Applied Mechanics and Materials Vols. 411-414

Paper Title Page

Abstract: With features of good interactivity and fast spread speed, unofficial networks play a significant role in knowledge transfer. Based on theories of communication networks and computational modeling method, the transfer situation of complex networks theory within Chinas learned societies, including its rising, spread and development, was modeled and then made simulation analysis by using the Blanche software. By comparing the analysis results with periodicals data from China National Knowledge Infrastructure, the effectiveness of the built model and the reliability of Blanche in multi-agent simulation research are all validated. Furthermore, the future development of complex networks theory in China is predicted as well.
145
Abstract: Scientific publishing is currently undergoing significant paradigm shifts, as it makes the transition from print to electronic format, from subscribers only to open access and from static information to a dynamic knowledge space. In this paper, we investigate four tremendously promising online publishing systems and projects as a short review of state-off-the-art scientific publishing platforms.
152
Abstract: As a new tool and new approach in the scientific development of surveying and mapping service, the mission of geographic national condition monitoring is to provide objective, fair and accurate thematic information for integrated decision-making at all levels of government. How to realize the semantic sharing of geographic national condition thematic information is the key problem for geographic national condition to provide cross-industry, cross-sector and interdisciplinary information service. Based on ontology theory, this paper proposed a method for building geographic national conditions ontology attribute database. Tianjin geographic national conditions monitoring content and its service users are selected as knowledge domain and conceptualization and formal representation is made for geographic national information, protégé software is used to build ontology attribute library.
156
Abstract: According to the importance of the management for the science research institution in a university, the management information system of resource-oriented science research institution based on REST and AJAX was developed. Firstly, the function module of the system was given from practice. Then, the system architecture was given, and the design was proposed in detail, including the resource, the database and the class. Finally, the interfaces of the client in the achieved system were given, and the implementation showed that the solution of the system is valid and feasible.
162
Abstract: With the development of mobile Internet, security problems have been greatly concerned. Identity authentication can be considered as the most basic one among various security problems. This paper proposed an improved identity authentication scheme based on dynamic password, where the idea of identity-based encryption and signature has been introduced in to ensure higher security level.
166
Abstract: How to protect users privacy effectively while providing location based service (LBS) is a very important study of the mobile Internet. Where location k-anonymity algorithm is the most commonly used algorithm at present. However the algorithm also has some disadvantages. Therefore, this paper presents a model of LBS privacy protection based on collaboration. It divides a location-based query into two parts and sends to two entities separately. One is the location cloaking server (LCS) which calculates k-anonymous locations, and the other is location service provider (LSP) which implements the query. Except the user none of the servers could have the complete query information. By this way it protects the users privacy very well. The algorithm partly solved the problems existing in the traditional k-anonymity algorithm, and the algorithms performance was significantly increased.
172
Abstract: Semantic similarity measure has always been one of the important contents in artificial intelligence. This paper puts the ontology as the research object, and measure the semantic similarity between two ontologies in view of concept lattice. Firstly, concept lattice is introduced to similarity measure, and the thought of the ontology-based semantic similarity measure with concept lattice was given. Next, the solution of the measure was described, which includes generating a formal context of heterogeneous ontologies, constructing the corresponding formal context of formal context to fetch the formal context in concept lattice, and using irreducible infimum theory to calculate the similarity value of heterogeneous ontology concept. Finally, we employed a sample to verify the measure method. The results showed the method can effectively compute the semantic similarity between the ontologies, and the method proposed is valid and feasible.
177
Abstract: This paper makes the case that virtualization offers new opportunities to alleviate throughput collapse in data center Ethernet. We present the design, implementation, and evaluation of a prototype system, called XCo, which explicitly coordinates network transmissions from virtual machines across a cluster's Ethernet infrastructure. We show that explicit coordination can be implemented transparently without modifying any applications, standard protocols, network switches, or VMs.
182
Abstract: Dynamics evolution patterns play an important role on Public opinion nowadays. In this paper, developing rules and trends are discussed by means of Petri method of online public opinion. The public opinion online was analyzed as a stream from which the conception of public opinion stream was proposed and its control pattern was developed as well. Based on these, correlation degree variables between social network cluster nodes were dynamically introduced, and general rules of public opinion streams between associated network cluster organizations were studied. The Public-opinion-stream correlation control pattern which can regulate the relationship of social network cluster nodes and verify the empirical research of sociology, journalism and psychology. At last, artificial intelligence and decision support can be supplied to relevant industries by instructing system design and management system.
186
Abstract: Recently, eID system is proposed to settle security problems and even more important to fulfill the need of government administration and control. But the main obstacle of spreading eID systems is privacy worrying though they possessed some security and privacy protection measures. In this paper, we provided the enhancement design for protecting citizen privacy in an eID system (taking German eID system as analysis object).Firstly, we suggested to separate authorization eID server and authentication eID server physically to reduce the possibility of personal data breach since eID server could not avoid to be attacked if it was one part of the internet ; Secondly, we put forward that privacy data should be double-encrypted in the stage of applying service, and should be remain encryption except the service program using it, and more importantly , it should be deleted when service is ending ; Thirdly, in order to prevent fake eID server plus fake service provider attack, we devised the authentication flow when citizen access service which let citizen to take part in the authentication process actively. In addition, we present the remote delete personal data process which invoked by citizen to further privacy protection.
192

Showing 31 to 40 of 643 Paper Titles