Applied Mechanics and Materials
Vols. 365-366
Vols. 365-366
Applied Mechanics and Materials
Vol. 364
Vol. 364
Applied Mechanics and Materials
Vols. 361-363
Vols. 361-363
Applied Mechanics and Materials
Vols. 357-360
Vols. 357-360
Applied Mechanics and Materials
Vols. 353-356
Vols. 353-356
Applied Mechanics and Materials
Vols. 351-352
Vols. 351-352
Applied Mechanics and Materials
Vols. 347-350
Vols. 347-350
Applied Mechanics and Materials
Vol. 346
Vol. 346
Applied Mechanics and Materials
Vol. 345
Vol. 345
Applied Mechanics and Materials
Vol. 344
Vol. 344
Applied Mechanics and Materials
Vol. 343
Vol. 343
Applied Mechanics and Materials
Vols. 341-342
Vols. 341-342
Applied Mechanics and Materials
Vol. 340
Vol. 340
Applied Mechanics and Materials Vols. 347-350
Paper Title Page
Abstract: In order to evaluate the logistics model of B2C web store at present in our country, a dynamic data envelope analysis (DEA) model was developed. Using the model analyzed a Beijing B2C web stores logistic model. Combined with the actual situation in our country, evaluation result shows that B2C web store logistics model should be appropriate to reduce the logistics outsourcing and improve the proportion of self-support logistics, but self-support logistics rhythm should be appropriate.
2877
Abstract: The LAN usually hides internal network structure by NAT to share a public IP address in the internal network, and thus it is hard to locate the source host precisely distributing sensitive information for a large-scale information monitoring system by analyzing the intercepted packets. So it is hard to fulfill monitoring work efficiently. This paper puts forward a scheme to intercept and analyze the sensitive information in the LAN environment. It studies the ARP spoofing principle and the sniffer technology based on WINPCAP. The scheme includes 7 modules named NIC capture module, packet filtering module and so on. And it achieves sensitive information filtering and matching by the configured rules, such as "keywords", "URL", "QQ number" and so on. The scheme provides a solution for tracking the source host leaking sensitive information within the LAN.
2881
Abstract: A-design of is a pair , where is the vertex set of and is a collection of subgraphs of , such that each block is isomorphic to and any two distinct vertices in are joined in exact (at most, at least) blocks of . In this paper, we will discuss some holey designs and incomplete designs for the join graph of and with a pendent edge for .
2885
Abstract: With the rapid development of network technology and the promotion of application, web has become the main platform of the issuing and accessing information. It is current research focus, how to obtain the information required by the user from the vast information source. This paper presents an extraction method of website information based on DOM to improve the searching efficiency, which only to preserve the theme information and to filter out the noise information that the users are not interested in.
2889
Abstract: First the traditional objects-attribute information table converted into a objects-attribute-attribute value table by using binary. Then two new concept is defined in this paper: concept vector instead of elementary sets (the equivalence classes of R) and knowledge matrix instead of equivalence relation of R by using binary system. Put forward a new solution to the lower and upper approximations support subset on rough set by using concept vector and knowledge matrix. Examples also are given.
2894
Abstract: With the development of cloud computing, cloud storage distributed the endless file system,but not a better copy strategy compatible with various file systems.This paper proposed ontology-based metadata replica which make different file systems mutual fusion ,and give a policy of replica allocation of low-load access .
2898
Abstract: This system uses three dimensional scene roaming technology into home design, breaks the current rendering home design mode. It constructs 3d indoor scene and indoor furniture models through 3d modeling, and realizes the roaming interaction of 3d home roaming scene by scene roaming technology, at the same time the system adopts collision detection technology to ensure the real roaming effect. The effect of roaming system can satisfy the clients need of knowing home pattern furthest, enhance the clients satisfaction degree of home pattern and reduce the burden and pressure of home designers amending effect picture once and again.
2905
Abstract: Virtual reality technology is applied to production engineering, it provides a revolutionary change to the oil industry. This paper we first analyze the function of simulation platform, then set up basic framework of the system, use 3dsmax and simulation software to simulate wellbore, oil-gas-water mining equipment. Virtual environment in well site is constructed, it simulates the underground work process, and it can dynamically assemble the wellbore by the 2d drawing tools. This platform lets users realize functions that is from design to production engineering simulation process, users can fully master the oil production equipment and control the latest information of the oil wells.
2910
Abstract: The current data collection of a network device in the network management system exists low real-time and long polling cycle, this paper proposes a subnet broadcast algorithm based on SNMP. The algorithm introduces the idea of Subnet division and broadcasting, when polling, the algorithm polled network devices by sending a SNMP data broadcast packet to each subnet, which reduced the polling packets, shortened the polling cycle and lightened the burden of management station, thus the proposed algorithm improves real-time and work efficiency for the large-scale network management system.
2915
Abstract: Similarity method is the key of the user-based collaborative filtering recommend algorithm. The traditional similarity measures, which cosine similarity, adjusted cosine similarity and Pearson correlation similarity are included, have some advantages such as simple, easy and fast, but with the sparse dataset they may lead to bad recommendation quality. In this article, we first research how the recommendation qualities using the three similarity methods respectively change with the different sparse datasets, and then propose a combinative similarity measure considering the account of items users co-rated. Compared with the three algorithms, our method shows its satisfactory performance with the same computation complexity.
2919