Applied Mechanics and Materials
Vol. 437
Vol. 437
Applied Mechanics and Materials
Vol. 436
Vol. 436
Applied Mechanics and Materials
Vols. 433-435
Vols. 433-435
Applied Mechanics and Materials
Vol. 432
Vol. 432
Applied Mechanics and Materials
Vol. 431
Vol. 431
Applied Mechanics and Materials
Vol. 430
Vol. 430
Applied Mechanics and Materials
Vols. 427-429
Vols. 427-429
Applied Mechanics and Materials
Vols. 423-426
Vols. 423-426
Applied Mechanics and Materials
Vol. 422
Vol. 422
Applied Mechanics and Materials
Vol. 421
Vol. 421
Applied Mechanics and Materials
Vol. 420
Vol. 420
Applied Mechanics and Materials
Vol. 419
Vol. 419
Applied Mechanics and Materials
Vol. 418
Vol. 418
Applied Mechanics and Materials Vols. 427-429
Paper Title Page
Abstract: This paper adopts a multi-tier architecture based on the Java platform and establishes a system development architecture with a high scalability by using the SSH technology, which is short for Struts, Spring, Hibernate technology. It designs and implements the file management system based on SSH. This paper also focuses on the explanation of the system architecture and the system function module and proposes specific implementation technology and implementation method.
2147
Abstract: In today's Web environment, Service Oriented Architecture (SOA) becomes an efficient paradigm to integrate distributed applications. Due to loosely coupled nature of SOA, security is one of the most important issues that must be considered in SOA-based environments. Most of the existing security solutions are proposed only from one certain point of view, and they are difficult to integrate together. In this paper, an integrated framework for SOA are proposed to provides an overall security solution, which contains a three-dimensional security model, a security architecture and related security standards.
2151
Abstract: The rational database including the distribution, changes and testing facilities status of temperature & humidity in tea garden is created using the MapInfo 9.5. A set of the tea garden wireless utilities is established using the ZigBee module. The temperature & humidity real-time monitoring system and early warning system for Frost Prevention is established using Mapbasic. This system can get real-time information of temperature & humidity of nodes in different locations and give frost warning early. The frost prevention fans can be timely started, once temperature inversion happens. At the same time, the manager of tea garden can realize real-time monitor of the work status and quick location of facilities with the help of GPS.
2155
Abstract: In order to meet the requirements of the modern books management, the thesis tries, based on the JSP, to propose books management system architecture design, the function module design and the database design and the function implementation scheme.
2159
Abstract: Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel so that only the qualified users can recover the data. In some broadcast encryption based systems such as pay-TV, multiple ciphertext headers (via multiple channels) are needed since the sender needs to send various contents to different groups of subscribers. Each receiver needs to store all headers in order to switch channel fluently. Recently, Phan et al. described a multi-channel broadcast encryption scheme, in which the sender encapsulates multiple ephemeral keys into one ciphertext header so that each receiver only stores one ciphertext header and still can recover various ephemeral keys for different contents. We present an improvement on their scheme, which will reduce the size of public key and the computation cost for decryption. The improved scheme can be used to construct efficient dynamically privileged broadcast encryption system.
2163
Abstract: In this paper, we present a new nonlinear ternary interpolatory subdivision scheme which has the properties of convexity-preserving, circle-preserving and the limit curve iscontinuous. In each subdivision step, the newly generating points will be on the circle determined by the interpolatory point and its adjacent points. Numerical examples show that this algorithm is simple and curves generated by this subdivision scheme are fair curves.
2170
Abstract: In order to guarantee the communication of logical ring designed properly during the development of Controller Area Network (CAN) Network Management (NM) system complied with OSEK/VDX direct NM specification, it is necessary to investigate its performance in various work conditions. However, this usually costs much time and work consumption to reproduce specific work conditions in a distributed CAN network. By the simulation platform of logical ring developed with Network Simulator 2 (NS2), this paper provided an efficient test tool, which much reduced the consumption of specific work condition reproduction.
2174
Abstract: Dynamic webpage technology is widely used in web development, but for a large e-commerce system, it will bring huge workload to the server if access database frequently and create web page dynamically, thus the server may breakdown on this condition. In this paper, the author introduced the techniques of web page staticize, based on the design of an E-shop system, puts forward the principle, strategy and method for staticizing dynamic page, and verified the effectiveness of this solution by experiments.
2179
Abstract: Cloud computing data centers can be called cloud computing centers. It has put forward newer and higher demands for data centers with the development of cloud computing technologies. This paper will discuss what are cloud computing data centers, cloud computing data center construction, cloud computing data center architecture, cloud computing data center management and maintenance, and the relationship between cloud computing data centers and clouds.
2184
Abstract: The rapid development of network and information technology makes the network become the indispensable part in people's life. Network design uses email as a starting point, instead of actual letters. Then Happy Nets, BBS etc. are evolved from it, with virtual as their major feature. In the process of social networks evolution, the personal image transformed from the actual into the virtual one. All this has contributed to the birth of the social network, which then makes the contacts among people presenting the feature of network expansion and cost reduction. The popular social network nowadays is considered to be social plus network, namely, through the network, as a carrier, people are connected to form a virtual community with certain characteristics. Based on the genetic algorithm and genetic coding technology, the article is designed to make the optimal data analysis and create a optimistic cyber environment in the process of the social networks explosive development.
2188