Applied Mechanics and Materials Vols. 513-517

Paper Title Page

Abstract: In this article, it provided one way to build Customer Centered data sheet based on RFM for online shopping, then with K-Means algorithm in SAS EM, succeeded in clustering the samples. That was meaningful for further study on characteristics of every segment. At the end, the writer summarized the meaning of customer segmentation and inadequate of the model.
1361
Abstract: Due to the diversity of the situation information collected in the battlefield, and the conventional way of plotting runs with low efficiency and slow speed. This paper bring forward a new method of battlefield situation collaborative plotting based on ontology, which improves the integration plotting efficiency by formulating the local ontology construction. And based on the local ontology character constructed, solved the semantic mapping problem in the process of rapid ontology integration with a new similarity calculation algorithm.In the end this paper design a battlefield situation collaborative plotting prototype system based on client-server mode consequently.
1365
Abstract: The call center is the core of the BPO and call center report is the most flexible and the most personalized business application systems are also the most difficult to fully meet the needs. In this paper, based on SOA services architecture, by analyzing the demand for enterprise reporting capabilities and existing reporting software system deficiencies, according to the modeling approach of SOMA proposed based on the realization of the SOA model of Reporting Services, and Reporting Services applications. In addition, Reporting Services Web Service-based service application, so that the results of this research have a certain amount of maneuverability.
1372
Abstract: Web services allow developers to create, generate and compose them at runtime. However, a single web service is not sufficient to achieve most of user demands in its own. This gives rise to the concept of web services composition of is an appropriate solution to maximize the benefits of web services. Web services composition has received a great attention from different communities. A number of different semantic standards/specifications have been proposed to tackle this issue. These standards are Ontology Web Language and Web Service Modeling Ontology. In this paper, we provide an overview of these standards and present a comparison between them. We also overview different applications that have developed based on each of these standards and present comparisons among them.
1376
Abstract: At present, the growing numbers of Web services are available for reuse. It is a valuable research topic that using the existing web services to create more complex web services. The process of creating more complex web services is actually the same to the process of service composition. In this paper, we propose a readable and easy transformed web services composition model based on the profile of Unified Modeling Language (UML). We also implement the transformation from the composition model to Business Process Execution Language (BPEL) based on Model Driven Architecture (MDA).
1382
Abstract: Face Recognition has been recognized as a major research field in pattern recognition and computer vision. This technique is widely adopted, because of its unique convenience, economy and high accuracy compared to other biological recognition techniques. An interesting and important challenge is thus to investigate high-efficient recognition algorithm. The introduction of kernel methods in pattern recognition has been received significant attentions in the recent several years, and gray kernel and graph kernel are two popular approaches. The paper proposes maximum spanning tree kernel and region histogram intersection kernel; moreover, experiments demonstrate that higher face recognition accuracy can be achieved by multiple kernels which are the combination of them.
1387
Abstract: Based on the learning and integrated application of the T-S modeling method and Phase based Quantum Genetic Algorithm (PQGA), this article aims to provide a new and effective method to fulfill the actual demand of the oilfield development and production. First, according to the forecast indicators and the influencing factors, establish the fuzzy rule base, then according to the fuzzy rule base, establish the T-S prediction model, with improved quantum genetic algorithm to optimize the parameters of the T-S model, through the application of the prediction of the water-cut in oilfield, we prove that the method is effective.
1392
Abstract: Based on the specification model of PIX (Patient Identifier Cross-reference) in the architecture of the IHE-ITI (Integrating the Healthcare Enterprise-IT Infrastructure), combining with SOA (Service-Oriented Architecture) architecture, the paper points out the method of patient information interoperability between heterogeneous systems. With standardized middleware as an information carrier of architecture platform of medical information, using SOA-based Web Service technology, the interoperability of patient information between medical institutions can be achieved.
1398
Abstract: A new method to obtain connected component in binary images is presented. The method uses DFA automaton to obtain chain code and label the component boundary It is theoretically proved that the algorithm improves the image encoding efficiency closer to the lowest time consumption.
1402
Abstract: Several trends are opening up the era of cloud computing. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This work studies the problem of ensuring the integrity of data storage in cloud computing. We use RSAs homomorphic property to construct the protocol of provable data possession. In our protocol, we can aggregate multiple Provable Data possession into one, and reduce the overhead of communication. While prior work on ensuring remote data integrity often lacks the specific implementations, this paper achieves an effective proof of storage protocol. Extensive security and performance analysis show that the proposed scheme is highly efficient and provably secure.
1406

Showing 301 to 310 of 1031 Paper Titles