Linked e-resources
Details
Table of Contents
Preface; Contents; Part I Information Technology Application and Development; 1 The Research of Reducing Energy Consumption Method on WSN Based on the Data Correlation; Abstract; 1 Introduction; 2 DWSN and CWSN Structure; 3 The Data Correlation; 3.1 Data Spatial Correlation Between the Nodes; 3.2 Data Time Correlation Between the Nodes; 3.3 Time Correlation of the Same Node; 4 Network Nodes Cluster Based on the Data Correlation; 4.1 WSN Formation Stage; 4.2 Cluster Based on the Data Correlation Stage; 4.3 Management of the Network Data After Clustering; 4.4 Update Clustering; 5 Test
6 ConclusionAcknowledgments; References; 2 Research on Situation and Key Issues of Smart Mobile Terminal Security; Abstract; 1 Introduction; 2 Security Situation on Smart Mobile Terminals; 3 Key Security Issue Research of Smart Mobile Terminals; 3.1 Program Security Analysis; 3.2 Data Security Protection; 3.3 Defect Research; 4 Development Direction on Security Research of Smart Mobile Terminals; References; 3 A Hybrid Slot Allocation Algorithm for TDMA Network; Abstract; 1 Introduction; 2 Related Works; 3 Proposed Algorithm TC-HTDMA; 3.1 Frame Structure; 3.2 ARMA Prediction Model
3.3 Slot Allocation Process3.3.1 Static Slot Assignment (SA); 3.3.2 Slots Request and Broadcast; 3.3.3 Pre-allocation Algorithm; 4 Performance Evaluation; 4.1 Simulation Enviornment; 4.2 Performance Analysis and Criteria; 4.3 Simulation Results; 5 Conclusions; References; 4 The Research of Optimum Route Algorithm in Time Measure Space; Abstract; 1 Introduction; 2 Time Measure Space; 3 Optimum Route Algorithm; 4 Simulation; 5 Conclusions; Acknowledgments; References; 5 Cell Selection and Reselection Schemes in Multi-RAT Networks; Abstract; 1 Introduction; 2 Cell Selection and Reselection
2.1 Cell Selection2.2 Cell Reselection; 3 Simulation results; 4 Conclusion; Acknowledgments; References; 6 A New Classification Algorithm Based on Emerging Patterns; Abstract; 1 Introduction; 2 Emerging Patterns; 3 Deeps Discription; 4 Mdeeps Discription; 5 Instance Analysis; 6 Experiment; 7 Conclusion; Acknowledgments; References; 7 Study on Data Fusion Techniques in Wireless Sensor Networks; Abstract; 1 Introduction; 2 Cluster Based Schemes; 3 Chain Based Schemes; 4 Tree Based Schemes; 5 Statistics Based Schemes; 6 Conclusion; References
8 An Algorithm for Mining Association Rules Based on the Database Characteristic MatrixAbstract; 1 Introduction; 2 The Mathematical Model of Association Rules; 3 Design of the Association Rules Algorithm Based on the Characteristic Matrix; 4 Algorithm Evaluation; 5 Example Analysis; 6 Conclusion; References; 9 Offline Password Guessing Attacks on Smart-Card-Based Remote User Authentication Schemes; Abstract; 1 Introduction; 2 Preliminaries; 3 Review and Analysis; 3.1 Li et al.'s Scheme in [15]; 3.1.1 Review; 3.1.2 Analysis; 3.2 B. Li's Scheme in [22]; 3.2.1 Review; 3.2.2 Analysis
6 ConclusionAcknowledgments; References; 2 Research on Situation and Key Issues of Smart Mobile Terminal Security; Abstract; 1 Introduction; 2 Security Situation on Smart Mobile Terminals; 3 Key Security Issue Research of Smart Mobile Terminals; 3.1 Program Security Analysis; 3.2 Data Security Protection; 3.3 Defect Research; 4 Development Direction on Security Research of Smart Mobile Terminals; References; 3 A Hybrid Slot Allocation Algorithm for TDMA Network; Abstract; 1 Introduction; 2 Related Works; 3 Proposed Algorithm TC-HTDMA; 3.1 Frame Structure; 3.2 ARMA Prediction Model
3.3 Slot Allocation Process3.3.1 Static Slot Assignment (SA); 3.3.2 Slots Request and Broadcast; 3.3.3 Pre-allocation Algorithm; 4 Performance Evaluation; 4.1 Simulation Enviornment; 4.2 Performance Analysis and Criteria; 4.3 Simulation Results; 5 Conclusions; References; 4 The Research of Optimum Route Algorithm in Time Measure Space; Abstract; 1 Introduction; 2 Time Measure Space; 3 Optimum Route Algorithm; 4 Simulation; 5 Conclusions; Acknowledgments; References; 5 Cell Selection and Reselection Schemes in Multi-RAT Networks; Abstract; 1 Introduction; 2 Cell Selection and Reselection
2.1 Cell Selection2.2 Cell Reselection; 3 Simulation results; 4 Conclusion; Acknowledgments; References; 6 A New Classification Algorithm Based on Emerging Patterns; Abstract; 1 Introduction; 2 Emerging Patterns; 3 Deeps Discription; 4 Mdeeps Discription; 5 Instance Analysis; 6 Experiment; 7 Conclusion; Acknowledgments; References; 7 Study on Data Fusion Techniques in Wireless Sensor Networks; Abstract; 1 Introduction; 2 Cluster Based Schemes; 3 Chain Based Schemes; 4 Tree Based Schemes; 5 Statistics Based Schemes; 6 Conclusion; References
8 An Algorithm for Mining Association Rules Based on the Database Characteristic MatrixAbstract; 1 Introduction; 2 The Mathematical Model of Association Rules; 3 Design of the Association Rules Algorithm Based on the Characteristic Matrix; 4 Algorithm Evaluation; 5 Example Analysis; 6 Conclusion; References; 9 Offline Password Guessing Attacks on Smart-Card-Based Remote User Authentication Schemes; Abstract; 1 Introduction; 2 Preliminaries; 3 Review and Analysis; 3.1 Li et al.'s Scheme in [15]; 3.1.1 Review; 3.1.2 Analysis; 3.2 B. Li's Scheme in [22]; 3.2.1 Review; 3.2.2 Analysis