Advanced Materials Research
Vol. 769
Vol. 769
Advanced Materials Research
Vol. 768
Vol. 768
Advanced Materials Research
Vols. 765-767
Vols. 765-767
Advanced Materials Research
Vol. 764
Vol. 764
Advanced Materials Research
Vol. 763
Vol. 763
Advanced Materials Research
Vols. 760-762
Vols. 760-762
Advanced Materials Research
Vols. 756-759
Vols. 756-759
Advanced Materials Research
Vols. 753-755
Vols. 753-755
Advanced Materials Research
Vols. 750-752
Vols. 750-752
Advanced Materials Research
Vol. 749
Vol. 749
Advanced Materials Research
Vol. 748
Vol. 748
Advanced Materials Research
Vol. 747
Vol. 747
Advanced Materials Research
Vol. 746
Vol. 746
Advanced Materials Research Vols. 756-759
Paper Title Page
Abstract: Enterprise Service Bus (ESB) is a kind of SOA-based software infrastructure for the enterprise application integration. ESB becomes a hot technology of channels and resources integration.In this paper, in view of the characteristics of self-service channels and its IT architecture, we propose the scheme design of a new ESB-based integrated front platform of financial self-service equipments.It is called ProTeller ESB. The platform combines the functions of the self-service channels and front system to achieve a standardized service.It makes the IT structure of self-serive with good robustness and scalability, and can construct the ESB system fastly and efficiently.It can enhance the capacity of the existing system restructuring.
1180
Abstract: More and more organizations and individuals outsource their storage and computing business into cloud computing, which is a representation of a movement towards the intensive, large scale specialization and economy. Cloud computing brings about convenience and efficiency, but challenges in the areas of data security and privacy protection. This paper identifies the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing, and to know about critical analysis about the different security models and tools proposed. Key security strategies from the infrastructure, operation and security incident response relieve the common security issues of cloud computing.
1185
Abstract: The performance of optical carrier suppression (OCS) radio over fiber (RoF) system is evaluated through tuning the modulation index of Mach-Zehnder modulator, and two different data modulation schemes are considered. The quantitative simulation results validate that there exist an optimum modulation index, and the system performance could be improved if the data signal is modulated on only one of two sidebands.
1190
Abstract: Adapted parameters of OFDM signals can bring performance improvement in mobile satellite communications. This paper firstly analyzes the effect of cyclic-prefix (CP) length and sub-carrier bandwidth on system interference and capacity. This effect can be described by a formula which consists of system capacity, CP length and sub-carrier bandwidth. Then using this formula, a method to select the optimal parameters is given. In the end, a numerical calculation is performed to figure out the optimal parameters, considering the multipath delay spread and Doppler spread in satellite channel. It comes up that in satellite channel the CP is not very effective to improve the system performance and a wider sub-carrier bandwidth is desired.
1194
Abstract: Cloud computing has changed people's work, life and learning while more and more collaborative learning based on cloud services are applied to the field of education and teaching. This paper analyzes the collaborative learning characteristics supported by cloud computing and designs collaborative learning programs of College Computer Basis based on cloud services.
1199
Abstract: In multi-beam satellite systems, Inter-Beam Interference (IBI) has a great effect on system performance. Within range of satellite coverage area, inclined projective multiple beams give rise to elliptic beam projections, resulting in that the distribution of beam projections is different from traditional cellular distribution. In this paper, an Inclined Projection (IP) model is proposed for IBI in OFDMA based GEO satellite communication systems, and corresponding analysis is also included. A comparison of carrier to interference power ratio (C/I) of users at the center of each cell with and without the consideration of IP is made, based on the simulation using different Frequency Reuse (FR) factor. The corresponding conclusions are presented. This research can provide reference for later satellite beam planning.
1204
Abstract: Cloud storage is a new type of concept of digital information storage. In view of its advantages in distributed storage, collaborative storage, dynamic allocation storage space, smooth migration and backup, on the basis of the introduction of related concepts and unique advantages of cloud storage, the present essay introduced cloud storage into the data bank of plane design materials, and constructed a scheme of cloud storage of the data bank of the plane design materials from the three aspects of system structure, topological structure and function module.
1210
Abstract: Software protection is an important research area in computer field. Combined with the traditional asymmetric encryption algorithm which provides the measures of protection, computer fingerprint was employed to identify the protection object. This novel software protection method is called AEA-CF, which means asymmetric encryption algorithm based on computer fingerprint. The computers used AEA-CF should be running on Internet so that the authentication information could be provided by server. The experiments show that this method could protect software effectively.
1215
Abstract: Telematics, the application of Internet of Things technology in the intelligent transportation system, has attracted keen attention of research mechanism at home and abroad. By introducing the basic conception of Telematics, the paper makes a summary and research on the technologies adopted in the system architecture of Telematics and put an emphasis on the solution of some key technologies.
1220
Abstract: With the internet development and further development of information technique applications, information management system is used more and more widely in logistics enterprises, but consequent security issues of network information have become increasingly prominent. The paper was set in information system of logistics management of some company; security problem of application system in logistics enterprise under network environment was studied, and security architecture of logistics management information system and specific design program were introduced.
1225