Applied Mechanics and Materials Vols. 303-306

Paper Title Page

Abstract: Vertical partitioning is a process of generating fragments, each of which is composed of attributes with high affinity. It is widely used in the distributed database to improve the efficiency of system by reducing the connection between the table access operations. The current research on vertical partitioning is mainly focused on how to measure the "affinity" to get the best-fit vertical partitioning and the n-way vertical partitioning which support generating the specific number of fragments required by the user. In this paper, we propose a vertical partitioning algorithm based on privacy constraint. It supports both the best-fit vertical partitioning and the n-way vertical partitioning. It also provides the data privacy protection by privacy constraint checking. We conduct several experimental results to show that our algorithm not only keeps higher efficiency, but also provides data privacy protection.
2139
Abstract: “Internet of things” (IOT) is a very new concept created and developed in recent years. It had not been paid front attention until one or two years ago, when Chinese and US leaders announced emphasis on the development of IOT. To recover global economy under the economic and monetary crisis background, innovative technologies such as IOT are critical to create new economic development growth points. This paper first introduces the concept and origin of IOT, then describes basic principles of IOT, next illustrates the framework of IOT, and finally takes two examples to suggest applications of IOT. The paper intends to help readers recognize IOT as a whole, to hold the clue and venation of the development of IOT, and to forecast future trends of IOT development.
2144
Abstract: Hybrid library is the basic orientation of the present development library. Along with the fast growth of digitalized resources, it is extremely essential to set up a storage system which can meet the need of visiting mass storage and sharing backups. Based on the comparison of the main features of three storage systems (DAS, NAS and SAN) in terms of its notion of designing, connection protocol, style of management and its security, this paper focuses on the situation of the application of centralized management of data mainly constructed on the basis of SAN, tiered storage, as well as the storage system with good safety and strong extensibility in North China Institute of Science & Technology(NCIST).
2149
Abstract: With the coming of aging society, a lot of old people choose to spend their old age in nursing home. Some old men are dementia, disability or long-term illness, this is a new challenge to nursing home management. This paper presents an intelligent management system solution of nursing home based on Internet of things; nursing staff can monitor the old man's whereabouts in 24 hours, to protect the safety of the old man. For the sick old man, use a variety of sensors for real-time vital signs data acquisition to realize medical monitoring, and transfer data to central hospital for diagnosis and monitoring by doctors.
2153
Abstract: With the expansion of network and the increasing number of communities’ network, It’s a big problem for the search algorithm to enhance the search efficiency. The number of search steps and the amount of query information generated by maximum degree search strategy, which will grow exponentially, consequently, and lead to low the efficiency of search. Without considering the network congestion, breadth-first search strategy is undoubtedly the best search efficiency. From the point of the breadth-first search strategy, this paper designed and proposed the synchronous search strategy of Maximum degree and Bisection degree, and described the algorithm idea and algorithm design for MBDS. The simulation results showed that MBDS not only decreased the amount of query information, but also can efficiently decrease the search steps and improve the search speed.
2157
Abstract: Now, personnel service in colleges have achieved the preliminary informatization, and there still exists problems such as informatization level of personnel management is below, information communication and feedback has worse instantaneity, et al. The leaders of the colleges have not pay attention to the management system of personnel information before, so problems during the management strengthen and relevant suggestion and opinion will point out in this paper.
2161
Abstract: With the development of computer technology, multi-core programming is now becoming hot issues. Based on directed acyclic graph, this paper gives definition of a number of executable operations and establishes a parallel programming pattern. Using verticies to represent tasks and edges to represent communication between vertex, this parallel programming pattern let the programmers easily to identify the available concurrency and expose it for use in the algorithm design. The proposed pattern can be used for large-scale static data batch processing in multi-core environments and can bring lots of convenience when deal with complex issues.
2165
Abstract: Removed at authors request
2170
Abstract: To further verify the uses of bipartite network theory and understand the intrinsic nature in social collaboration network. In this paper, we get the information of open source software projects from Source-Forge web and construct a project management collaboration network by analyzing the data of project and manager. Then, through the ordinary projection two kinds of one-mode network are made and the degree distribution of one-mode network and origin bipartite networks shows a power-law like. Finally we evaluate the node's importance on manager network to acquire the core nodes, namely domain experts, by using the metric of node degree, between and topological potential respectively, and provide some helpful applications.
2177
Abstract: To access resources from a remote system, the user authentication is a very important security mechanism. Among remote authentication protocol, password-based authenticated key exchange protocol is most popular since the two communication entities only shared a human-memorable password can establish a session key which is used to protected their later communication over an insecure networks. Recently, Xu Zhu proposed improved password-based protocol using smart card based on previous research. He claims that his protocol is secure against various attacks. However, Song points out that the Xu Zhu’s protocol suffers from attacks. In addition, Song gives an improved version of Xu Zhu. In this paper, we first found Song’s protocol also is vulnerable to off-line dictionary attack. Later, we extend Song’s protocol so that the extended protocol can resist to off-line dictionary attack even if an adversary captures the smart card.
2182

Showing 431 to 440 of 595 Paper Titles