Applied Mechanics and Materials Vols. 543-547

Paper Title Page

Abstract: With the development and maturity of Web2.0 technology, the Internet has become more and more intelligent, humane and social. It began gradually infiltrated into every aspect of people's lives, influence and change people's way of life. Web2.0 era as representative products -- social network has been the suddenness of a thunderbolt swept the interaction information user global social networking platforms began showing explosive growth trend however, and people are facing information explosion but the core concept of wisdom barren embarrassing situation. [
3671
Abstract: In recent years, electronic commerce with the convenience and low cost and wide spread has quickly participated in the tourism industry. [This model marks the new mode of electronic commerce. Tourism is information intensive and information based on industry, leading to walk on the tourism electronic commerce. In developed countries, the development of tourism electronic business in China is still lagging behind that in the west, which is also active in the exploration stage. Hot spot in the current research on electronic commerce recommendation system mainly focus on how to improve the efficiency and accuracy of goods, through the interface and user interaction, providing recommendation for users to help users find the products. Thus completing the purchase process improves user loyalty for his website, users won more favor. Electronic commerce recommendation systems in theory and application have been greatly developed, but there are also a series of challenges and problems, while the tourism industry planning and tourism development do not take full advantage of the related technology.
3674
Abstract: On the foundation of discovery of the traditional incomplete information system, this paper introduces ontology semantic similarity to improve the traditional similarity relationship, and eliminate the inaccuracy of discovery of knowledge brought by partial transmission. Based on the original model, this paper proposes a more obscure similarity relationship under the improvement of incomplete information system. Furthermore, this paper also advocates a knowledge discovery algorithm based on the combination of weak similarity relationship and attribute value similarity, which not only considers the VPRS of existing null semantics based on the weak similarity relationship and attribute value similarity, but also explores and studies the knowledge discovery method of non-existing null incomplete information system.
3678
Abstract: As computer-based systems play an important role in our daily life, dependability assessment of these systems is of great significance. Simply combining the result of each dependability attribute could not reflect system dependability faithfully. Therefore, holistic methods to assess dependability are necessary. As a new and promising method which focused on demonstrating the dependability of product-specific system, structured assurance case model receives growing attention. Build a dependability case systematically and effectively is challenging work, particularly for systems which involves multi-contractor who have different responsibilities. In this paper, we proposed a new dependability case construction method to address the ownership problem of system dependability case which involves multiple contractors. Our method extends the existing Dependability Deviation Analysis with contractors analysis and elicitation and integrates the contractors information into the whole dependability argument architecture. We illustrate our contributions by application to a Train Control and Monitor System which preliminarily shows the effectiveness of our method.
3682
Abstract: For commercial database management system is not suitable for storing sensitive data, the data is often encrypted in application before keeping into database. Using UDF (User Defined Function) can simplify the encrypting procedure, but it can't handle Lob (Long object) data. A schema of enhancing user authentication and encrypting Lob data in ODBC (Open Database Connection) driver for database is prosed. By adding necessary attributes of user authentication and cipher algorithm to encrypt Lob data in ODBC driver, the security of data stored in database is improved. Experiments show that the schema is transparent, efficient, easy to implement and reliable.
3688
Abstract: SDN has entered into all aspects of network architecture, its advantage is that it can dynamically allocate bandwidth to different resources in the Internet business. SDN separate internet the control plane from the data plane, this shows the evolution of the virtualization from the server to the network. This paper introduces the definition of SDN and ONF OpenFlow SDN typical architecture, studied the application of SDN technology, put forward the future challenge.
3692
Abstract: As the scalable deployment of PON network and the maturity of next generation PON technologies, optical link fault management should be well considered. OTDR is now under study in the industry. Based on our study and real network operation experience, we give an analysis on use case and functional requirements of OTDR, which could be used as a guide in OTDR development and implementation.
3696
Abstract: In order to enhance the surface properties of steel substrates, nanoNi-TiN composite coatings were prepared using ultrasonic-electrodeposition technology in this paper. The effects of ultrasonic on composite coatings were studied. The X-ray diffraction (XRD) study had been utilized to detect the crystalline and amorphous characteristics of Ni-TiN composite coatings. The surface morphology and metallurgical structure of composite coatings were observed with scanning electron microscope (SEM). Finally the corrosion resistance was tested. The results show that the ultrasonic has greatly effects on TiN nanoparticles in composite coatings. And the introduction of ultrasonic and TiN particles cause the nickel grains to become fine. The average grain diameter of TiN particles is 30 nm. The Ni grain is measured approximately 60 nm. The test of corrosion resistance shows the nanoNi-TiN composite coating is proved with good corrosion resistance. The corrosion rate of 45 steel is about 5 times than that of Ni-TiN composite coating, and the corrosion rate of Ni coating is above thrice than that of Ni-TiN composite coating.
3703
Abstract: In order to investigate and predict effects of preparation parameters on wear mass loss of Ni-SiC composite coatings, Ni coatings and Ni-SiC composite coatings were prepared on steel substrates by electrodeposition process. The results showed that the contents of SiC particles increased with density of pulse current and on-duty ratio of pulse current increasing. The predictive curves of wear mass losses predicted by ANN had the similar shapes with the measured curve, and the maximum error was 9.7%. When the current density was between 30 A/dm2 and 50 A/dm2, the wear losses of Ni coatings and Ni-SiC coatings decreased with the increase of current density. SiC particles in a composite coating electrodeposited by ultrasonic parameters were much greater in number and were dispersed homogeneously in the deposit, and the Ni-SiC composite coating exhibited a dense structure.
3707
Abstract: The SiC covalent bonding between Carbon nanotube and Si substrate was fabricated by thermal vapor deposition using photolithography and gas blowing technology. Scanning electron microscopy, micro-Raman imaging and spectroscopy were used to investigate the interaction of individual CNTs and Si substrate. The characterization results showed that covalent bonds were formed between certain CNTs and Si substrate. Moreover, the reasons for the fabrication of SiC covalent bonding between CNTs and Si substrate were also proposed.
3711

Showing 821 to 830 of 1059 Paper Titles