Applied Mechanics and Materials Vols. 513-517

Paper Title Page

Abstract: The paper proposed an attribute clustering based collaborative filtering algorithm for recommendation. It utilizes similarity to filter out redundant attributes by feature selection. Then by incorporating K-Means clustering, it is able to effectively solve the rating scale problems existing in the traditional collaborative filtering recommendation algorithm. The algorithm is verified by real data sets. Experiments use location information for clustering the restaurant data. By integration of users rating on restaurant service and external impression the experiment study combined the collaborative filtering philosophy to provide recommendation service for users. Experimental results show that compared with the item rating based recommended algorithm, the algorithm has ideal recommended quality and improved accuracy, and then it has reduced the data sparsity.
965
Abstract: Security and efficiency for using RSA signature scheme are critical requirements for many network applications. In this paper, we present a Game Model for RSA Signature Scheme (GMRS). By analyzing our model with information and game theory, we prove that the Nash-equilibrium is existent in GMRS. Accordingly, we propose an optimization scheme for updating the private key. The experiment result shows that, our scheme can significant promote the efficiency and ensure the security, even in the lowest risk-level case and for an adversary with unlimited computing power.
969
Abstract: In 2012, Wang Zuofei built up granularity-function and applied it to the measure of attribute importance and attribute reduction. On this basis, granularity-function based upon pessimistic and optimistic multi-granularity rough set is constructed. It is applied to the calculation of attribute importance and attribute reduction. According to the experimental results, the method can reduce the dimension of features and obviously improve the classification accuracy and efficiency.
973
Abstract: KNN classifier is a simple, non-parametric, high efficiency algorithm. But it has the defect that the classification efficiency will increase as the enlargement of data scale. This paper put forward a new KNN classification method based on rough set on the research of algorithms presented by Yu Ying and Heping Gou. The innovation of this algorithm is that the kernel, negative domain and boundary region of variable precision rough set are used to be the indexes of measuring the intra-class, extra-class and the class boundary of training sample set. The samples of intra-class, extra-class and the class boundary that are to be classed have differential treatment when judging the category. In this way, the scale of training sample set is effectively reduced and the efficiency and precision of classification are improved. At last, the category function is improved to reflect the category of samples to be classed. The experimental results show that the method can obviously improve the classification efficiency and accuracy.
978
Abstract: Web Service involves many participants including service developers, providers, UDDI, and clients, and provides a kind of distributed architecture model. Different participants of the web service own different resource related to the service, so, the test method they use will be also different. From the perspective of service users, the paper proposes a service test model. The model is mainly consist of three sub-models including the user requirements model, the WSDL model, and the generation model of the test cases. Users can make a function test by using the model only with the WSDL document. According to the test model, a prototype tool is implemented. In the last, an example is given to simulate the process of service test and validate the feasibility of the model.
983
Abstract: Manufacturing cloud service composition is the key way to improve the utilization of manufacturing resources and manufacturing capabilities, realize added value and efficiency of manufacturing resources and manufacturing capabilities. It has great significance on cloud manufacturing implementation and carry. Therefore, the paper presents automatic forwarding search method called AMCSC-HFS for manufacturing cloud service composition based on AI plan. The main purpose is to support meeting the actual need of large-scale and dynamic cloud manufacturing cloud service environment.
990
Abstract: This paper mainly discusses the Multiple Constrained Qos Routing Algorithm, in the analysis of the basic on the basis of mathematical model of Qos routing. It has proposed a routing model with an objective function, integrated optimization of multiple Qos constraints. Finally, the optimization of ant colony algorithm applied to solve the problem of multiple constraints Qos. Through simulation experiments proved that the algorithm to find the path to maximum degree meets Qos requirements.
994
Abstract: Cloud storage can provide a flexible on-demand data storage service to users anywhere and anytime. However, users data is owned by cloud service provider physically, and the physical boundary between two users data is fuzzy. Moreover, cloud storage provider stores multiple replicas of data in order to increase robustness of users data. The user is charged by the amount of replicas. However, the evidence cloud storage provider actually spends more storage space is scarce. In this environment, a method to ensure multi-replica integrity must be provided. In order to avoid retrieving enormous storage data and users themselves checking, a multi-replica public auditing protocol was proposed based on the BLS short signature scheme and the homomorphic hash function. Based on the computational Diffie-Hellman assumption, the presented protocol is secure against the lost attack and tamper attack from cloud service provider. As the independence among blocks and block signatures, this protocol supports block-level dynamic update, including insertion, modification and deletion. So, the protocol is secure and efficient, and supports for multi-replica, public verification, dynamic update and privacy preserving.
999
Abstract: Data tampering as one of the primary security issues in RFID-enabled applications has been presented in recent years and proposals based on watermarking have been put forward to address different aspects of tampering in RFID tags. However, most of current researches are focused on the way of generating the watermark from the data to be protected and embedding it into the tag field (usually the field of serial number or SN) used as the cover medium, thus the innate structural coding relationship as a new clue to guess out the hidden watermark might be ignored. In this paper, this flaw has been fully considered, and a novel tamper detection method using CFB based encryption to hide the location clues is presented. Although it cant resist the attack from statistical analysis either, theoretical analysis has demonstrated that our scheme outperforms its previous counterparts in data security.
1005
Abstract: In view of ADAMS/Car software' problems, for example, difficult to modeling and error-prone, use the template files' source code that has been completed and successfully debugging and base on vb programming language,write a series of ADAMS/Car template file generator program. The program can generate template file that design needs, so it can greatly improve the efficiency of work.
1009

Showing 221 to 230 of 1031 Paper Titles