Advanced Materials Research
Vol. 937
Vol. 937
Advanced Materials Research
Vol. 936
Vol. 936
Advanced Materials Research
Vol. 935
Vol. 935
Advanced Materials Research
Vol. 934
Vol. 934
Advanced Materials Research
Vol. 933
Vol. 933
Advanced Materials Research
Vols. 931-932
Vols. 931-932
Advanced Materials Research
Vols. 926-930
Vols. 926-930
Advanced Materials Research
Vol. 925
Vol. 925
Advanced Materials Research
Vol. 924
Vol. 924
Advanced Materials Research
Vol. 923
Vol. 923
Advanced Materials Research
Vol. 922
Vol. 922
Advanced Materials Research
Vols. 919-921
Vols. 919-921
Advanced Materials Research
Vol. 918
Vol. 918
Advanced Materials Research Vols. 926-930
Paper Title Page
Abstract: In interest-based structured P2P networks, the load unbalance problem restricts the performance of the network. To solve this problem, A Topology-based Load-Balancing Algorithm called T-LB is presented. It adopts the concept of virtual server, defines balancing domain as nodes with same interest, determine the Q value of each node according to the characteristics of the network topology, and then dynamically distribute network load based on the Q value of nodes. Simulation results show that T-LB improves the proportion of non-overloaded nodes to from 65% to 86%, reduces the average information query delay, and improves the performance of the network.
2198
Abstract: This paper presents the video image acquisition, transmission and display using wireless Internet network between two heterogeneous operating systems. First of all, the design of video acquisition system is designed. Based on V4L2 standard, the video acquisition program is devised. Secondly, by using the method of network programming, the design of network communication is completed based on TCP socket. Finally, based on OpenCV database, the image display interface is realized using MFC technology. The experiment shows that the designed system can realize image transmission between two different operating systems.
2204
Abstract: With the rapid development of Internet technology, a variety of Web data also grows at an alarming rate, which has brought great challenges for the traditional data access and storage . Distributed caching technology based on cloud computing nodes provides a storage service with high performance through a large cloud caching service.Distributed cache system in each cache server coordinates and works together effectively to realize the sharing of resources, which is an important means of cloud-based storage platform to improve application performance of the cloud.
2208
Abstract: A wireless networking method for smart agricultural facilities was proposed in this paper. As ZigBee was a short distance, low complexity, low power cost, low data rate and two-way wireless communication technology, the wireless networking method was based on ZigBee. Network topology, hardware and software were designed in the paper.
2213
Abstract: Setting-up large-scale VPN network becomes an important task, VPN has been attracted extensibe attention of business subscribers. In one speak, VPN technology is very complicated, it involves in communication technology, cryptography, authentication technology, it is an interdisciplinary. Tunnel technology is a key technology to set-up VPN network. In the port of host LAN and Internet, the data is packed in a pattern that can transport in Internet , in object LAN, the data is decompression and can use it . Give a simple analysis of the tunnel technique from the development of tunnel technique, to know the security technical of the setting-up large-scale VPN.
2217
Abstract: Constructing and updating model from blog is also the process of topic detection and tracking, then, a detecting method of topics on blog based on model is proposed. It includes the use of measuring method Based on the event information to cluster for post and topic information to cluster event set (blog) which is combined with semantic vector space model, the use of the main idea of information granularity of topic detection and tracking algorithm has to be used and improved in order to generate the final clustering. The experimental results show that the algorithm has an accurate result in blog topic detection
2221
Abstract: Chinese garbled is a common problem in developing with PHP and MySQL. This paper analyzed and discussed the reason of Chinese garbled, and given the solutions.
2225
Abstract: Cognitive radio (CR) is a promising technology which has the potential to utilize the scarce spectrum resources with high flexibility and efficiency. It’s well accepted that cooperative spectrum sensing (CSS) with numbers of cognitive users (CUs) located in a wide geographical area can achieve much better sensing performance. However, some CRs may misbehave and provide false sensing information in order to deteriorate the system’s performance. This misbehavior is known as spectrum sensing data falsification (SSDF) attack. In this paper, we propose a secure spectrum sensing scheme using peer-assessment to detect malicious CUs and filter their spectrum sensing results out of the final decision making process. The robustness and efficiency of the proposed scheme are verified through extensive computer simulations in presence of SSDF attacks.
2228
Abstract: Public opinion analysis of the current system are generally aimed at one industry or the whole Internet, which led to excessive depth of lack of depth, to the subject of an Internet event information for in-depth analysis of public opinion. Through this research results, can public opinion to a specific event information for in-depth analysis of the multi-dimensional, the use of such public opinion analysis system for Government or large companies found that people focus on specific subject matter, social relations and events that exist within some hidden, Realization of the principle of association rules based on the analysis of social relations, and analyzed by both the support and confidence of the community property of the relevant entities, the module can be more accurately identify potential events related to the page through social entity-relationship of the mining algorithm social relations and can be used as recommendations for Government or corporate decisions, related technical research in the field to have some reference value.
2233
Abstract: Currently, China is in a key period of social development, college highlights various contradictions, frequent emergencies. In the network envrionment, college emergencies can easily evolve into a network group events, so that universities emergencies become more complex. Accurately grasp the evolution of college emergencies occurring causes and mechanisms have positive significance to further strengthen the construction of the university system, standardize the behavior of colleges and universities to improve the emergency response capabilities.
2237