Time filter

Source Type

Ma H.,Mudanjiang Normal University
Proceedings of 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011 | Year: 2011

Security issues are paramount in wireless networks even more so than in wired networks. A particularly devastating attack in wireless networks is the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. These tunnels emulate shorter links in the network in which adversary records transmitted packets at one location in the network, tunnels them to another location, and retransmits them into the network. Our focus in this paper is to analyze the performance of reactive multicast routing protocol On Demand Multicast Routing Protocol (ODMRP) under the influence of worm hole nodes under different scenarios and design a Worm Hole Secure ODMRP (WHS-ODMRP) by applying certificate based authentication mechanism in the route discovery process. The proposed protocol reduces the packet loss due to malicious nodes to a considerable extent thereby enhancing the performance. © 2011 IEEE. Source

Xie W.,Mudanjiang Normal University
Metallurgical and Mining Industry | Year: 2015

In this paper, the author mainly researches on the promotion model and design of 6-Degree of Freedom (DOF) force feedback sensor of fault diagnosis manipulator. Force Sensor control strategy is applied to establish haptic force feedback at end-effector of the slave manipulator. In this paper, the small changing in slave mechanics to place the sensor in the manipulator for performing different procedures such as needle injecting and ejection into the different types of experimental structures, are discussed. The controller will be designed to produce transparent haptic force feedback using force sensor and the software development according to propose strategy. Source

Xu Z.,Mudanjiang Normal University
Metallurgical and Mining Industry | Year: 2015

In this paper, the author researched on the optimal management method of energy consumption in cloud computing platform based on random task. The modifications enabled CloudSim to create energy-conscious provisioning policies that require real-time knowledge of power consumption by Cloud system components. Furthermore, it allowed the accounting of total energy consumed by the system during the simulation period. To make sure that VMs are protected against the discussed threats the thesis extended the CloudSim class and implemented a security module in it. Significant contribution of the thesis to the development of the framework is the modification of the framework to ensure that VMs are protected against attacks such as replay attacks during migration. Source

Shang X.,Mudanjiang Normal University
Tezhong Zhuzao Ji Youse Hejin/Special Casting and Nonferrous Alloys | Year: 2015

The Cu-50Mo contact material was prepared by spark plasma sintering (SPS) at 950℃ and 45 MPa for 20 min. Microstructure and properties of the material were investigated, and the hardness, con-ductivity and density of the alloy reach up to 110 HV, 21.5 MS/m, 92.5%, respectively. Furthermore, effects of 1% WC addition on the structure and properties of Cu-50Mo alloy material were analyzed. The results indicate that structure and wear resistance of the Cu-50Mo material were improved. © 2015, Journal Office of Special Casting and Nonferrous Alloys. All right reserved. Source

Bai L.,Mudanjiang Normal University
International Journal of Simulation: Systems, Science and Technology | Year: 2015

Locally linear embedding is an effective image feature dimension reduction algorithm, but when the sample distribution is not uniform. This algorithm has selected neighbor point improper and neighbor requires human factor k given defect. So an improved adaptive LLE algorithm is proposed. First, this algorithm calculates the sample point between Euclidean distance and cosine similarity, and then by a defined similar factor to effectively select neighbor points. At the same time, the algorithm is based on statistical analysis of the sample theory reconstruction 3σ rule to dynamically determine neighbor factor k. Experimental results show that this algorithm obtained feature after dimension reduction, and can effectively improve the accuracy of image classification, and less time-consuming, the overall performance is superior to the classical LLE algorithm. © 2015, UK Simulation Society. All rights reserved. Source

Discover hidden collaborations