Applied Mechanics and Materials
Vol. 421
Vol. 421
Applied Mechanics and Materials
Vol. 420
Vol. 420
Applied Mechanics and Materials
Vol. 419
Vol. 419
Applied Mechanics and Materials
Vol. 418
Vol. 418
Applied Mechanics and Materials
Vols. 416-417
Vols. 416-417
Applied Mechanics and Materials
Vol. 415
Vol. 415
Applied Mechanics and Materials
Vols. 411-414
Vols. 411-414
Applied Mechanics and Materials
Vols. 409-410
Vols. 409-410
Applied Mechanics and Materials
Vols. 405-408
Vols. 405-408
Applied Mechanics and Materials
Vol. 404
Vol. 404
Applied Mechanics and Materials
Vols. 401-403
Vols. 401-403
Applied Mechanics and Materials
Vols. 397-400
Vols. 397-400
Applied Mechanics and Materials
Vols. 395-396
Vols. 395-396
Applied Mechanics and Materials Vols. 411-414
Paper Title Page
Abstract: Using the derivative of the Boolean function and the e-derivative defined by ourselves as research tools, we study the Effects of e-derivative on algebraic immunity, correlation immunity and algebraic degree of H Boolean functions with the Hamming weight . We get some theorems which relevance together algebraic immunity, annihilators, correlation immunity and algebraic degree of H Boolean functions by the e-derivative. Besides, we also get the results that algebraic immunity, correlation immunity and algebraic degree of Boolean functions can be linked together by the e-derivative of H Boolean functions.
45
Abstract: Dempster-Shafer evidence theory is an efficient method to process uncertain, incomplete and vague information in data fusion. Aiming at the failure of conditional D-S evidence theory in dealing with conflicting evidences, an improved D-S combination rule is recommended. The proposed method utilizes the information quantity of evidence and assigns the conflict factor to every focus element based on average support degree. The simulations show that the proposed D-S combination rule can effectively solve thorny problems for conflicting evidences.
49
Abstract: The paper puts forward a message digest algorithm for processing the short message, the Single-Block Hash function, SBH-256. The message digest algorithm designed is processed by 32-step computation only for the characters whose length is less than 256 bits. The algorithm designed solves the shortages and blemish of these traditional message digests effectively, improves the operating efficiency and the length of its output value is 128 bits at the same time, it guarantees the same security with MD5. The experimental results show that the new message digest algorithm guarantees the security and improves the efficiency of short messages processed greatly and overcomes the shortage of traditional message digest algorithms.
53
Abstract: Since many Internet enterprises employ the computing resources provided by Cloud Service Provider (CSP), how to dynamically adjust the number of rented servers and improve service quality becomes a crucial subject. A lot of efforts have been made to achieve intelligent energy saving capacity adjustment but scarcely any of them takes the security issue of cloud data into account. In this paper, we focus on the cloud storage security in the cloud computing capacity scaling. We design the security part of the whole model based on the idea of Proofs of Retrievability (POR). In the scaling part of the model, we determine the scaling strategy according to email server instances CPU utilization. With simulation and performance evaluation, we conclude that the designed model is able to enable verifier to check the integrity of the information in the cloud storage and maintain satisfied response time target within Service Level Agreement (SLA).
60
Abstract: Constructing n-variable symmetric Boolean Functions with Second-Order Correlation-Immunity is equivalent to solving the equation in the binary field. By discussing the relationships between the solutions of the equation, and using the characteristics of the equation and its equivalent equation, algorithms of constructing symmetric Boolean Functions with Second-Order Correlation-Immunity is proposed.
67
Abstract: Analysis of information security threats in the system elements and assessment process, the decision-maker's subjective judgment threat level information and to obtain an objective evaluation by testing different forms of information and data, it is difficult for a direct threat assessment, proposed based on Bayesian network and OWA operator information security threat assessment model. First, combined with expert knowledge Bayesian network inference rules introduced conditional probability matrix, in order to build an information security threat assessment model. Secondly, based on OWA operator build the expert group decision making information system threat level of the target's subjective judgment information, and as a Bayesian network model of the target information system threat level of a priori information, and objective evaluation of information as a shell Julius observation node network model, which integrates the subjective and objective information security threat level. Finally, a simulation example shows that the model is reasonable and effective.
72
Abstract: It is very important for scientific drilling and reservoir protection to predict formation pressure exactly. Considering the complex origin of pressure in the carbonate formation, we propose a new method that combines PCA (Principal Component Analysis) with BP neural network to construct the formation pressure predictive system integrating the drilling parameters. Based on the measured data of the carbonate reservoir in Yuanba zone, Sichuan province, the procedure to construct predicting geo-pressure models is illustrated in detail. The result shows that the precision of the pressure in the carbonate formation is up to 90%.So this method can be used to predict the geo-pressure in the carbonate formation and is highly valuable in practice.
76
Abstract: This paper presents the first definition of a methodology to analyze, design and evaluate information retrieval systems. We do not address the search engines themselves, but we discuss the computer human interaction implied. We show the need to introduce the user point-of-view in each interaction, and demonstrate the usage of trade oriented knowledge. We argue that, despite the inherent quality of the search engine, the human interface should be considered as the critical part of any system. Information Search Processes must evolve to include a computer-human interaction approach.
82
Abstract: George Leslie Mackay (1844-1901), the first Presbyterian missionary to northern Taiwan, is considered to be one of the most important persons who influence the development of education and medicine in Taiwan. Recently, the manuscripts written by Mackay which detailed his work from 1871 to 1901 in Taiwan have been computerized and published as Mackays diaries. Researchers who are interested in historical topics concerning religious, educational and medical development in Taiwan hence concentrate their attention on these materials. However, little research applied computational techniques to analyze the content of the diaries. That motivated us to apply text mining techniques to explore the content of diaries. The content analysis methodology was used in this research to unveil the context of Mackays missionary work in northern Taiwan. Finally, the context was presented by data visualization techniques.
86
Abstract: This paper examines key motivators for consumers attitude towards continuing the reception of existing blog services. Multiple theoretical perspectives are synthesized to hypothetically construct a model of continuance behavior, which is then empirically tested using a field survey of online blog users, and Technology Acceptance Model (TAM) and Theory of Planned Behavior (TPB) are the studys theoretical bases. The study uses Structure Equation Modeling (SEM) to analyze users who have used blogs. The results indicated the blogs usefulness, ease to use, attitude, and subjective norm are positively affecting users behavior intention.
90