Advanced Materials Research
Vol. 773
Vol. 773
Advanced Materials Research
Vol. 772
Vol. 772
Advanced Materials Research
Vol. 771
Vol. 771
Advanced Materials Research
Vol. 770
Vol. 770
Advanced Materials Research
Vol. 769
Vol. 769
Advanced Materials Research
Vol. 768
Vol. 768
Advanced Materials Research
Vols. 765-767
Vols. 765-767
Advanced Materials Research
Vol. 764
Vol. 764
Advanced Materials Research
Vol. 763
Vol. 763
Advanced Materials Research
Vols. 760-762
Vols. 760-762
Advanced Materials Research
Vols. 756-759
Vols. 756-759
Advanced Materials Research
Vols. 753-755
Vols. 753-755
Advanced Materials Research
Vols. 750-752
Vols. 750-752
Advanced Materials Research Vols. 765-767
Paper Title Page
Abstract: Introduced a kind of based on CAN bus, to realization of artificial climate chamber environment data acquisition system. System adopts SJA1000, PCA82C520 as interface devices, the host through the CAN bus runs around in the culture room of all CAN nodes, each node through the installation of various sensors on plant growth environment factor for information collection and transmission. System has a good real-time performance, low running cost, easy to build, has broad application prospects.
1693
Abstract: At present, software process integration is a hot research issue which aims to improve software development. Thus, our team was organized to research this topic and proposed a cube for integration among different Classifications of processes. Nearly two years ago, we chose the integration of PSP and Agile process as our first sub-direction and showed some conclusions in [1. During the past two years, we got more findings in the research guided by systematic review method. As we all know that, agile process is a light-weight development process which is useful for managing unexpected changes while PSP is a typical plan-driven process which provides a disciplined way to develop software. Although they are distinct from each other, we find that PSP and agile process could complement each other.
1697
Abstract: Aimed at the comprehensibility, reusability and maintainability, the thesis presents the reverse model recovery for the legacy code developed by TTCN-3. It can also help tester and maintainers to verify the test implement, etc. The thesis introduces the discovery of invocation model and dynamic test configuration model based on the reverse model discovery system framework.
1704
Abstract: We research the issue of traffic signals scheduling, based on the use of real-time traffic information gathered by a wireless sensor network. In this paper, an optimization on traffic signals sequence scheduling has been put forward, which can be achieved based on the instant traffic data collected in the dynamically traffic environment. Afterwards, simulations have been conducted in several scenarios, and show that the proposed approach can achieve better performance in terms of traffic throughput.
1709
Abstract: Combining RFID and LBS technology, this paper discusses a survey conducted for developing a Car Locator system which can provide help to users to quickly find their vehicles in a large parking lot, and the system architecture and a prototype is developed from the survey results.
1713
Abstract: Traditional paper labels on the supermarkets shelves are of many shortcomings such as the high error rate, high losing rate, increasing cost and unrealizable realtime-updating caused by manual management. In order to overcome these shortcomings, this paper aims to design a new Electronic Shelf Label system. Firstly, the overall framework is introduced. Then an ultra-low-power ESL and wireless communication base station modules are studied respectively. The MAC and router protocols are also designed based on Wireless Sensor Network (WSN) to meet the requirement of low power consumption and real-time price update. The Electronic Shelf Label system can improve the efficiency of the label management greatly and enhance customers experiences thus has a wide prospect of application.
1718
Abstract: The direct touch interaction is considered as an important part of natural human-computer interaction and has become one of the hotspots in recent years. However, current touch interactive designs still rely on traditional WIMP paradigm seriously. To prompt and develop a dedicated user interface for direct touch interaction, in this paper, we explore the interactive features of the touch user interface through statistical analysis method. We classify and summary on the components of user interface from three current mainstream mobile platforms, further abstract the components for touch operation paradigm and finally propose an interactive paradigm based on the Post-WIMP environment: PWIG (Page/Frame, Widget, Icon/Button and Gesture) paradigm. After the evaluation of PWIG paradigm, we think PWIG paradigm is more suitable for direct touch interaction and should guide the design of the natural user interface for direct touch systems.
1722
Abstract: Security and privacy is always the most important issues by the public in the Internet of Things. The core problems are associated with the diversifying of the Internet towards an Internet of things, and the different requirements to the security level for application. Therefore, this paper is to put forward an authentication model and protocol to cope with the problem. The protocol is adopted with attribute-based encryption to replace the traditional identity-based encryption (IBE), and then make formalization analysis to the security of the protocol by using BAN logic.
1726
Abstract: This paper presents a generic solution to guarantee the QoS of data network based on SDN control. This mechanism, called first detection and then ECMP switching (DES) has two points. The first one is sending specific control message periodical to detect out of order status of data flow. The second is switching the routing paths in variable periods according to the flows out of order proportion and QoS level. The mathematical analysis and simulation results both show DES good performance on guaranteeing the networks quality of services. And DES can be widely used in the SDN controlled data networks.
1730
Abstract: Since the traditional methods of identity authentication cant attest safety from one platform to another, they cant be applied in classified environment. This paper proposes a multi-factors identity authentication scheme which is used for network storage in classified environment; the scheme installs a TCM (Trusted Cryptograph Module) chip on the client as well as authentication server, and makes full use of the features of the TCM to ensure the platform on both side and the entire process of identity authentication can be trusted.
1734