Advanced Materials Research
Vol. 937
Vol. 937
Advanced Materials Research
Vol. 936
Vol. 936
Advanced Materials Research
Vol. 935
Vol. 935
Advanced Materials Research
Vol. 934
Vol. 934
Advanced Materials Research
Vol. 933
Vol. 933
Advanced Materials Research
Vols. 931-932
Vols. 931-932
Advanced Materials Research
Vols. 926-930
Vols. 926-930
Advanced Materials Research
Vol. 925
Vol. 925
Advanced Materials Research
Vol. 924
Vol. 924
Advanced Materials Research
Vol. 923
Vol. 923
Advanced Materials Research
Vol. 922
Vol. 922
Advanced Materials Research
Vols. 919-921
Vols. 919-921
Advanced Materials Research
Vol. 918
Vol. 918
Advanced Materials Research Vols. 926-930
Paper Title Page
Abstract: As a new business transaction model, the rapid development of electronic commerce breaking the limitations of time and space, beyond the existing market economy and created a unique invisible market among consumers, businesses and government. This will bring more business opportunities for enterprises, and also provide consumers with a more convenient way of consumption.But at the same time,it will give the traditional trade rules and regulations a powerful bad impact.E-commerce trading environment has some features such as virtualization, mobility, technical and non-regional, etc.And all these place the consumer in a position of disadvantage or vulnerable. The disputes and risks under the traditional trade did not disappear with the development of high technology, but also make a greater challenge on consumer protection. Therefore we can say that the rights of our consumers in the e-business model should be extremely fragile and in urgent need of a helping hand of the law.
2610
Abstract: The simulation and modeling data used in this paper is based on 3GPP TS 36.104 protocol. We conduct the MATLAB simulation and analysis of the model which there are nine paths researching the MS after the effect of multipath in different attenuation coefficient and the delay time, finally implement multipath delay using FPGA based on FIFO and RAM respectively. It should be noted that we can choose FIFO or RAM method flexibly according to specific situation.
2614
Abstract: For the "hot spots" problem caused by the number of replica could not satisfy the soaring request from users, we present a Cloud Computing storage resource replica dynamic scheduling scheme based on HDFS. There are two sub algorithms which is the number of replica dynamic adjustment algorithm and replica placement algorithm. This scheme could improve system stability and file access through put. The experiment result shows this optimized scheme lower the access delay obviously than the original scheme with some cost of storage resource and network workload. For the problem of metadata management, this paper introduced a distributed metadata management scheme. This scheme distributed metadata into several name node according to their ability, and provides an efficient inquiry algorithm for metadata to improve system availability and reliability. The experiment result shows the multi-name nodes system with this metadata management scheme could improve the performance than the original system facing the huge metadata operation requests.
2618
Abstract: With the rapid development of Internet technology, network transactions are in increasing breadth and depth. Online trading market transactions as a new way to bring great economic benefits to society, but also to enter into the market for traditional legal face great challenges. Network of consumer protection in the transaction there is no protection of personal privacy, personal property, security risks, right, fair trading rights (the main form of contract) damages, rights have been infringed. In this paper, comparative research methods, introduced online trading, online trading, e-commerce and the difference between the three links to the special nature of the transaction through the network analysis and network transaction concrete manifestation of consumers 'interests to explore our network Trading in consumer protection are the main problems facing the proposed line with China's national conditions and consumer rights protection network transactions legislative proposals.
2622
Abstract: Wireless Ad Hoc network routing algorithm is one of the core technologies of wireless Ad Hoc networks. Ad Hoc network is dynamic topology on characteristic, mainly reflected on the network node number and node movement, which lead to network topology changes, in order to study the Ad Hoc network size and topology changes influence on packet delivery, time delay and routing control, through experiment it is concluded that, the dynamic source routing protocol is an ideal choice.
2626
Abstract: Sensor technology is the key technology in industrial application and scientific research. With the progress of microelectronics technology, computer technology and communication technology, determining how to connect various sensors and various networks freely becomes a new problem in the field of sensor application research. In this paper, first I introduced several important modules that IEEE 1451 standard has defined, then I analyzed concepts and models of intelligence sensor interface in IEEE 1451. Finally I build a model which is more suitable to wireless sensor network.
2630
Abstract: As digitization, networking and information technology are the three main characteristics of the 21st century, e-commerce is growing at an unstoppable momentum and popularity worldwide development, which offers a global trading environment, greatly improves the communication speed, saves management links overhead and reduces the cost of doing business. The development of the Internet and wireless communication has brought a tremendous impact on our lives.With it’s rapid spread of mobile phones which has a function of Internet access features, people can connect the Internet to obtain information through a computer, a mobile phone to easily exchange communication anytime, anywhere by wireless. Because people need to work and live, and they hope they can send and receive e-mail anytime, anywhere to access news, stock information, order a variety of much-needed goods and that is the realization of the mobile e-commerce. So a new e-business models have emerged--mobile e-commerce, namely combine the use of mobile communication network and the Internet to make e-commerce activities, and is an important service to provide users with mobile Internet.
2634
Abstract: To solve the problem of optimizing node deployment of wireless sensor network for urban traffic informat ion acquisit ion, a constraint optimization model for wireless sensor network node deployment was proposed. Both the comprehensive evaluation function for connectivity and coverage and the restriction on the practical demands of connectivity and coverage are used. The constraint optimization model is converted to unconstraint one using penalty function. The particle swarm optimization algorithm is used to solve the problem. The dynamically changing weight method is used as an improved algorithm to avert the premature convergence. Sensors inside the Second Ring Road in Beijing are taken as examples in simulation experiments. Experiment results indicate that compared with initial manual deployment the evaluation function value has been increased by 1.71% and 3.18%, respectively after using particle swarm optimization and its improved a lgorithm. The results show that the proposed algorithms have the ability to improve the node deployment of wireless sensor network in urban traffic information acquisition.
2638
Abstract: As the rapid development of social informatization, software reliability and security are highly required. Only applying high-quality software products can increase work efficiency. Quality is the life of software. How to enhance the quality of software products and how to use effective quality management method is an urgent need. This paper discuss the key point of software engineering and software quality management, and this is the basis of software quality ensurance model.
2642
Abstract: The development of information technology into the areas of military technology which will impact importantly on the future battles. The comprehensive understanding and mastering the role of information technology in combat and combat theory which better the properties of information on command and control systems performance greatly improve the joint operational capability.
2646