Applied Mechanics and Materials Vols. 427-429

Paper Title Page

Abstract: This paper construct a large-scale power grid online analysis architecture based on "'Dispatch Cloud' architecture and combined with the power system characteristics and large grid dispatch system online analysis software features, it propose power grid online analysis software wide-area multi-level distributed parallel computing mode based on Dispatch Cloud Platform which is service oriented architecture (SOA). In this mode the coordination manage needed is achieved in the way of service encapsulation based SOA, including, data and model management services, computing resource management services, the job management and parallel computing services, In this mode the coordination manage needed is achieved in the way of service encapsulation based on SOA, including, data and model management services, computing resource management services, the job management and parallel computing services. which will provide theoretical and technical support to the large-scale power grid Online analysis software design and development Using Cloud technology.
2696
Abstract: Try to handle a big data stream for information retrieval is just a beginning from TREC KBA2012. Storm is a free and open source distributed real-time computation system, which makes it easy to reliably process unbounded streams of data. For the issue of KBA2012, the combination of k-nearest neighbor (kNN) algorithm and Storm cluster will be an effective solution. kNN classification technique stands out for its simplicity and capability of being implemented on distributed platform. In addition, the entities (categories) in the issue of KBA2012 are settled down, which corresponds to the situation in which kNN is used. The paper discussed the implementation of kNN on Storm cluster and the results of experiments with KBA2012 data set.
2701
Abstract: Aiming at the problems existing in the development of engineering machinery, engineering machinery personalized service model is established according to the analysis of the methods of personalized service. Personalized service system of engineering machinery is set up with the engineering mechanical personalization service model as the core, expounds the ways of the realization of each function subsystem, including intelligent equipment management subsystem, intelligent locks subsystem, spare parts management subsystem and training assessment subsystem. The system greatly satisfies the customers' demands for personalized service, it makes great contributions to improve the service level and promote the development of the whole engineering machinery industry.
2707
Abstract: This paper introduces the technology that dynamically and automatically embedding watermark into digital pictures in ASP.NET web site without changing the original website code, and meanwhile gives the primary code which implements the function. The technology proposed in this paper is an efficient, cheap and feasible solution.
2712
Abstract: Follwing with integration of between online and offline business. this trend, e-retailers implement new online marketing methods to differ from their competitors. This article will discuss four typical technology strategies for implementing online marketing: social media marketing, customer relationship management, affiliate marketing and word of mouth marketing.
2716
Abstract: With the rapid popularization and wide application of electronic information technology, electronic commerce is more and more recognized by the society due to its fast and convenient advantages. The development prospects of e-commerce are very attractive, but the commercial information security is still the primary problems of e-commerce. This article, from the basic frame of electronic commerce security, analyzed all kinds of security technology in electronic commerce to seek an effective and safe approach to realize electronic commerce.
2720
Abstract: A notable feature of the modern society is the producing, processing and more and more frequent alternating of information. As its hardware supporter, computer is deepening into every corner of the society. At the same time, the wide application also brings a major and practical problem-- computer security. So how to guarantee the smooth process of electronic commerce on the premise of computer network security, i.e. the implementation of e-commerce confidentiality, integrity, authentication, unforgeability and non-dependence becomes even more important.
2724
Abstract: In this paper, the network security of LANs and the data sniffing theory is discussed. The sniffing and intercepting process of FTP and Telnet login usernames and passwords is described. Its not safe to transmit data in a network without encrypting any data. In order to keep important information safe, it is necessary to encrypt those important data before transmission, especially login usernames and passwords. SSH is a secure protocol used to make up for the defect of traditional TCP/IP protocols. By using SSH, the important messages such as login usernames and passwords can be encrypted. It is very difficult for a network attacker to retrieve the important messages even if he has captured those encrypted messages.
2728
Abstract: The confidence of the machine learning has been an integral part of the target of the research in the field of machine learning. According to the mechanism and method for confidence, the confidence mechanism in machine learning is divided into four classes. The basic principle of the mechanism, the methods and the latest research progress are expounded respectively. Finally, the problems of current research are discussed, and the research direction is pointed out.
2732
Abstract: Geographical information grid can not only manage geospatial data, but also can manage the spatial distribution of 3-dimensional simulation entities. Using geographical information grid technology could divided the earth into different resolution of global series of geographic grid, registering the grid according to the geographical coordinates and technique index of simulation entities, building space position relations between entities, , improving the computation efficiency of connectivity test of simulation entity based on geographic grid simulation entity beforehand.
2738

Showing 601 to 610 of 657 Paper Titles