Advanced Materials Research
Vol. 1001
Vol. 1001
Advanced Materials Research
Vol. 1000
Vol. 1000
Advanced Materials Research
Vols. 998-999
Vols. 998-999
Advanced Materials Research
Vol. 997
Vol. 997
Advanced Materials Research
Vol. 996
Vol. 996
Advanced Materials Research
Vol. 995
Vol. 995
Advanced Materials Research
Vols. 989-994
Vols. 989-994
Advanced Materials Research
Vol. 988
Vol. 988
Advanced Materials Research
Vols. 986-987
Vols. 986-987
Advanced Materials Research
Vols. 984-985
Vols. 984-985
Advanced Materials Research
Vol. 983
Vol. 983
Advanced Materials Research
Vol. 982
Vol. 982
Advanced Materials Research
Vol. 981
Vol. 981
Advanced Materials Research Vols. 989-994
Paper Title Page
Abstract: Big data is an emerging concept in the field of computer and E-government recently,but research institutions and scholars have different opinions in the content and understanding of big data.In the era of big data,E-government is facing great challenges and tests,and the processing of complex data in the era of big data will become the main theme of the development of E-government in our country.Through analyzing processing mode of big data,and on this basis,this thesis discussed the influence of the era of big data on the development of E-government,in order to find an effective path under the mode of big data to develop E-government.
4717
Abstract: The network bandwidth has been expanded after EPON(Ethernet Passive Optical Network ) came.So a topology management for EPON System is needed.In this paper, methods of topological data collection is analyzed, the form of topological data structure object is designed , and topological structure is displayed in the terminal by coding. With introducing in improved memory object and caching techniques, system performance was significantly improved through experiments.
4723
Abstract: This paper analyzes the current MAC layer protocol for wireless sensor networks based scheduling, according to the transmission of mine environment signal needs, around the traditional CSMA / CA technology, a scheduling algorithm is proposed adjustment factor based on the contention window to more effectively avoid data collisions at the MAC layer transmission process. In order to ensure more equitable sharing of all nodes in wireless link bandwidth. Simulation results show that the algorithm can effectively improve the information in the MAC layer transmission reliability.
4727
Abstract: Operating system (OS) scanning makes it possible to focusing further attacks to known weaknesses of that system. The principle of OS scanning is that different OS vendors may make different implementations for the TCP/IP protocol in their OS products. IP, UDP and TCP as well as application layer protocols are can be used for OS scanning. These methods can be used in active ways sending probes to the targets or passive ways only listening without probes. Totally, whether it used in an active or passive way, the essence for OS scanning is analyzing the characteristics of the packets sent by the targets and matching the characteristics with certain operating system. So, in some cases, we need two or more of these methods together to determine the type of the OS for the target.
4733
Abstract: With the rapid development of Internet of things, IPv6 has been introduced into wireless sensor networks and widely used in many areas. It is significant to develop routing devices to connect wireless sensor networks and the Internet based on IPv6 technology. In this paper, we present a 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks) border router scheme. The hardware design and software design are discussed and the experimental results demonstrate the feasibility of the router scheme. By using the proposed border router, the network can achieve end-to-end communications between 6LoWPAN nodes and IPv6 hosts in a universal method.
4737
Abstract: Data collection is the first step in handwritten character recognition systems, and the data quality collected effects the whole systems efficiency. As the necessary subsystem of on-line handwritten character/word recognition system, a Uyghur handwritten character collection system is designed and implemented with Visual C++ based on the nature of Uyghur handwriting. Uyghur handwritings is encoded by 8 direction tendency and stored in extension stroke file. And they are collected based on the content of Text Prompt File. From experimental results, it can be concluded that the handwriting collection system indicates its strong validity and efficiency during the collection of Uyghur handwriting.
4742
Abstract: This paper takes project management information systems as the main object of studying,it applies the theory and means of Project Management Knowledge System,and the specific features of construction project management on the research. It makes detail analysis and deep study to the application of WBS for project management and construction project information classification system.
4747
Abstract: How to prevent illegal users from sharing system resources was one of the main purposes for MAGNET Security Group. This paper introduced some major access control models such as traditional access control models, role-based access control model (RBAC), task-based access control model (TBAC) and role-task-based access control model (T-RBAC). In the end, a feasible scheme PN_T-RBAC was proposed at the base of the T-RBAC model in existence, which was suitable for the coalition environment of personal networks.
4751
Abstract: In this paper, a trust model based on real-time behavior detection scheme was proposed in P2P file-sharing system. It solved the problems in computing trust value only by past performances and choosing service nodes improperly. It took real-time behavior detection both in trust computing and service choosing, improving the accuracy of the trust value and the rationality in service nodes choosing. The experimental results proved the advantage of this scheme.
4755
Abstract: ZigBee technology is mainly used in short distance, low power consumption, low rate, low complexity of equipments for data transmission. When image has a large amount of data, it should be processed firstly, and then transmitted. This essay makes a research on healthy care system, using CMOS camera to get image and compress image. Then, the compressed image is transferred to ARM processor, and divided into data packets according to the requirement of the ZigBee network transmission. Finally, the image is transferred to control center and displayed. After the final test, this system can get images to meet the requirements, which has some practical values.
4759