, this paper summarizes the internet of things security threat and the measures. According to the Internet of things main system frame, research the perception layer, transport layer and application layer seperately, analysis of the network security needs issues, research networking security model, and discuss the content of network security mechanisms, gives the corresponding safety measures and recommendations for all kinds of security threats.
910
Abstract: Since Wireless Sensor Networks (WSNs) and applications are closely related, with the application environment from the traditional outdoor environment gradually extended to the indoor environment, it will set a higher request to WSN and the routing algorithm. The traditional Ant Colony Algorithm (ACA) converges with a slow speed in its initial phase, so a location-aware ACA is proposed which introduces geographical information into standard ACA. The new algorithm adds direction factor into the path selection probability function which can make the ants move faster to the source by getting rid of the blindness in early path selection. Experimental results show that the location-aware ACA make great improvements in both convergence speed and running time.
915
Abstract: This paper presents a study on the effect of distance between XBee Pro modules to the maximum data transfer for three different mounting elevations. The study has been conducted by using two units of XBee Pro modules which each represents a receiver and a transmitter. The transmitter is mounted in three different elevations which are 0.5, 1.5 and 2.5 meter from the ground while the receiver is fixed at the same elevation. When the transmitter continuously transmits the wireless signal carrying its particular address, the receiver will detect the signal address once the range of communication of both receiver and transmitter intersects. The results obtained are the values of data size, in bytes, with respect to the distance between receiver and transmitter for different mounting elevations of transmitter. These data are then converted into graph that illustrates the data size-distance characteristics for each mounting elevation. Finally, the best mounting elevation is to be identified based on the result obtained.
921
Abstract: The objective of Steganography is to hide the information inside other data in order to avoid being spotted by the strangers. Steganography is an old-fashioned art that has been reborn in current years. This current paper provides a literature review on the security of Steganography organization and emphasizes on its measurements. The proposed algorithm introduces a novel hashing and encoding algorithm to generate a digital signature. Later, it has been embedded into the original data which doesnt require extra bandwidth for communication by signature.
927
Abstract: Mobile devices have been popular in recent years and the proliferation of mobile devices inspires the interest in mobile multimedia applications. However, memory is always the bottleneck in the traditional memory hierarchy. Scratchpad memory (SPM) is a promising on-chip SRAM to solve such problem. It has faster access time and less power-consumption compared to cache and off-chip memory. In this paper, we propose the efficient scratchpad memory management approach for mobile multimedia applications. SPM is partitioned for the assignment of the slices of the applications based on the profiling and the recorded history. Through the use of SPM, the memory footprint of mobile multimedia applications will be reduced for better performance and less power-consumption. The experimental results show that our approach is able to significantly reduce the power consumption and improve the performance of mobile multimedia applications.
932
Abstract: In the embedded software education, it is usually a burden to give every student a development board in the class due to limited budget. Besides, peripheral devices such as LCD panels also increase the cost. A cheap and flexible way is to use virtual embedded systems in the class. However, virtual systems cannot completely reflect the developing environment on real platforms. In this article, we propose the idea that combines the virtual and real embedded platforms. The proposed platform preserves the core of the hardware board, so that developers can design embedded software applications in the real developing environment. In addition, we eliminate the peripheral wires and connectors on hardware board and use virtual peripherals and peripherals on PC instead, such that designers can easily control and change peripherals. The proposed idea can significantly reduce cost and increase flexibility when teaching embedded software design. Moreover, the size of development board can be reduced as well. Without the restriction of peripheral connectors and devices, development boards become portable and more easy to use.
936
Abstract: Fibre Channel (FC) as a Universal Avionics Network (UAN) candidate solution for the advanced integrated avionics systems can enable high-bandwidth, low-latency, high-reliability and hard real-time communication on aircraft platforms spanning military and commercial applications. Fibre Channel Avionics Environment-Anonymous Subscriber Messaging protocol (FC-AE-ASM) is one of the five high level protocols in fiber channel avionic environment which is used to transport command, control, signal processing and sensor / video data of the aircraft[1,2].The objective of this paper is to conduct a modeling and simulation on the performance of the FC–AE-ASM network. Through modeling the message transmission of the FC-AE-ASM with accompanying Eclipse, some network performance parameters such as bandwidth, throughput and end-to-end message delay can be gained and analyzed.
941
Abstract: Vehicle will be connected to the Internet as both for ubiquitous remote controlling and as a means to meet Intelligent Transportation Systems (ITS) needs. At first, a gateway system between Controller Area Network (CAN) and IPV6 is required to connect vehicles to the Internet. Then this paper achieves the access of vehicle information and the control of vehicle using the CDMA wireless network based on the gateway. Finally, according to the result of the test, we have verified the correction and effectiveness of the control system.
946
Abstract: with the network intelligent development, the technique widely application brings huge convenient for peoples life and work. The network openness exist great hidden troubles along with the information security. Based on the security system of public key infrastructure, we can determine the users information security and completion through the method of providing secret keys and certificate managing by both sides. Through the research of public key infrastructure, we can design out the planning of electronic payment platform and apply it in the practical society. This is the most important point that network staff and electronic commerce works are searching.
953