Applied Mechanics and Materials
Vol. 442
Vol. 442
Applied Mechanics and Materials
Vol. 441
Vol. 441
Applied Mechanics and Materials
Vol. 440
Vol. 440
Applied Mechanics and Materials
Vols. 438-439
Vols. 438-439
Applied Mechanics and Materials
Vol. 437
Vol. 437
Applied Mechanics and Materials
Vol. 436
Vol. 436
Applied Mechanics and Materials
Vols. 433-435
Vols. 433-435
Applied Mechanics and Materials
Vol. 432
Vol. 432
Applied Mechanics and Materials
Vol. 431
Vol. 431
Applied Mechanics and Materials
Vol. 430
Vol. 430
Applied Mechanics and Materials
Vols. 427-429
Vols. 427-429
Applied Mechanics and Materials
Vols. 423-426
Vols. 423-426
Applied Mechanics and Materials
Vol. 422
Vol. 422
Applied Mechanics and Materials Vols. 433-435
Paper Title Page
Abstract: In this paper, a sweater customization system is designed based on the mass customization mind, which is suitable for Android mobile devices. The key technologies of system developing on Android mobile devices, such as data analysis, image loading, interface connection, are described in the paper. The system is divided into two parts, the client and the server, which are linked by Servlet. The usage of sweater customization system indicates that the sweater mass customization system has broad application prospects.
1658
Abstract: Considering weakness of the traditional retrieval method based on keyword matching, the paper introduced semantic into information retrieval, and proposed a semantic retrieval model based on ontology. The paper offered a construction method of domain ontology and implemented semantic reasoning using Jena and improved a semantic similarity calculation method.
1662
Abstract: Dataspace integration is the basis of building dataspace. The new features of data were discussed. Theory of dataspace was researched. The structure of dataspace integration was proposed by analyzing the characters of dataspace. Dataspace integration was researched deeply by data model, correlation and relationship discovery.
1666
Abstract: Computer network is originated in the United States in 20th Century 60s, originally used for military communication, gradually enter into the civil, after a short 40 years of continuous development and improvement, has been widely applied in various fields, and is moving forward at high speed. In this paper, the present situation of computer network and the changes on peoples lives, this paper elaborates the development trend of computer network in china.
1670
Abstract: As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
1674
Abstract: This article has analyzed the local area network Address Resolution Protocol principle of work and the safe hidden danger, proposed the Address Resolution Protocol deceit's design realizes the method, and has analyzed its harm through the example, finally has made the further discussion to the procedure extendibility and the effective protection method.
1681
Abstract: Using the method of statistical experiment and based on real and open data of securities, the research conducted a test to the W&R and RSI expert system of securities trading software. Taking annual net profit margin, rate of return, and win rate as the management objectives, the research compared and analyzed the two similar reversal trend indicators on the basis of mathematic statistics theories, and achieved results that the annual rate of return and net profit margin of the RSI expert system are superior to that of the W&R expert system for 4.72 times, and that the annual number of trades of RSI is superior to that of W&R for 0.893 times.
1685
Abstract: Uncertain data management has become an important research direction and a hot area of research. This paper proposes an UDAK-anonymity algorithm via anatomy for relational uncertain data. Uncertain data influence matrix based on background knowledge is built in order to describe the influence degree of sensitive attribute and Quasi-identifier (QI) attributes. We use generalization and BK(L,K)-clustering to present equivalent class, L makes sensitive attributes diversity in one equivalent class. Experimental results show that UDAK-anonymity algorithm are utility, effective and efficient, and can make anonymous uncertainty data effectively resist background knowledge attack and homogeneity attack.
1689
Abstract: Combining network tomography, a new virus source inference model based on network performance is proposed. Both the topology information and real time network status are considered in our model. Performance metrics are introduced into rumor-centrality-based source detecting algorithm in an active inference way. By improving the process of setting up the spanning tree of infected topology we raise the virus source inference precision and reduce the time complexity of rumor-centrality-based algorithm from O(N2(|V|+|E|)) to O(N2). The simulation results show that our model achieves better estimation accuracy than the algorithm using rumor center as the estimator.
1693
Abstract: Among many user authentications over insecure networks, password authentication is simple, convenient and widely adopted one. Chen and Lee proposed a new hash-based password authentication using smart card and claimed that their scheme could resist seven attacks as listed in their paper. However, in this paper, it is pointed out that Chen-Lee’s scheme is vulnerable to off-line password guessing, replay and impersonation attacks when the smart card is lost or stolen.
1699