Advanced Materials Research Vols. 756-759

Paper Title Page

Abstract: In computer network communication, adopted the error-check control methods to reduce the error code frequency of data transmission commonly. The CRC (Cyclic Redundancy Check) method is the best one of them. This paper analyzed the principle and the check rules of CRC algorithm. For the CRC algorithm of bytes operation, proposed a new table-driven algorithm which is visual, compact and easy to be understood. A strict mathematic proof of the CRC algorithm is given. By diagrammatizing, deduct the calculated process of CRC-ITU and CRC-32 code in detail. At the same time, we designed a concise CRC-ITU algorithm with assembly language similarly, and discussed the method using the remainder of F(x)/G(x) as a surveillance code briefly.
1870
Abstract: Data mining technologies are successfully applied in lots of domains such as business, science research, health care, bioinformatics, financial forecasting and so on and so forth. Knowledge can be discovered by data mining and can help people to make better decisions and benefits. Association rule is one kind of the most popular knowledge discovered by data mining. While at the same time, some association rules extracted from data mining can be considered so sensitive for data holders that they will not like to share and really want to hide. Such kind of side effects of data mining is analyzed by privacy preserving technologies. In this work, we have proposed strategies by adjusting supports and quality measurements of sensitive association rules hiding.
1875
Abstract: In order to improve efficiency of equipment use and maintenance guarantee and develop excellent IETM system, internal and overseas development states and key technologies of IETM were researched in this paper. Certain equipment IETM system was developed using for reference international advanced standard and demand of equipment use and maintenance guarantee.
1879
Abstract: This paper presents a relay selection method for radio and television business, this method uses nodes time-delay and power information, obtains the value of network interrupt as decision threshold, then selects the relay node. At same time this paper proposes an optimal relay selection strategy which can minimize the network interrupt probability combination with power distributionMulti-Path Relay Routing Protocol, this protocol can change the appropriate route path according to the dynamic network. Simulation results show that this protocol can extend cells coverage area, reduce time-delay and increase system throughput, improve system spectral efficiency, and enhance Qos of radio and television business.
1883
Abstract: P2P(peer to peer) live streaming is currently a popular research topic, but for the defective of system architecture and scheduling policy, existing P2P streaming applications have poor user experience, such as long startup delay, long playback delay, and low playback continuity. In this paper, we aim at reducing the playback delay from the source in the environment of heterogeneous upload bandwidth, heterogeneous and dynamic propagation delays. We propose a neighbor selection method in order to utilize the capacity of the peer and consider their scheduler playback deadline. This new peering strategy typically leads to low scheduling delays and improve the playback continuity. Finally we apply a receiver driven chunk selection with a mix scheduling algorithm. Through simulation, we can observe that our scheduler can outperform.
1889
Abstract: In this paper, we address the problem of carrier frequency offset (CFO) estimation for Orthogonal Frequency Division Multiplexing (OFDM) systems. This paper links CFO estimation problem in OFDM systems to the compressed sensing model. Exploiting this link, it derives a compressed sensing-based CFO estimation algorithm. The proposed algorithm has better CFO estimation performance than ESPRIT method with lower signal-to-noise ratio (SNR). Simulation results illustrate performance of this algorithm.
1894
Abstract: This paper puts forward a novel cross-media retrieval approach, which can process multimedia data of different modalities and measure cross-media similarity, such as image-audio similarity. Both image and audio data are selected for experiments and comparisons. Given the same visual and auditory features the new approach outperforms ICA, PCA and PLS methods both in precision and recall performance. Overall cross-media retrieval results between images and audios are very encouraging.
1898
Abstract: Cloud computing is a new network application mode, with the arrival of the era of cloud computing, cloud computing technology has been applied to education in the field of network teaching practice. Based on the concept of cloud computing service level, on the basis of research, the cloud computing application to the university network teaching platform, then puts forward the implementation of the application scheme of cloud computing in the network remote teaching in a trial and application analysis of cloud computing and education field of education informatization with the positive influence.
1903
Abstract: This paper researches cloud knowledge service of supply chain. First the cloud computing technology is introduced. Then the reasons of the cloud computing suitable for knowledge service demand is analyzed. Finally, a knowledge service mode based on cloud knowledge is described.
1908
Abstract: In this paper, we compare Huffman coding and Arithmetic coding with ASCII coding to observe their contribution to steganography. This way is to compress the embedded information first for enhance the payload of a cover image. There are many wonderful coding methods to compress this kind of string, such as Huffman coding and Arithmetic coding. The experiment results indicate that Huffman coding and Arithmetic coding as an important preprocess step of steganography can effectively reduce the amount of secret information with efficient encoding performance. And a theory opinion related to payload calculation is proposed which can be used to describe the relationship among the three parameters of steganography: imperceptibility, information embedding efficiency and payload.
1912

Showing 391 to 400 of 959 Paper Titles