Proceedings of the International Conference on Advances in Mechanical Engineering and Industrial Informatics

Session: Networking, Communications and Security

41 articles
Proceedings Article

Implementation of a Network-wide Time Synchronization Strategy for WirelessHART

Sheng Zhang, Zhongsheng Xiang, Jie Chen
WirelessHART is an international wireless communication standard proposed by HART Communication Foundation. As a crucial technique for wireless networks, time synchronization plays an important role especially in WirelessHART networks. For constant and reliable communication, it is necessary to provide...
Proceedings Article

Blind Spot Detection Algorithm of Random Deployment WSN Research Based on Voronoi Diagram

Lijn Gao, Hang Yin, Yuhua Wei, Le Wang
In this paper we mainly researchthe coverage problem of WSNwhich is deployed by the UAV according to the pre-established track under themajor disaster environment. Because the deployment regionis uneven and buildings may change at any time, the blind spot will beproducein the deployment process.To overcome...
Proceedings Article

Security Solution Based on WSO2 IS

Yuanyuan Xu, He Yang
this document introduces the requirement of identity management in business and the enterprise product WSO2 Identity Server, as well as the key components: Inbound authentication, Authentication framework, Local authenticators, Federated authenticators, Provisioning framework and IdP and SP configurations....
Proceedings Article

Distributed Fuzzy Sets-based Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Shao-Juan Xu, Hai-Xia Yu, Li-Qiang Diao, Zhong-Gao Sun
Clustering provides an effective way for data gathering in wireless sensor networks. In this paper, a new distributed clustering algorithm called DFSC that maximizes lifetime for energy heterogeneous wireless sensor networks is proposed, in which the cluster head selection approach is based on the concept...
Proceedings Article

Research on Sliding Window Uplink Frequency Domain Scheduling Scheme in LTE-A

Hongxia Xiong, Zhitao Yang, Na Du, Kewen Liu
In order to advance the transmission data rate and meet the traffic needs of users, the higher requirements for wireless communication system radio resource management was put forward by mobile operators. Meanwhile, considering lower rate radio resource utilization resulted from unreasonable particle...
Proceedings Article

Method for Presenting Danger Signals Based on System Balance

He Yang, Si Xiong
The second generation Artificial Immune Systems based on Danger Theory are not limited to distinguish Self/Nonself. Instead, the Danger Signals generated when systems are threatened, for this reason, the problems of high training costs and low coverage are effectively avoided. The definition and presentation...
Proceedings Article

Multidimensional Analysis Model for Network Information Dissemination

Cong Liu
With the rapid development of social information technology and the rapid expansion of information quantity, every day people have to face a wide range of information resources. How to use these resources with high frequency, high efficiency and high quality, and how to better play the advantages of...
Proceedings Article

Study on Classification of EEG Signals Based on Wavelet Transformation and BP Neural Network

Zhulin Yu, Bing Zhao, Jie Liu, Mingtao Yu, Ling Xu
The method of wavelet transformation and BP neural network for classification of epileptic intermission and epileptic attack signals was studied. The discrete binary wavelet transformation of EEG signal was carried out with db4 wavelet function. The third to fifth level signals by reconstruction and...
Proceedings Article

A Novel scheme of the Secure Campus Network

Lei Ao
With the extensive application of computer and the increasing popularity of the Internet, multi-data processing equipment are combined with each other, and this combination forms an increasingly huge information service platform. With the guiding principal of high reliability, high security and high...
Proceedings Article

Research on Security Strategy of Electronic Commerce Industry Websites

Songjie Gong, Ya Wang
Recently, scholars and specialists in the field of electronic commerce have generated a compelling list of website attributes that engender trustworthiness. The introduction of new information technologies has always been accompanied by security concerns, and the future of electronic commerce depends...
Proceedings Article

Study on the Information Security based on E-Commerce

Yu-qiao Meng
With the progress of economic globalization and information technology, e-commerce also has made a fast development. Meanwhile, the information security in e-commerce industry is becoming more and more important. This paper described information security issues existing in e-commerce, and provided technology...
Proceedings Article

The Communication Design of the Optical Fiber Reflective Memory Network in the Semi-physical Simulation System of the Laser Beam Rider Guidance Missile

Tianpeng Yu, Yongbo Chen, Jinlinag Li
This paper introduces to set up an optical fiber reflective memory network, which needs the high transmission rate and the low data transmission delay in the data transmission process, in the semi-physical simulation system of the laser beam rider guidance missile because of the needs of the system....
Proceedings Article

A novel clustering-based anonymization approach for graph to achieve Privacy Preservation in Social Network

Huowen Jiang
Serious privacy concern rises with the prosperity of social network applications. To prevent the privacy of vertices or edges associated with entities in a social network from getting re-identified through background information or queries,a novel clustering-based approach is proposed to anonymize vertices...
Proceedings Article

Network Traffic IMF Selection Method Based on EMD

Xiuli Du, Yasheng Sun, Shaoming Qiu
Empirical mode decomposition is an advanced time-frequency analysis method, but it will produce a few invalid components in the process of decomposition. For this problem, the paper proposes a nonlinear correlation coefficient method that is based on the average mutual information. The method can get...
Proceedings Article

Using reciprocity theorem to analyze R-2R network DACs

Rongke Ye, Yonglu Wang, Rongbin Hu
Reciprocity theorem is proposed to design and analyze R-2R based DAC, which can make the complicated design and analysis of R-2R based DACs simple. The detail of how to use reciprocity theorem in the design and analysis of R-2R based DAC is given. The 14-bit DAC designed by Reciprocity Theorem has performances...
Proceedings Article

The Design of Android System Based on Instant Communication Software

Yuxiang Mu
In this paper, taking Android system as the operating platform, the design of a high quality can be text voice and video communication real-time communication software,in connection with the network conditions, can achieve instant communication between all users of Android system. This design can achieve...
Proceedings Article

The Novel Channel Estimation Algorithm Relying on ELM

Qingfeng DING
An Extreme Learning Machine (ELM)-based novel channel estimation algorithm is proposed for orthogonal frequency division multiplexing (OFDM) communication system with multi-path propagation characteristics. In addition, a low-pass filter is utilized to filter the noise components which are separated...
Proceedings Article

Research on 3D Wireless Sensor Networks Energy Saving Routing Algorithm

Zhanguo Li, Jianxi Wang, Xingwei Wang
In this paper, the energy saving 3D wireless sensor networks Iterative Split Clustering Energy Angle Routing (ISC-EAR) algorithm will be proposed and also discuss the design and calculation process in theory. The simulating calculation under different topology, compared with the baseline algorithm the...
Proceedings Article

A Sound Masking Signal Generation Method Based on Chinese Pronunciation Characteristics

Xiaofeng Ma, Peng Zhang, Qiuyun Hao, Xiaoxia Chen, Yanhong Fan, Jingsai Jiang, Ye Li
Sound masking is a technique to protect the speech privacy of confidential talks in a room. Most of the existing masking signals sometimes become noise sources, and result in a negative impact on the people in the room. This paper proposes a new method for generating masking signals. The synthesis of...
Proceedings Article

LMS&BRLS Interference Suppression for Spread Communications

Xin-Quan Luo
A LMS predictive & Blind RLS code-aided technique for simultaneous suppression of multiple-access interference (MAI) and AR narrow-band interference (NBI) in direct sequence-code division multiple access (DS-CDMA) systems is proposed. This technique is based on combining predictive and code-aided approach,...
Proceedings Article

Complex Blind Interference Suppression for CDMA System

Xin-Quan Luo
To solve the problem that traditional LMS predictive technique is sensitive to complex white Gaussian noise and traditional blind LMS code-aided technique can’t reject sinusoidal tone interference in code division multiple access (CDMA) system, a new blind LMS predictive code-aided technique is proposed....
Proceedings Article

Power Allocation by PSO in MAC

Jingxi Zhang
The capacity of Additive White Gaussian Noise (AWGN) Multiple Access Channel (MAC) can be approached by means of power allocation. The MAC can be regarded as single user multiple level coding and modulation system by applying pulse amplitude modulation to the individual signal and superimposing the weighted...
Proceedings Article

Research on Wireless Sensor Network Module Based on IPv6

Yiwei Wang, Mingyue Zhai, Yue Zhang
It is very important to develop concentrator, router, hardware and software of wireless module in networking of power information collection system. In this paper, the hardware and software of module are researched and designed in electricity information collection system based on IPv6 wireless sensor...
Proceedings Article

Security Classification-Based Access of Power Information System

Yanshuai Zhao, Yang Qian, Ruizhong Chen, Hongxia Ma
Security and privacy are widely recognized as important requirements for access and management of power information system data. In this paper, we argue that power information system data need to be managed with customizable access control in security classification dimension. We present a role-based...
Proceedings Article

Research on a kind of energy interconnection communication network architecture based on the technology of SDN

Fengjie Sun, Yanhong Xu, Geng Zhang, Xi Liu
In this paper, we make use of the software defined network (SDN) technology’s characteristic of separating the function of forwarding and control to concentrate control function in the control layer (comprised by SDN controllers), and design a kind of communication network architecture for energy interconnection....
Proceedings Article

Design of a New Multi-band Compatible Microcosmic Fractal Dipole Antenna Used in Mobile Communication

Bin Lin, Danyang Qiao, Guopeng Kou, Binze Chen, Zhengzeng Wang, Qiaoli Zhu, Xian Chen
Mobile communications, which could support multi-band, multi-standard and multi-mode wireless communication technology, is one of the most important applications of wireless technology. It’s the core technology for the future development of Chinese wireless communications applications. This paper focuses...
Proceedings Article

A Cross Traffic Estimate Model for Optical Burst Switching Networks

Yujue Wang, Dawei Niu, Weibo Yu, Hai Wang, Zhichao Mi, Dong Cao, Lei Zhang
The cross traffic intensity of the optical burst switching network is a key parameter for the edge node operations. This paper provides an estimate model for edge nodes to infer the cross traffic on the control plane of the bottleneck core node. A normal M/D/1 and a special M/G/1 queuing model are applied...
Proceedings Article

Bifurcation control in a small-world network model via TDFC

Lina Ma, Dawei Ding, Tianren Cao, Mengxi Wang
In this paper, we analyze Hopf bifurcation phenomenon in a nonlinear small-world network model with time delay and fixing probability.By choosing time-delay as a bifurcation parameter, we obtain that the model exhibits of Hopf bifurcation when time delay passes through a critical value. In order to control...
Proceedings Article

Research on Key Technologies of Geospatial Information Services Application Based on Grid

Huijuan Zhang, Li Qiao, Wenqian Jiang, Jinping Li
The characteristics of diversity, dynamic, heterogeneity, massive data volume and distribution of geospatial information under internet environment are challenging the traditional geospatial information services. The appearance and development of grid computing provide a reliable environment for the...
Proceedings Article

The Research of Trusted Security Architecture of MANET Node Based on OPNET

Zhen Zhang
MANET has been widely used in some special application scenarios, but because of its own characteristics lead to less secure and easily be attacked, resulting in significant losses. In response to this situation, this paper proposes a new trusted security architecture of MANET nodes based OPNET. Borrowing...
Proceedings Article

Research on the WBAN structure based on LEACH Protocol

Jing-Jing Zhang, Xin Feng, Yan-Long Wang, Teng Li, Wen-Long Yang
WBAN, as an important application aspect in the wireless sensor network, has a favourable application prospect in biomedical field, which can provide real time monitoring and health nursing for patients. Therefore, it requires a higher efficiency and better reliability on medical data transmission in...
Proceedings Article

Long-distance signal transmission cable interface feature extraction and recognition

Xiaobo Wang, Yeshuang Tan, Huixian Sun, Shusong Ren
To improve the long-distance transmission cable interface test automation level, proposed feature extraction based on the type of adaptive signal recognition technology. Through various types of interface signals in time domain and frequency domain characteristics analysis, using interpolation to achieve...
Proceedings Article

The Study of Smart Home Networking System Based on PLC Communications

Degen Chen
With the development of networking technology and people's increasing requirements for living standards, people demand more and more for life safety, comfort, convenience and so on. In recent years, the concept of the family home has undergone tremendous change, smart home will become the development...
Proceedings Article

Event time-space Analysis Based on Multi-Factors of Network Group Information

Yang Fang, Lingyu Xu, Jie Yu, Lei Wang, Yunlan Xue, Yang Liu
Network group information refers to views expressed by the masses of netizens through the network carrier, for the social hot spots and important events within a certain time frame, a network domain. The number change of group information can reflect a hot issue, and from the content of group information,...
Proceedings Article

Dynamic Virtual Network Embedding based on Auction-Game Theory

NingNing Liang, JuLong Lan, YunFu Long, GuanYing Liu
To solve the problem of competition among different business sharing the limited substrate network resource, this paper provides a construction model based on auction-game theory. The model regards business as players and business requests as strategy space. Based on this model, a dynamic algorithm of...
Proceedings Article

System View Simulation of Low-pass Signal Sampling Theorem

Xu Liu
Digital transmission of analogue signal has many advantages and now has been widely applied in various fields of modern communications. Sampling theorem is the theoretical basis of digital transmission of analogue signal, and the sampling and recovery of signal play a particularly important role. This...
Proceedings Article

IEEE 802.11i WLAN Security Protocol Based On Genetic Software Engineering Model

Weifeng Gao, Xiaoxi Zheng, Bin Lu
Wireless local area networks (WLANs) based on the IEEE 802.11 standards are one of today’s fastest growing technologies in businesses, schools, and homes, for good reasons. As WLAN deployments increase, so does the challenge to provide these networks with security. Security risks can originate either...
Proceedings Article

The Actuality of Agriculture Internet of Things for Applying and Popularizing in China

Ziyu Wu, Shijun Li, Manhua Yu, Juxin Wu
With the development of global economic integration and information technology, the IOT technology has wide attention from all sectors of society, as the government also attaches great importance to the research and development of the Internet of things, and now its research and development has already...
Proceedings Article

Research on Load Query of Grid Data Stream Based on Storm

Xudong Li, Hao Li, Airong Zhang, Dongdong Wang
In recent years, with the development of data flow applications ,various fields required to respond data flow quickly and real-time. Using Storm frame to process data flow, the time of calculation can be shortened significantly. In this paper, Storm platform will be used for continuous queries of data...
Proceedings Article

Research on Computer Network Virtual Laboratory based on ASP.NET

Xuebin Jia
In this paper, we conduct research on the design and implementation of computer network virtual laboratory based on ASP.NET. Virtual laboratory is a kind of special, distributed problem solving environment which is to provide the users a web-based experiment teaching, technical exchanges, joint research...
Proceedings Article

Research on the Key Technique of Wireless Network Systems Based on ZigBee and Related Techniques

Nan Lin
In this paper, we did research on the key technique of wireless network systems based on ZigBee and related techniques. ZigBee wireless sensor network is composed of multiple interconnected ZigBee nodes through wireless channel which supports three types of network topology star, tree, and mesh. Although...