The proceedings contain 99 papers. The special focus in this conference is on communication systems, engineering, multimedia processing and artificial intelligence. The topics include: An evolved elastic resource virt...
ISBN:
(纸本)9781138027756
The proceedings contain 99 papers. The special focus in this conference is on communication systems, engineering, multimedia processing and artificial intelligence. The topics include: An evolved elastic resource virtualization algorithm for OFDMA-based wireless networks;one full-diversity coding communication network transmission scheme for two users and four antennas;secure communications using different type of chaotic systems;power allocation and packet scheduling for energy harvesting communication systems;ID-based user off-line password authentication for mobile memory cards;suppression of Es layer clutter in HFSWR using a vertically polarized antenna array;the influence of angle parameters on ultraviolet communication system in the atmospheric turbulence;a generic size neural network based on FPGA;an improved utilization of solar node based on LEACH protocol;research on the novel non-uniform array structure;an enhanced congestion avoidance mechanism for compound TCP;high-speed radix-4 FFT processor based on FPGA;markov chain-based attack on the CSMA/CA mechanism;multiple-attribute vertical handoff algorithm based on adjusting weights and fuzzy comprehensive evaluation;performance evaluation in PAPR for SIM-OFDM systems;data migration research between relational database and nonrelational database;research on supporting technology of digital archives resource sharing and management system in the cloud computing environment;a scheduling strategy of cloud resource with low consumption based on GA;item-based collaborative filtering recommendation algorithm based on mapreduce;a nutch-based method of real-time theme searching for massive data and research and improvement of multiple pattern matching algorithm in linux intrusion detection.
Shandong Province, with the third largest GDP in China, has attracted abundant foreign capital as well as the high technology inflows. This article is to empirically analyze the development of foreign capital inflows ...
详细信息
Trust management is a complementary security method, which can prevent wireless sensor networks from internal attacks. Many papers focus on the trust management without uncertainties of trust being fully considered. T...
详细信息
Digital video forensics is an effective way to test the authenticity of the video content. In some specific detection algorithms of frame deletion, frames with sudden lighting changes will interfere with the detection...
详细信息
In order to meet the increasing requirements of reducing manual work intensity and improve the work efficiency in warehouse management of manufacture enterprises, advanced information technologies focus on the warehou...
详细信息
By taking the reactive power of the Distributed Generators (DGs) as the controlled variable, the reactive power optimization problem with the condition of the distribution power system with DGs is discussed. Multi-age...
详细信息
Machine learning has been one of hot points and a difficult research field in data mining. We have chosen the classic GOLF data set and Car Evaluation data set in University of California Irvine (UCI) machine learning...
详细信息
2014international conference on multimedia,communication and computingapplication(mcca2014)was successfully held in Xiamen,China on Oct 16-17,*** main purpose of this conference is to provide a common forum for expe...
详细信息
2014international conference on multimedia,communication and computingapplication(mcca2014)was successfully held in Xiamen,China on Oct 16-17,*** main purpose of this conference is to provide a common forum for experts and scholars of excellence in their domains from all over the world to present their latest and inspiring works in the area of multimedia,communication and computingapplication.
1980 marked the start of a boom in radiofrequency identification (RFID) technology, initially associated with a growing need for traceability. In view of the technological progress and lower costs, RFID's area of ...
详细信息
ISBN:
(纸本)9781479938247
1980 marked the start of a boom in radiofrequency identification (RFID) technology, initially associated with a growing need for traceability. In view of the technological progress and lower costs, RFID's area of application became much broader and, today, multiple business sectors take advantage of this technology. But in order to achieve the maximum benefits of RFID technology, the RFID information collected should be useful, for this it is necessary that we can collect it and deliver it in the best conditions for the whole applications that have need of its exploitation, for that a dedicated middleware solution is required to ensure the collection of RFID information and their integration in an information systems. The issues and key points of this integration as the description of the RFID technology will be summarized in the present paper, with a new middleware architecture.
暂无评论