Industrial Engineering, Machine Design and Automation [IEMDA 2014] & Computer Science and Application [CCSA 2014] : proceedings of the 2014 congress on IEMDA 2014 & proceedings of the 2nd congress on CCSA 2014 Sanya, Hainan, China 12-14 Dec. 2014
Saved in:
| Corporate Authors | , |
|---|---|
| Other Authors | , |
| Format | Electronic eBook |
| Language | English |
| Published |
Hackensack, NJ :
World Scientific Publishing Co.,
[2015]
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9789814689007 9781680158434 9789814678995 |
| Physical Description | 1 online zdroj (xii, 518 pages). |
Cover
Table of Contents:
- ""Contents""; ""Editorial""; ""Chapter 1: Communication and Information Technology""; ""An Energy Consumption Assessment Method for WIFI Large-Scale Wireless Sensor Network Based on Dynamic Channel Energy Model""; ""1. Introduction""; ""2. Sensor Model""; ""3. Proposed Dynamic Channel Energy Model""; ""4. Simulation Results""; ""5. Conclusions""; ""References""; ""Research on Cloud-Based LBS and Location Privacy Protection""; ""1. Introduction""; ""2. Location-based Services on Cloud Computing""; ""3. Location Privacy of LBS System""; ""3.1. Privacy protection of LBS""
- ""3.2. New security problems brought by mobile cloud computing""""4. Cloud-based LBS System and its Location Privacy Protection""; ""4.1. Improvement on system structure""; ""4.2. Improvement on algorithms""; ""5. Conclusion""; ""Acknowledgment""; ""References""; ""Research and Exploration of the Hierarchical Management of Campus Network""; ""1. Introduction""; ""2. The New Technology in Hierarchical Network Management""; ""2.1. Sandbox technology""; ""2.2. Cloud storage technology""; ""3. The Construction of the Hierarchical Campus Network Management""
- ""3.1. Mandatory access authentication""""3.2. Environmental safety isolation""; ""3.3. Disjoint server IP address""; ""4. Construction Effects of Campus Network Hierarchical Management""; ""4.1. Building unified internal shared network platforms""; ""4.2. Building secure core office network platform""; ""4.3. Achieving the centralized control of the core electronic information""; ""4.4. Realizing multiplexing share of the campus network computers""; ""5. Conclusions""; ""References""; ""Improvement of Localization Algorithm for Wireless Sensor Network in Environmental Monitoring""
- ""1. Introduction""""2. The Improved DV-Hop Localization Algorithm""; ""2.1. Average hop-size calculation""; ""2.2. Unknown node localization""; ""2.3. Anchor nodes selection""; ""2.4. Centroid localization""; ""3. Simulation Experiment""; ""3.1. Localization accuracy analysis""; ""3.2. Energy cost analysis""; ""4. Summary""; ""Acknowledgment""; ""References""; ""A New Study on Bank Interconnected System Security Solutions""; ""1. Bank Interconnected System Architecture""; ""2. Security Bank Enterprise Interlink Trading""; ""2.1. Bidirectional safety certification trading channel""
- ""2.2. Basic firewall technology scheme is shown in Fig. 2""""2.3. Transaction package storage format encrypted format as shown in Fig. 3""; ""3. Safety Analysis of Bidirectional Authentication Process""; ""3.1. The security certificate store""; ""3.2. The security of the symmetric key""; ""4. Conclusion""; ""References""; ""Research on Simulation Platform for Security and Defense of Oil and Gas Network SCADA System""; ""1. Introduction""; ""2. SCADA System Composition""; ""2.1. Distributed data acquisition and control system""; ""2.2. Process monitoring and management systems""