Applied Mechanics and Materials Vols. 427-429

Paper Title Page

Abstract: As modern complex computer systems become increasingly sophisticated and data-intensive, people have long recognized the importance of precisely and unambiguously specifying them with formal methods. This paper advocates the use of Object-Z, a formal specification language, in the description of complex systems. Object-Z is an extension to the Z language to facilitate specification in an object-oriented style. First, we informally describe the syntax and semantics of Object-Z, highlighting those features that facilitate decomposing a large system into a collection of underlying objects and thus separating concerns. Then, we demonstrate the use of Object-Z by presenting a case study of a petrol supply system, illustrating how the system runs by communicating the constituent objects. Finally, we discuss several issues we encountered in this exercise, which may serve as feedback to the development of Object-Z.
2349
Abstract: In order to improve Java developing skills, a new framework of Java development in computer science specialty is proposed in this paper. It emphasizes on constructing the specialty orientation of Java application development based on requirement-driven, designing the application-oriented curriculum system, and implementing the multi-dimensional practical methods. Practice shows that the framework is efficient and helpful to enhance the students programming skills and strengthen their employment ability.
2354
Abstract: Abstract. As the development of informatization process and the rapid development of Internet, network security problems are highlighted gradually.College is a unity that requires large quantity and high quality of knowledge and information, and the network provides college students more opportunities to learn and communicate, but it also poses a serious crisis of Internet security.This paper has a deep analysis of present situation and necessity of college students' computer network security, and suggest that network information security education should be attatched great importance as a preventive measure and important countermeasures.Twenty-first Century is the era of information and technology, as an important channel of acquiring knowledge and information and a wide platform of all kinds of cultural dissemination and communication, network has played a positive role in promoting the exchange of social information, making personal interaction convenient, promoting social and economic development. Along with the rapid development and maturity of the campus network, network activity has become one of college students’ daily activities, and made a profound effect on students in all aspects.
2359
Abstract: The system structure of the website keyword search engine is designed with data flow as the main line. The design includes four subsystems: search subsystem, analysis subsystem, index subsystem and query subsystems. The key algorithms are introduced.
2364
Abstract: The paper introduces a personalized intelligent recommender system. The system characters include: (1) integrating Agent technology to improve the recommender system reactivity, proactivity and autonomy; (2) giving a mixed recommendation method with content-based recommendation; (3) proposing the personalized user model, which can describe long-term interests and short-term interests, effectively deal with the user interests drift problem.
2368
Abstract: Test reports given by test institution are mostly stylized text. Editing such text is a hard and odd work. A method is introduced to implement report automatically creating based on VBA and Words template technology, such as bookmark, ChartObject etc. The method used in our engine performance test-bed laboratory works well and reduces report editing time form half a day to half an hour.
2373
Abstract: Among the wide range of cloud service providers with different performance characteristics, in order to let the cloud users find cloud services which satisfy its performance preferences and specific trust levels,it needs to establish a reasonable and scientific cloud service trust evaluation system. This paper introduces a membership degree theory into trust evaluation model. First, it designs the trust evaluation system framework of cloud services, and establishes a trust evaluation model of cloud services. Next, it calculates the trust level of cloud services with the comprehensive trust cloud center of gravity evaluation method (CCGE). Finally, the experiment results show that this model can build precise trust relationship between cloud users and cloud services based on users performance demands.
2377
Abstract: The detection of elements in top part of research paper is the key problem in layout analysis, because these elements are often used as the search items by user. This paper provides a index-based method for auto detection of top part from research papers. Different from existing methods, an index is used for detecting items from top part of research paper. Experiments show the advantage of our method over existing methods, and future work is also described in the paper.
2383
Abstract: The relational dataspace model was researched. A dataspace model-iDM was discussed. The advantages of dataspace model iDM were analyzed. Data model Vertical and Corespace were researched deeply. A dataspace system OrientSpace created by Vertical and Corespace was discussed, and it was analyzed.
2387
Abstract: In view of the present domestic demand with data processing technology of seismic while drilling, a set of software system suitable for data processing of seismic while drilling was developed. The software was based on the hierarchical structure and the article described the architecture of the seismic while drilling data processing software system. It also defined the function at all levels in detail. The results showed that: the software system based on the hierarchical structure is stable and has good adaptability and extensibility.
2391

Showing 521 to 530 of 657 Paper Titles