Applied Mechanics and Materials
Vol. 526
Vol. 526
Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials
Vol. 521
Vol. 521
Applied Mechanics and Materials
Vols. 519-520
Vols. 519-520
Applied Mechanics and Materials
Vol. 518
Vol. 518
Applied Mechanics and Materials
Vols. 513-517
Vols. 513-517
Applied Mechanics and Materials
Vols. 511-512
Vols. 511-512
Applied Mechanics and Materials
Vol. 510
Vol. 510
Applied Mechanics and Materials
Vol. 509
Vol. 509
Applied Mechanics and Materials
Vol. 508
Vol. 508
Applied Mechanics and Materials
Vol. 507
Vol. 507
Applied Mechanics and Materials
Vols. 505-506
Vols. 505-506
Applied Mechanics and Materials Vols. 513-517
Paper Title Page
Abstract: With the development of Internet technology, ASP.NET has been the most widely used Web platform. The invasion and attack of ASP.NETs sites bring Websites developed by ASP.NET facing a severe trial. With the constant expansion of the site, the Microsoft security features were not enough. This paper will summed up the knowledge and experience of ASP.NET website security development based on the Web security theory. In this paper, the strategy of the longitudinal analysis, platform security, data security, Web application security, WCF security, website front-end security and other important aspects will be analyzed. By constructing a relatively complete theoretical of ASP.NET security, intelligence e-business web site Kooboo eCommerce become much more secure.
597
Abstract: Aiming at the problem that the trust chain of TCG cannot insure the dynamic trustworthiness, this paper expands the trust chain and brings in the the trust chain of the trustworthy software driven by trustworthy engine.
602
Abstract: Farmland environment is away from power facilities and its information collection lasts long time. These characteristics make the wireless sensor networks in agriculture face the problem of energy constraint. Efficient routing and sleeping algorithm can save energy. Considering the node residual energy and the collection cycle of the destination nodes, this paper improved a WSN routing and sleeping algorithm based on the AODV routing algorithm. This algorithm establishes routing path based on the node residual energy and the node collection cycle. Node sleeping cycle determined after the routing path has been established. By routing path selection and appropriate sleeping cycle this algorithm can reduce overall energy consumption and avoid excessive energy consumption of some individual nodes.
606
Abstract: Simulation play an important role in the research of PET/CT imaging technology. In this paper, GATE (Geant4 Application Tomography Emission) software packages and NCAT(dynamic NURBS-based cardiac-torso phantom) were used to simulate GE ST PET/CT imaging. GATE provides abundant of functions to simulate both PET/CT imaging procedure and geometric phantom generation. NCAT can generate voxlised body torso phantom. Three different kinds of digital phantoms were designed and generated for PET/CT imaging simulation. The simulation output of GATE was converted to the data format that the STIR (Software for Tomographic Image Reconstruction) requires to reconstruct image by the OSEM (ordered subsets expectation-maximization) algorithm. The experiment results validate that GATE and NCAT are able to simulate PET/CT imaging.
612
Abstract: As it's known to all, taking full advantage of useful information in university information management systems can improve the quality and efficiency of university management. With the aim at the characteristic of the information management system, this paper proposes practical applications of the Data Mining in university information management by analyzing the process, main workload and main technical methods of data mining. And finally, we provide some guidance information and reference information for the university management staffs to help them accomplish the university management quickly and efficiently.
616
Abstract: As the application of the information network technology continuously extended, library management service platform is experiencing a shift to the information service system. In the library information management field, researchers are seeking a library identification system which is more convenient and comprehensive. Under the circumstance of the information technology conditions, Radio Frequency Identification (RFID) technology completes the automatic identification of the electronic identification tags--the two-dimensional code. The RFID technology is a contactless scanning recognition technology. And the core technology of RFID can be described as follows: using two-dimensional code as the filter identification tool according to backup data of the book management.
620
Abstract: The mono-alphabetical substituted cipher is a cipher where one-to-one mapping is used to substitute each of the characters of the plaintext by a corresponding character of the ciphertext. One of the possibility, how solve the mono-alphabetical substituted text is frequency analysis of the single letters and frequency analysis of the bigrams of the ciphertext. The paper presents algorithm for automatic deciphering of the mono-alphabetical substituted ciphertext. Computer simulation model of the algorithm is realized in MS Excel Spreadsheet. The computer simulation enables deciphering of ciphertext of different languages.
624
Abstract: This article briefly describes the weaknesses of WEP,which is previous generation wireless LAN security standard, then introduces the new generation of wireless network security standard 802.11i. Then the article introduces the process of TKIP and CCMP encryption. We use experiments to compare TKIP with CCMP about protocol security. Ultimately we conclude that CCMP encryption is safer.
628
Abstract: Aiming at more and more data produced by network, it is extremely important to manage and store these data by using mass data storage platform. This paper presents a method of managing rationally and storing mass data based on distributed computing technique. It is based on Hadoop distributed platforms, mainly using the HDFS distributed file system, MapReduce parallel computing models and Hbase distributed database technology as massive data processing methods, to achieve the efficient storage. The model can overcome the existing deficiencies of the current means of storage and solve the problems of mass data in storage, which has good scalability and reliability, thus the efficiency of storage can be further improved.
632
Abstract: The large-scale competition, which usually refers to a major international sports events and domestic levels, provincial and municipal as well as state-level large-scale games, such a massive game, exists the characteristics of large-scale, big investment, big risk and a longer cycle, etc. According to above uncertainty factors, natural risks, there are main risks, like social risks and personal risks. So, it is indispensable to bring information management technology into the big game, which makes the large-scale competition more rational scientific, reduces the risk, and makes large-scale competition successful.
635