Advanced Materials Research Vols. 756-759

Paper Title Page

Abstract: Simulation is an important tool for studying the existing and out-coming techniques, and in the meantime there exists disbelief in simulation verification all the time. As credibility is the key in simulation fidelity study, it is important to give an all-round discussion of the credibility of simulation systems themselves. A technique is described for constructing a formalized framework of credibility analysis in simulation systems, on the basis of which the practical method is put forward. The method can be applied to study unexpected or inaccurate simulation results. Following this, the method is applied in a tether-net simulation system to verify the usefulness of the approach proposed. The results of evaluating are discussed.
2673
Abstract: llustrating the advantages and disadvantages of several commonly used methods to develop serial communication program under Microsoft Windows, this article uses a serial communication class through a third party, namely the use the Remon Spekrijse provided free serial port class CSerial the Port class, complete the RS232 serial port communication between the examples show, CSerial Port is a very simple, convenient and convenient and simple multi-threaded serial programming tool.
2678
Abstract: LLE is a very effective non-linear dimension reduction algorithm and widely explored in machine learning, pattern recognition, data mining and etc. Locally linear, Globally non-linear has always been regarded as the features and advantages of LLE. However, the theoretical derivation presented in this paper shows that when the size of neighborhood is larger than the dimension of the space in which the data are presented, LLE is no longer global nonlinear and almost has the same effect as PCA in dimensionality reduction. At present, a lot of literatures on LLE verify their results on Swiss Roll, Punctured Sphere, Twin Peaks, etc. These manifolds are presented in the three-dimensional Euclidean space and the size of neighborhood is always larger than three to prevent too small to be effective. But in these cases, LLE cannot play its advantage of nonlinearity.
2682
Abstract: To investigate and forecast the traffic characteristics of important M2M service--Small data service, we modeled its arrival process and analyzed the effects it has on current wireless network. By simulating service logic and designing traffic generation function of typical M2M small data service on network simulation platform (OPNET), we modeled packet inter-arrival time of M2M aggregate traffic with general distribution Gm. Considering the time-varying feature of wireless channel, MMPP-2 is used to model the service process of WLAN access network. Based on the queuing theory, we solve Gm/MMPP/1/K model under general arrival of M2M small data service and time-varying channel, then we obtained the performance metrics of the queuing system. The results indicate that (1) Hurst parameter of M2M aggregate traffic is approximately estimated as 0.7, (2) M2M small data service has the characteristics of delay-tolerance, as a result, system blocking rate can be effectively reduced by increasing the buffer size in the error-prone wireless environment, this solution is feasible.
2687
Abstract: In this paper, through specific description of the concept of virtual private network VPN, operating principles and the IPSec protocol, and using the OPNET software for performance simulation of IPSec VPN network, we get the result of IPSec VPN throughput of the network, which is unstable. o though IPSec VPN has improved the safety performance of data transmission, it at the same time affects the transmission efficiency. By analyzing the problems of IPSec VPN, in terms of improving safety performance, the combination of PKI and IPSec VPN program was proposed. Theoretical analysis shows that such program can indeed solve the problem of authentication imperfect, thus improving the safety performance of the network.
2693
Abstract: In order to reduce the workload of constructing domain ontology, this paper proposes a transformation method from thesaurus into domain ontology. We can take building the cereal crops domain ontology as an example to detail narrative of the process of the transformation and to prove the effectiveness of the ontology construction method.
2698
Abstract: Two-dimensional bin packing is encountered in various applications where small rectangular items are packed into a minimum number of large rectangular objects (bins). Aiming at an optimal area utilization, the paper presents an effective constructive heuristic approach to two-dimensional bin packing. The heuristic approach integrates ranking, placement and search strategies along with an effective handling method of the remaining areas during the packing process. In order to obtain an optimal arrangement in a given area, all items are examined for possible positions and orientations using the search strategies. In addition, an effective handling method of the remaining areas is applied through appropriate partitioning and merging to minimize waste areas. Tests with a number of standard test and real world instances have shown that the performance of the proposed approach is superior to that of other approaches published.
2705
Abstract: Recently, wireless sensor networks (WSNs) have attracted a lot of attention from the network research community, especially in the aspect of event-driven wireless sensor networks (EWSNs), such as adversary locating, fire detection and so on.As the nature of importance of event monitoring, security has to be assured in both of communication and processing. However, due to the inherent resource constraints, security inEWSNs is faceddifferent issues and challenges than traditional WSNs.In this paper, we attempt to give an outline on the security issuesin the EWSNs. And then we propose a new secure architecture for it, which covers potential security issues. In this architecture, we analyze the possible threats and give out the correspondingcountermeasures.
2711
Abstract: Federated Media Publishing means to distribute the single source content through multimedia after integrating various media manners, which is the trend of digital publishing. DITA is designed to produce multiple deliverable formats from a single set of DITA content, but it cant be directly used in Federated Media Publishing for not coping well with multimedia except for text and image. This paper takes music as an example to discuss the method of integrating multimedia into DITA. The specialization facility is used to integrate MusicXML DTDs into DITA and a solution is putted forward to provide appropriate rendition distinctions according to audio and five-line staff. Experiments show the solution is efficient to extend DITA for dealing with multimedia, which can be used in federated media publishing.
2717
Abstract: Logical formalization of emotions moves forward and develops more widely accepted and clearly defined emotion models. However, there is little quantitative analysis of emotions based on modal logic. We put forward a logic LEI to represent quantitative belief, preference and disgust. Then, event-based emotions, agent-based emotions in OCC model and their intensity are formalized by the logic.
2724

Showing 551 to 560 of 959 Paper Titles