Applied Mechanics and Materials Vols. 373-375

Paper Title Page

Abstract: Based on the basic theory of complex networks, this paper introduces the basic concept and constitution of coal transport network, summarizs the characteristics of the coal transportation network.Then through principles of coal transportation network topology abstraction,we establishe the model of coal network topology, and analyses the internal and external complexity factors on coal transportation network.
1670
Abstract: Personalized recommendation provides convenience to users and brings more benefit to companies as well. It has been an important part of electronic commerce website. Collaborative filtering is a common algorithm in recommendation system. But with massive data ages coming, traditional collaborative filtering algorithm could not finish recommendation in time. A neighbor model algorithm based on MapReduce distributed computing framework is presented against to collaborative filtering algorithm. The presented algorithm could accomplish the personalized recommendation effectively and meet the real time requirement completely. The simulation shows that the algorithm has high efficiency and could complete the recommended in a highly efficient and real-time.
1674
Abstract: In cloud computing users always hope their identity can’t be disclosed while they access the cloud service. Although there are many research focus on the security issue in cloud, none work has been carefully addressed about the proposed problem. To allay users' concerns of disclosure of their identity, we proposed a novel approach based on private matching protocol to protect users’ sensitive information in cloud computing. Besides, this paper also states the new problem of privacy indexing in the internet and proves that our proposed protocol can avoid privacy indexing in the cloud.
1678
Abstract: Based on the classification system of modern Chinese words classification system and characteristics of military documents field, the military document words are classified and descripted with morphology, syntax, complex feature, semantic and reference. And a military documents electronic lexicon prototype is designed. This lexicon can meet the requirement of military document intelligent processing well proved by application of military documents electronic lexicon.
1682
Abstract: The price of vegetables is difficult to predict. In order to find an effective method, this paper fully considers the seasonal variations, and uses the seasonal auto regressive integrated moving average model (SARIMA) to forecast the cucumber price. The experimental results indicate that the SARIMA(1,0,1)(1,1,1)12 fits the cucumber market prices exactly in the previous months. Its average fitting error is 17%. The forecast data of twelve months in 2011 is in line with the actual trend. Its average error reaches 25%. The SARIMA model is feasible for short-term warning of vegetable price.
1686
Abstract: In view of the increasingly serious software protection problem, the software protection technology based on code obfuscation is analyzed and researched, and a new software protection system, maze protection is designed and realized. With the principle of maze encryption, this program insert a large number of the complex judgments code between function entry and exit, which change the execution order, enhancing the ability of software protection. On this basis, Anti-debug techniques incorporated into the maze protection, which against the mainstream anti-debugger, increasing the advantage of high anti-reversing, tamper-proof and anti-cracking. Experimental analysis has proved that this maze protection technology was better than other virtual machine protection technologies.
1691
Abstract: Used equivalent tree to construct the minimum distance diagram of triple loop networks and found the relationships between the layer of the equivalent tree and the shortest path of any two points in triple loop networks, and provided a formula to compute its average diameter. The experimental results show that average diameter approaches to a half of the diameter at the same network, in one infinite family, the diameter must obtain minimum value when average diameter obtains the minimum value, but the inverse is not. Studies also show that average diameter is the better parameter to measure transmission efficiency about loop networks instead of diameter.
1695
Abstract: The information technology application of the career guidance for college students is the organic integration of the career guide ideas and the technological innovations. It is also an inevitable trend and requirements of the career guidance for college students to move forward under the new circumstances. Therere still big gaps between our current graduate career services information website and foreign countries in the network resource integration, the employment environmental prediction, the socio-professional status, the information service system, the career education curriculum development, the vocational aptitude measurement and on-line counseling, etc. The information-based paths of the career guidance for college students mainly are the career information network and its rational application, the diversity guide contents and its innovation methods, and the personalized main requirements and its interactive exchanges, and construct a comprehensive and compatible database of employment information platform, etc.
1699
Abstract: In order to improve the effect of refueling training in nuclear power plant, the simulation system of refueling machine was designed and developed, combining the virtual reality technology with a real control console. The 3D virtual refueling environment of nuclear power plant was established by 3D modeling. Signals from touch screen and console are gathered by PLC and transmitted to PC graphics workstation, control the motion of virtual refueling machine, which realize the refueling operation simulation. The operation in failure modes was also realized in the system through the programming of failure database. The results show that the system runs normally and can simulate refueling operation in normal and abnormal modes, the training of refueling personnel is implemented effectively.
1703
Abstract: With the development of the computer technology and the increase of the distributed computing need, cloud computing gradually becomes the research hotspot in the IT domain. As an important application of cloud computing technology, desktop cloud has been used in many domains due to its unique characteristic, especially the dominance in security and flexibility. Based on analyzing the characteristic of cloud computing and desktop cloud, makes some research on the application of desktop cloud to confidential information system, and describes the architecture framework, running mode and operation characteristic in detail.
1710

Showing 321 to 330 of 448 Paper Titles