IJWMT Vol. 2, No. 3, Jun. 2012
Cover page and Table of Contents: PDF (size: 122KB)
REGULAR PAPERS
Simulink is the integrated environment of system modelling and simulation, which is being widespread used. This paper describes the MATLAB visual simulation of the propagation path loss model for telecommunication systems. We simulated the whole process of COST231-Walfisch-Ikegami model with high accuracy, built a visual simulation frame and the path loss curves are given. This method can be used in studying other propagation path loss models in propagation environments.
[...] Read more.Power cable joint is the weak link of power system’s safe operation, it is important significance to real-time master the operating temperature of power cable joint for the safety of the power system. This paper adopts wireless technology to design the temperature monitoring system of power cable joint. Monitoring terminal collection temperature data located in each power cable joint collects the measured data in the cable branch box through the near distance micro-consumption electronic wireless technology to data concentrators located at the bottom of the cable branch box, then transmits to the monitoring center through CAN bus network. The system realizes the low cost and on-line reliable monitoring of power cable point temperature of the urban cable branch box.
[...] Read more.With the sharp increase of hacking attacks over the last couple of years, web application security has become a key concern. The attack to websites, especially the explosion of webpage interpolating incidents has become one of the most serious problems of it. In this paper, the system adopts Web server core embedded technology to imbed tamper detection module and application protection module into the Web server, define corresponding strategies for temper-proofing, and realize the real-time monitoring and protection of web pages and the dynamic content in databases.
[...] Read more.Many lighting energy-saving modification programs have the embarrassment of uneconomical. This paper takes into account economic evaluation to solve the problem. According to illuminative equipments price, life span and power consumption, the optimal program will be found under the limited investment. Firstly, the benefit ratio will be used to evaluate on the equipments modification necessity, and get the modification sequence. If the biggest benefit ratio is in different equipment simultaneously, the better one will be selected in terms of relative investment recovery period. The relative remaining time is innovatively introduced into economic evaluation for determining the equipments modification locations. Then the system operation flowchart is to prove that the scheme is workable.
[...] Read more.In the last decade, more and more researches have focused on privacy-preserving data mining(PPDM). The previous work can be divided into two categories: data modification and data encryption. Data encryption is not used as widely as data modification because of its high cost on computing and communications. Data perturbation, including additive noise, multiplicative noise, matrix multiplication, data swapping, data shuffling, k-anonymization, Blocking, is an important technology in data modification method. PPDM has two targets: privacy and accuracy, and they are often at odds with each other. This paper begins with a proposal of two new noise addition methods for perturbing the original data, followed by a discussion of how they meet the two targets. Experiments show that the methods given in this paper have higher accuracy than existing ones under the same condition of privacy strength.
[...] Read more.In order to detect the attacks to decision-making variable, this paper presents a data flow behavior constraint model for branch decision-making variables. Our model is expanded from the common control flow model, it emphasizes on the analysis and verification about the data flow for decision-making variables, so that to ensure the branch statement can execute correctly and can also detect the attack to branch decision-making variable easily. The constraints of our model include the collection of variables, the statements that the decision-making variables are dependent on and the data flow constraint with the use-def relation of these variables. Our experimental results indicate that it is effective in detecting the attacks to branch decision-making variables as well as the attacks to control-data.
[...] Read more.To arrive at the goal of intensifying the trustworthiness and controllability of distributed systems, the core function of secure algorithms and chips should be fully exerted. Through building the trustworthy model between distributed system and user behaviors, constructing the architecture of trustworthiness distributed systems, intensifying the survivability of services, and strengthening the manageability of distributed systems, the secure problem of distributed systems is to be radically solved. By setting up the trustworthy computing circumstance and supplying the trustworthy validation and the active protection based on identity and behavior for trustworthy distributed system, we will reach the goal of defending the unaware viruses and inbreak. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy distributed system. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed.
[...] Read more.In terms of features of field and track athletes’ training, this paper, integrating techniques of network, database, computers, multi-media, image processing, etc, devises a management information system of field and track training based on B/S model and provides an training information processing system. This paper analyzes the systematic functional structure and the constitution of systematic sub-systems in detail. Meanwhile, it elaborates on the design of systematic functional structure, network structure, link modes and systematic soft wares’ functions, and introduces web, database and ASP dynamic homepage technique applied in the interactive Web system design, followed by the cases for illustration of some relevant designs.
[...] Read more.This paper studies the characteristics of information sources and farmers’ demand for agricultural information in the process of agricultural informationization in China. We point out that it is not common for farmers to adopt modern information technology communication tools in rural areas nowadays, and the reason for this phenomenon is that farmers still rely mainly on traditional channels for information dissemination. To change the status quo, our government should respect farmers as dominant statuses in the process of agricultural informationization and encourage households with large-scale agricultural operation to use modern IT products in order to spread agricultural information in rural areas.
[...] Read more.In Internet of Things, computing and processing of information is the core supporting. In this paper, we introduce “Service-Oriented Computing” to solve the computing and processing of information in IoT. However, a key challenge in service-oriented environment is the design of effective access control schemas.We put forward a model of Workflow -oriented Attributed Based Access Control (WABAC), and an access control framework based on WABAC model. WABAC model grants and adapts permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.
[...] Read more.