Applied Mechanics and Materials
Vol. 528
Vol. 528
Applied Mechanics and Materials
Vol. 527
Vol. 527
Applied Mechanics and Materials
Vol. 526
Vol. 526
Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials
Vol. 521
Vol. 521
Applied Mechanics and Materials
Vols. 519-520
Vols. 519-520
Applied Mechanics and Materials
Vol. 518
Vol. 518
Applied Mechanics and Materials
Vols. 513-517
Vols. 513-517
Applied Mechanics and Materials
Vols. 511-512
Vols. 511-512
Applied Mechanics and Materials
Vol. 510
Vol. 510
Applied Mechanics and Materials
Vol. 509
Vol. 509
Applied Mechanics and Materials
Vol. 508
Vol. 508
Applied Mechanics and Materials Vols. 519-520
Paper Title Page
Abstract: This paper analyzes the algorithm of general number field sieve and suggesting some ofits solving in the problem of larger integers factorization. And a design of its implementation via thelibrary GMP for polynomial selection is discussed. Our work has the advantages of easy extensionsto various applications such as RSA, Discrete logarithm problems, Primality testing and so on.
250
Abstract: Real-name policy has been adopted in some specific fields of China for several years. As the leading micro-blogging service of China, Weibo has introduced the real name policy in 2012. However, the question is that how the real-name policy is used is still unknown. In this paper, with a dataset of 158,979 accounts crawled from Weibo, we conduct a deep measurement and analysis on the use of real-name policy. We find that although the rule has been promoted for several years, the proportion of verified users is still small. Our work also shows that famous people tend to use their real names to gain more public attentions. And a verified user is more likely to be followed by others.
257
Abstract: According to the problem of Situation Assessment and Prediction of DDoS Attacks in Cloud Computing Platform, the concepts of Brittle Point and Brittle seam were introduced to describe the situation of an eco-system according to ranked node availability, and a Situation Assessment and Prediction Mechanism based on the Brittle Seam Mining Algorithm was proposed. In the Brittle Seam Mining Algorithm, biological features of DDoS attacks and cloud computing platform were analyzed from the point of bio-dynamics, and the analysis results indicate that bandwidth loads of the normal user access from different populations wound not reach the brittle point of an eco-system, while bandwidth load of victim under DDOS attacks will reach the brittle point. The Biological Invasions Model such as the population diffusion reaction model and the population reproduction model are adopted to predict and detect the Brittle Point and Brittle seam. Meanwhile, the GIS technology was used in the visualization of Brittle seam. The simulation results verify the applicability of this method.
262
Abstract: Service composition based on template is a semi-automatic composition mechanism. It synthesizes delaying service binding and template-reusing to deal with the dynamicity of environment and increase the efficiency of service composition. A novel framework for service composition based on template is proposed in this paper for managing the templates and template instances. The framework is center with service community. Furthermore, to reuse the template instance, the framework includes a mechanism for managing template instance repository.
271
Abstract: With the promotion and popularization of the State Grid Corporations security access platform, the possibility of the massive remote terminal access the security gateway system is growing, its public network resource consumption surged along with the expansion of the number of terminals. The designated area farther away from the terminal to the gateway routing digestion, the massive terminal access at the same time, the burden on the public network will also be very large. This article is based on the target about reducing the burden on the public network and improving the efficiency of the system access, designed the division of regional security access platform system with the help of the courier. Successfully Solved the chaotic gateway autonomy brought the access path complexity and through the SM1 Encryption module, SM2 signature module, and SM3 hash module greatly improve the operating efficiency and the security of the Secure Access platform under massive terminal access, has a strong practical.
275
Abstract: In a real e-commerce environment such as amazon.com with complex collaborative works, we construct DMEDD(Designated Message Encryption for Designated Decryptor) Protocol for SCCS(secure cloud commerce system) based on the previous fundamental schemes. The DMEDD-SCCS forbids a server to read others’ messages when transmitting and sharing personal data with many other sites. Accordingly, our protocol makes it possible to achieve data protection and FIPs(fair nformation practices)
279
Abstract: In order to improve resource utilization in cloud environment and reduce the total task execution time, a new scheduling strategytask scheduling strategy based on dynamic backup was proposed. The cloud system scheduling model was built, according to different security requirements for tasks to users and different trust level for nodes. This model can schedule the number of tasks backup reasonably, according to the change of system trust index. The simulation result shows that, this strategy can improve the overall system efficiency effectively.
284
Abstract: Multipath routing can be effectively used for maximum utilization of network resources. It gives the node a choice of next hops for the same destination. We present two tree based algorithms, which we call MSPT and MBFT that can help a node to find multiple next hops for a destination. Both of them are distributed algorithm, allowing the traffic to switch off the shortest path and fully exploiting the path diversity of the network. MSPT has lower cost, while MBFT has less hops between the source and destination, end system can select next hop according to the application requirements. The simulation show that our algorithms can find more selectable next hops and have good reliability and fast recovery performance. In the process of simulation, we discovery that MSPT and MBFT have more disjoint paths, therefore we provide an Algorithm 2 to combine the MSPT and MBFT, the performance of Algorithm 2 is obviously superior than independently employs
288
Abstract: A tool for instant communication of voice was designed and implemented in this study, in order to achieve instant messaging and the sharing of resources in LAN, The network communication of the software used TCP / IP protocol; and its procedural framework used the mode combing C/S and P2P, that is to say, P2P architecture was to build the communications among clients and C/S structure was to connect the clients and the server. Simulation results showed that the tool can be easily interconnected to LAN, having good performance of voice communication.
294
Abstract: This paper proposes a convert communication model based on network behavior features. Convert communication program firstly judges the most frequent communication features between the two sides, and then embeds the secret information into multimedia carrier. At last, the multimedia that carries secret information is sent to the receiver, according to communication features. A convert communication completes. The experimental results indicate that the model will not only hide convert communication behavior into normal communication behavior between hosts, but also it provides high security of communication.
302