Advanced Materials Research
Vol. 769
Vol. 769
Advanced Materials Research
Vol. 768
Vol. 768
Advanced Materials Research
Vols. 765-767
Vols. 765-767
Advanced Materials Research
Vol. 764
Vol. 764
Advanced Materials Research
Vol. 763
Vol. 763
Advanced Materials Research
Vols. 760-762
Vols. 760-762
Advanced Materials Research
Vols. 756-759
Vols. 756-759
Advanced Materials Research
Vols. 753-755
Vols. 753-755
Advanced Materials Research
Vols. 750-752
Vols. 750-752
Advanced Materials Research
Vol. 749
Vol. 749
Advanced Materials Research
Vol. 748
Vol. 748
Advanced Materials Research
Vol. 747
Vol. 747
Advanced Materials Research
Vol. 746
Vol. 746
Advanced Materials Research Vols. 756-759
Paper Title Page
Abstract: The Internet of Things accelerates the development of RFID technology. Logistics, transportation, aviation and other fields has increasingly high demand on the reader's identification distance and reliability. In order to meet the market demand, the design of RFID reader based on the dual-mode was proposed. One is 915MHz radio frequency identification mode. The other is 2.4GHz active radio frequency identification mode, which has lower transmission power requirement and farther valid identification distance. An ARM9 microcontroller is used as the main controller of the RFID reader. The design includes communicate with PC, control dual-mode RFID reader, control the reader to write and read tags and the study of anti-collision algorithm. In the testing of the system, it achieved to identify further. The performance is achieved and reliable.
2209
Abstract: To address the problems in Opportunistic Networks that nodes employing routing algorithms based on epidemic mechanism cant sense their neighboring nodes timely and many redundant data packets permeate through the network, an efficient routing algorithm based on XOR network coding was proposed (Xor Network Coding based Epidemic Routing, XNCER). When a node gets a Hello message, it broadcasts, instead of unicasting, a SV(Summary Vector) packet, in return, to all its neighboring nodes. Therefore, the data transmission can be initiated immediately, and the XOR network coding can also be leveraged so as to enhance the efficiency of data transmission. Moreover, the packets destined to the one hop neighboring nodes obtain the priority in transmission, and are determined whether to be deleted based on the ACK mechanism running in the MAC layer in order to cut down the memory overhead and restrain redundant packets from dissemination. Theoretical analysis and extensive simulation results show that the new algorithm obtains an overall improvement in terms of network overhead, average end-to-end delay as well as delivery rate. The novel algorithm can effectively solve the problems of sensing neighboring nodes and data redundancy.
2214
Abstract: The most serious threats for Android users is come from application, However, the market lack a mechanism to validate whether these applications are malware or not. So, malware maybe leak users private information, malicious deductions for send premium SMS, get root privilege of the Android system and so on. In the traditional method of malware detection, signature is the only basis. It is far enough. In this paper, we propose a runtime-based behavior dynamic analysis for Android malware detection. The new scheme can be implemented as a system. We analyze 350 applications come from third-party Android market, the result show that our system can effectively detect unknown malware and the malicious behavior of malware.
2220
Abstract: Embedded software and hardware integration simulation platform is developed for simulating the embedded systems design process in current engineering system, which can facilitate finding various problems in system design process. For example, in the system scheme phase, the scheme and design verification are untimely and inadequate. In the early prototype phase, software development lags behind result in deferral of the overall progress of the system. And in the late prototype stage, the problem is lacking configuration item test environment. Embedded software and hardware integration simulation platform can provide verification of hardware and software integration and test development environment. Therefore, the quality of software development in embedded systems can be significantly improved and development cycle can be remarkably shortened by using this simulation platform.
2226
Abstract: Link prediction is an important research hotspot in complex networks.Correlational studies merely use static topology for prediction, without considering the influence of network dynamic evolutionary process on link prediction. We believe that the linksare derived from the evolutionary process of network, and dynamic network topology will contain more information, Moreover, many networks have time attribute naturally, which is apt to combine the similarity of time and structure for link prediction. The paper proposes the concept of active factor using time attribute, to extend the similaritybased link prediction framework.Thenmodeland analysis the data of citation network and cooperation network with temporal networks.Design the active factors for both network sand verify the performance of these new indexes. The results shows that the indexes with active factor perform better than structure similarity based indexes.
2231
Abstract: A requester node requesting a service in a peer to peer network transmits a request to a service provider node. The request may include a communication history of the requester node identifying other nodes with which the requester node has previously communicated. The service provider node authenticates the requester node based on the communication history. The service provider node may ask other nodes with which the requester node has communicated for evaluation of the requester node. The other nodes may calculate a trust metric of the requester node and provide this metric to the service provider node. The service provider node may use this trust metric in combination with a similarity calculation of the requester node and the service provider node to make a determination whether the requester node is to be authenticated. The service provider node may evaluate the requester node and store the evaluation in its communication history.
2237
Abstract: The electronic evidence is becoming increasingly popular in cracking down on Internet pornography, online gambling, phishing and other high-tech crime cases .It also takes an important part in the agricultural industry, regulatory processes and electronic forensics. Of course, electronic forensics has also encountered some legal obstacles. The obtained materials are often used for handling the case the clues rather than evidence. So how to take electronic evidence extraction technology into the food industry and improve agricultural security is particularly important. The text presented data on the target computer to restore the use of remote technology, scan the data record and in accordance with MD5 encoding effectively and quickly , record real-time, and then extract a set of electronic evidence forensics model. Form an effective, fast, flexible electronic evidence extraction method.
2243
Abstract: Write a data interface program transforming data between BPA and PSS/E by VC and realize bidirectional transform of power flow data and transition from BPA to PSS/E of stable data. Illuminate the corresponding relationship between these two programs of both power flow and stable data and compare differences and resemblances between them. Emphasize the difference in dealing with excitation and governor model; explain the essential points during transform and measurements of managing discrepant model. Validate the effectiveness of this program by simulation.
2249
Abstract: According to the actual needs of national expressway networking tolling, this paper designed a electronic toll collection system based on ZigBee and MCU technology. The communication module of the system was designed based on the Z-Stack1.4.3 of TI company, vehicles automatic identification and electronic toll collection function were implemented. The 89C54 of STC was the core of the control module, information query and voice prompt function were implemented by use of keys, LCD and ISD1700. The reliability and feasibility of system were proved by the test of onboard unit and the ZigBee communication module.
2255
Abstract: Optimal operation of distribution network is widely concerned in recent years. As an important part of optimal operation, the reconfiguration of distribution network is a focus of research. This paper proposes an interactive reconfiguration algorithm of distribution network based on GridLAB-D and uses a typical feeder sample to illustrate the effectiveness of this algorithm.
2260