[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 11 Dec 2024Bibliometrics
research-article
Contents
research-article
research-article
The Design and Implementation of Intelligent Microgrid Monitoring System Based on WEB

With the development of Internet and information technology, the traditional Microgrid environmental monitoring system operation is not stable. This paper designed an intelligence remote monitoring system based on Web. The system used B/S architecture ...

research-article
Parallel Computation of Ground Radiation Simulation Based on GPU

This paper introduces a simulation calculation model of ground radiation field. The simulation calculation model includes the calculation of incident radiation field and the calculation of outgoing radiation field. The calculation of incident radiation ...

research-article
Twin Odd-graceful Trees Towards Information Security

We design cryptographical graphs for information security by the following principles: (1) be used conveniently in usually; (2) with strong security, that is, it is difficult to be broken; (3) there are enough graphs and labellings for making desired ...

research-article
Application of Secret Sharing in XML Protection Mechanism

In order to better protect the data in XML document, a novel method is presented for the XML (eXtensible Markup language) tree structure, which is based on Shamir's secret sharing about polynomial interpolation. In this paper, according to purpose-based ...

research-article
Searching Forward Complete Attack Graph Generation Algorithm Based on Hypergraph Partitioning

Attack graph is an effective method for network vulnerability analysis, existing methods of attack graph cant meet the requirements of the dynamical analysis of the large-scale complex network. In this paper, we proposed a searching forward complete ...

research-article
A Study on the Factors about Customers Acceptability to Airline Ancillary Products

With the development of low-cost airlines around the world and the background of profit falling, many airlines were trying to find new profit model, which make the concept of airline ancillary products popular. The paper put forward the integrated model ...

research-article
An Improved Rainbow Table Attack for Long Passwords

The password recovery of popular encryption applications has great practical significance not only for the circumstance of retrieving forgotten password but also for assisting law enforcement officers to implement data forensics. In this paper, we ...

research-article
The Design of Agricultural Machinery Service Management System Based on Internet of Things

By installing the remote monitoring terminal on the large-scale intelligent agricultural machinery and developing the related mobile application software and server software,the agricultural machinery service management system can help those special ...

research-article
The Current Status and Future Perspectives of Virtual Maintenance

Virtual maintenance, which is widely used in aerospace, automobile, military equipment, etc., has been given abroad attention among equipment life-cycle including concept definition, system design, component production, daily operation, troubleshooting, ...

research-article
Measuring Broadband Internet Performance in Nepal

Broadband Internet performance either Fixed or Wireless has not been studied in details from the view of customer; though, broadband internet savors wide penetration in Nepal. Till now to the best of our knowledge that no independent analysis has been ...

research-article
High-speed Train Axle Temperature Monitoring System Based on Switched Ethernet

China railway transportation is developing rapidly, the running speed of high-speed train is promoted. As the promoted speed, the running gear and gearbox of high-speed train produce more heat, causing hot axle easily. In view of the hot axle phenomenon ...

research-article
Research of An Intelligent Experimental Teaching Platform Based on Internet

Experimental teaching is an important link of cultivating students innovation ability and practice ability, and is also a good platform for applying the abstract theoretical knowledge to practice. However, the deficiency of teachers and experimental ...

research-article
A Warm-CDP Backup System

We lived in a world of data. Data can be created and used continuously across an organization[1]. For us, how to ensure the availability of data and protecting it from out of use is the challenge we need to face. Recently,Continuous Data Protection is ...

research-article
Robustness Analysis Model for MADM Methods Based on Cloud Model

MADM method is the basic theory for Effectiveness evaluation. The fuzziness of methods and uncertainty of data have a crucial influence in making optimization decision. How to quantify the influence is an important theoretical problem that needs urgent ...

research-article
Describing the Information Spreading on a Small-world Network Based on State Space

The investigation about the information spreading in a network has been described by the ODE dynamic system excellently. It has given a direct explanation to the statistic tendency on result. However it doesnt give enough information about the ...

research-article
Web Topic Analysis of the Two-child Policy in China

Since the Two-child Policy was enacted by The Chinese government in October 2015, two children in a family have become an important question related to people's livelihood and have triggered a wide discussion. As an important platform to discuss and ...

research-article
Research on Web services-based Extenics Aided Innovation System

Researches in the Computer Aided Innovation System based on Extenics are very few, and we have developed the Web service-based Extenics aided innovation system according to the Extenics innovation process, meanwhile, we introduce the specific detail of ...

research-article
Research of the Hardware Architecture of the Geohazards Monitoring and Early Warning System Based on the Iot

For the need of improving the capacity of the geohazards monitoring, a professional monitoring system has been developed based on the Internet of things, WSN (Wireless Sensor Network) and network communication technology. The system consists of wireless ...

research-article
Numerical Simulation of Square Section Venturi Scrubber with Horizontal Spray

In order to improve of tar removal efficiency of venturi tube, the authors synthetically analyzed a variety of tar removal methods, put forward square section venturi scrubber with horizontal spray for removing the tar from the gas, modeled the tube ...

research-article
A New Framework on Regional Smart Water

Smart water is the development trend of water information. After analysis of the current key issues of water information, such as construction is not intensive, data resources need to be integrated, business collaboration is not enough, a new overall ...

research-article
A Method for Group Animation Based on Artificial Life

The hierarchical group animation system model is deeply discussed by introducing the theory of artifical life. In order to effectively display the group animation and real time control, it adopted the control method with packet as the unit by ...

research-article
Facial Expression Recognition with Faster R-CNN

In order to avoid the complex explicit feature extraction process and the problem of low-level data operation involved in traditional facial expression recognition, we proposed a method of Faster R-CNN (Faster Regions with Convolutional Neural Network ...

research-article
Target Detection Method Before Tracking based on Particle Filter

infrared dim target detection and tracking technology is one of the core technologies in infrared imaging system, and also a hot research topic. When the SNR is low, the tracking technique has a unique advantage. This paper studies the algorithm of ...

research-article
New Graphic Password Scheme Containing Questions-Background-Pattern and Implementation

Security of authentication is needed to be provided superlatively to secure users personal and exchange information since online information exchange systems have been developed according to internet speed. Therefore, the aim of this paper is to develop ...

research-article
Coordination Dispatch of Electric Vehicles Charging/Discharging and Renewable Energy Resources Power in Microgrid

A large number of distributed powers access to the distribution network have a multifaceted impact on the power grid, while microgrid is an effective way to solve the impact of distributed generation on the power grid. In microgrid, the proportion of ...

research-article
Locality of Some Optimal Ternary Linear Codes

A code whose every codeword symbol can be recovered from other certain symbols is called a locally repairable code (LRC). The locality of a locally repairable code for a distributed storage system is the number of nodes that participate in the repair ...

research-article
Research on Human-computer Interaction Technology of Wearable Devices Such as Augmented Reality Supporting Grid Work

This study is based on speech recognition and interaction, augmented reality, the movement of the head gesture interaction interactive technology, human-computer interaction system is designed to meet the power equipment installation, operation and ...

research-article
Automatic Security Analysis of EPCBC against Differential Attacks

It is necessary for us to evaluate immunity against differential attacks when designing secure block ciphers. Finding the lower bound of active S-boxes is an effective method. Based on MILP, we use an improved method to analyze EPCBC. EPCBC is an ultra-...

Comments

Please enable JavaScript to view thecomments powered by Disqus.