Applied Mechanics and Materials
Vol. 391
Vol. 391
Applied Mechanics and Materials
Vol. 390
Vol. 390
Applied Mechanics and Materials
Vol. 389
Vol. 389
Applied Mechanics and Materials
Vol. 388
Vol. 388
Applied Mechanics and Materials
Vol. 387
Vol. 387
Applied Mechanics and Materials
Vols. 385-386
Vols. 385-386
Applied Mechanics and Materials
Vols. 380-384
Vols. 380-384
Applied Mechanics and Materials
Vol. 379
Vol. 379
Applied Mechanics and Materials
Vol. 378
Vol. 378
Applied Mechanics and Materials
Vol. 377
Vol. 377
Applied Mechanics and Materials
Vol. 376
Vol. 376
Applied Mechanics and Materials
Vols. 373-375
Vols. 373-375
Applied Mechanics and Materials
Vol. 372
Vol. 372
Applied Mechanics and Materials Vols. 380-384
Paper Title Page
Abstract: The increasing demand for indoor location based services has motivated the development of various indoor positioning methods. Among them, fingerprinting based positioning system in wireless local area network (WLAN) has been paid more attentions due to its cost effectiveness and relatively high accuracy. This paper investigates various optimization techniques for WLAN fingerprinting positioning comprehensively. The fingerprinting positioning comprises five major steps: Radio Map construction, location clustering, feature extraction, location estimation and tracking. The optimization techniques in these five steps are discussed and finally the future trends are presented.
2499
Abstract: The innovative CDIO educational framework provides students with an education stressing engineering fundamentals set in the context of Conceiving - Designing Implementing - Operating real-world systems and products. The acronym of TOPCARES refers to 8 first-level ability indices which comply with those in CDIO. A total of four ability indices levels was refined in TOPCARES-CDIO structure to guide this study, which discussed the feasibility an innovative talent nurturing framework for e-commerce courses. The result suggests the application-oriented integrated educational system to satisfy the social requirements for versatile and practical talents, and can be used as a reference model for relevant educational institutions.
2506
Abstract: VPN based on the internet can not only make some enterprises save a large amount of costs, but also has better scalability, security and reliability. The paper introduced the concept and classifications of VPN, and described the key technologies of IPsec VPN and MPLS VPN. At last, we put the emphasis on the VPN network management mechanism, including fault management, performance management and tunnel management.
2510
Abstract: At present, arrival time information service and security supervision of public transit vehicles have become a hot issue of society and government departments. In this paper, a system for notifying passengers waiting for buses of the status of the vehicles, including the arrival times of vehicles at stops, is proposed. The system includes GPS devices located in the vehicles for determining the location of the vehicles along their routes. A server is coupled to the GPS devices for receiving the locations of vehicles, computing the arrival times of vehicles based on history data model, and publishing the information on website using RESTful API. Experiments on real datasets show that the system is a powerful tool for arrival time prediction of public transit vehicles.
2515
Abstract: With the development of network, e-commerce has gradually become a new mode of human commercial activities. China's e-commerce is just beginning, and there are good prospects for development. However, with a growing number of users, the security issues become increasingly prominent. Now, to protect e-commerce sites and the users' information and property of these websites is a matter of great urgency. The paper analyzes security problems that exist in the e-commerce sites, and brings forward an improved BM-algorithm to solve these threats, which is named BMHSA algorithm. This algorithm can provide significant improvement in pattern matching performance.
2519
Abstract: The advent of information epoch and the establishment of the smart home and city have cultivated and accelerated the formation of the power fiber to the home (PFTTH). The analysis on the development course of fiber to the home (FTTH) in both China and abroad, as well as the problems of Chinese broadband and its solutions all illustrate that PFTTH is the best solution of energy conservation, environmental protection, resources optimization and breaking the deadlock of the integration of three networks. The success and the rapid popularization of the PFTTH pilots in many places of China push the integration of the four networks forward. Meanwhile, the vigorous development of the smart grid makes the PFTTH fall into place. The huge fiber network formed by the grid has the function of Infobahn. And through the open transportation of the pipeline route, telecom and the broadcasting, building an informative network with Chinese characteristics begins to show effects. Supported by the related policies of the government, PFTTH is bound to open a new era of information.
2524
Abstract: With the rise and development of cloud technology, cloud-based systems has been widely used in various fields of Internet-based applications. This paper discusses the application model of cloud technology in media platforms. The second section of the paper presents the operating environment of the cloud media platform. Finally, this paper analysis specifically the implementation of the web E-mail system based on the cloud media platform presented above.
2529
Abstract: On the basis of threat analysis, the paper proposes a security risk assessment model for government portal website. Using the model, the paper systematically analyzes the security risk of government portal websites and then explains the reason of them. To enhance the security of government portal websites, both technical and administrative strategies were proposed. Those security strategies help improve the image of the government and it plays an important role in constructing service government.
2534
Abstract: With the wide application of ERP system in manufacturing enterprises in China, Issues of enterprise information security are becoming increasingly influential. On the basis of elaborating information security and information risk, this article analysis systematically the enterprise information security management system, and explore the key information security problems in ERP environment, and proposed the corresponding countermeasures and suggestions.
2539
Abstract: The modern education technology course is a compulsory course of teacher professional in Colleges and universities, after years of teaching practice, the teaching content and teaching form has been relatively mature, but there are still some problems: the contradiction between class hour and teaching content; the limitations of communication between teachers-students and students-students, the lack of collaborative learning, etc. Put forward the way and scheme by using QQ group to solve the above problems.
2544