Applied Mechanics and Materials
Vol. 526
Vol. 526
Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials
Vol. 521
Vol. 521
Applied Mechanics and Materials
Vols. 519-520
Vols. 519-520
Applied Mechanics and Materials
Vol. 518
Vol. 518
Applied Mechanics and Materials
Vols. 513-517
Vols. 513-517
Applied Mechanics and Materials
Vols. 511-512
Vols. 511-512
Applied Mechanics and Materials
Vol. 510
Vol. 510
Applied Mechanics and Materials
Vol. 509
Vol. 509
Applied Mechanics and Materials
Vol. 508
Vol. 508
Applied Mechanics and Materials
Vol. 507
Vol. 507
Applied Mechanics and Materials
Vols. 505-506
Vols. 505-506
Applied Mechanics and Materials Vols. 513-517
Paper Title Page
Abstract: With Respect to the challenges most organizations are facing when considering information security management, especially how to demonstrate the value of security to senior leadership and how to meet all kinds of legislations in one place, this article describes a dynamic business driven integrative information security architecture to address those problems. By designing the architecture through three levels which are domain level, component level, and control level, the architecture is target to establish alignment and traceability between business and security, build customer service concept within security practices, establish a dynamic and integrative framework, and manager information security in a more predictive and proactive manner. By applying this architecture into a real life business case, the fact shows that after the implementation, the major security indicators have been visibly improved.
1309
Abstract: A typical data center includes infrastructure, system architecture, applications and data, business processes, organization and operation comprehensive. With the application of information technology and the rapid development of information technology, the traditional data center faces tremendous challenges. Next-generation data center built adaptability and high availability computing environments through resource integration and management, virtualization, security and energy management technologies. It can solve data center costs of rapidly increasing prevalence, resource management increasingly complex information security challenges, and the energy crisis and other acute problems. Design and implementation of next-generation data center must follow from the overall situation, service-oriented, overall planning and construction of new principles.
1316
Abstract: Electronic Commerce Project is a distributive online transaction system. The main part is the process of information flow and logistics. The traditional electronic commerce project just improves functional design. The research object is electronic commerce project. The research is aimed to the traditional electronic commerce project. The tool is map reduce algorithm of cloud computing. It can deal with hundreds of data parallelism. The final goal of map reduce algorithm in the electronic commerce risk management is to reduce the project uncertainty and loss.
1320
Abstract: Lexical semantic tendentious recognition calculation is the base of the sentence, and the sentence tendentious recognition is the text and the chapter structure tendentious recognition foundation. Based on HowNet lexical semantic similarity calculation, according to the current vocabulary appraisable tendentious theory, the paper put forward an improved orientation algorithm. With experiment validation, in the same pair of benchmark words, accuracy rate has lager improve to above 90%. There are some values in practical application.
1326
Abstract: Resource schedule Strategy is the core technology of cloud computing. PSO algorithm is one of dynamic adaptation resource scheduling algorithms to cloud computing. The virtual machines and the hosts can be scheduled reasonable by adjusting parameters. The resource can be scheduled quickly because of the dynamic trend calculation of PSO algorithm, to ensure real-time of the Cloud Calculation.
1332
Abstract: Equipment acquisition information system architecture is an effective way to realize information integration and sharing. Based on the military information systems architecture and combining with the operational characteristics of the equipment acquisition, the equipment acquisition information system architecture is investigated from three aspects, namely business view, system view and technical view.
1337
Abstract: Data information integrated management is the basis for realizing the informatization construction of equipment acquisition. In the equipment acquisition lifecycle, large amounts of data generated from the relevant departments of the military and the contractor. In order to realize the information exchange and sharing between the military and the contractors, we analyzed the equipment acquisition lifecycle information flow, proposed the architecture of data information integrated management of equipment acquisition based on PLM, and has carried on an example analysis so as to promote the further development of the informatization of equipment acquisition
1342
Abstract: The Unified Modeling Language - UML - is the most used specification language, and the way the world models not only application structure, behavior, and architecture, but also business process and data structure. In this paper, we aim to demonstrate a system development methodology by generating the UML diagrams from the requirements of the Automatic Banking Machine (ABM) System and discuss their relationships, differences and suitability. The high-level requirements of the system are specified by using use-case diagram, activity diagram, state chart diagram, collaboration diagram, sequence diagram, and component diagram, and the low-level requirements of each component using class diagrams. We briefly introduce each diagram, their usage, their advantages and some limitations, and then we discuss the relationships and differences between two or more diagrams, and suitability for modeling the different parts of the system.
1346
Abstract: Forecasting the stock market price movements is now popular in the field of financial research. A large number of scholars has carried on the positive exploration. Only these people are more focused on selection of prediction methods and algorithm optimization. In view of the stock market time series has the nature of the multi-scale features, nonstationary and nonlinear properties and low signal-to-noise ratio of some different from other general characteristics of time series, this paper puts forward building a multi-scale technique index method for preprocessing of the input data and then used very popular in recent years the output of the neural network technology to the pre-processed data to make predictions.
1352
Abstract: For the authentication problem of real-time data stream, the authentication schemes for real-time data stream based on digital signature are studied in this paper. According to the transmission characteristics of real-time data stream, the concept of authentication window is proposed, and three authentication schemes are designed based on the hash function and digital signature technology. In the three schemes, the authentication information of a packet is taken by itself, the next one, and the previous one, respectively. The structure and process of each scheme are presented. The authentication efficiency is studied from the two aspects of transmission density and authentication window, and the dynamic value of authentication window is also researched. Simulation results show that the second scheme has better performance, suitable for the authentication of real-time data stream travelling over insecure network.
1356