Applied Mechanics and Materials
Vols. 568-570
Vols. 568-570
Applied Mechanics and Materials
Vol. 567
Vol. 567
Applied Mechanics and Materials
Vol. 566
Vol. 566
Applied Mechanics and Materials
Vol. 565
Vol. 565
Applied Mechanics and Materials
Vol. 564
Vol. 564
Applied Mechanics and Materials
Vol. 563
Vol. 563
Applied Mechanics and Materials
Vols. 556-562
Vols. 556-562
Applied Mechanics and Materials
Vol. 555
Vol. 555
Applied Mechanics and Materials
Vol. 554
Vol. 554
Applied Mechanics and Materials
Vol. 553
Vol. 553
Applied Mechanics and Materials
Vol. 552
Vol. 552
Applied Mechanics and Materials
Vol. 551
Vol. 551
Applied Mechanics and Materials
Vol. 550
Vol. 550
Applied Mechanics and Materials Vols. 556-562
Paper Title Page
Abstract: The technical research method of multilayer semantic on network data defines as below. The first layer means the extraction of semantic information from different layers in order to construct and reflect fully the deep information of data. The second layer is the integration of different degree and intensity semantic information based on semantic information extraction. The third layer is to establish exUCL(extended Uniform Content Locator) semantic label so as to express semantic information of each layer synthetically and to understand and research on the cross layer semantic integration.
5363
Abstract: With the further development of e-government construction and application, it becomes more and more urgent to strengthen the information security of e-government legislation. Information security is the guarantee of e-government construction and operation. In our country the information security problem needs the guarantee of laws and regulations urgently. It is important to legislate as soon as possible .Establishing and improving relevant legal system can promote the e-government construction and application effectively and quickly in our country. In order to ensure the information security of e-government in the construction and improvement of relevant legislation process, we should pay attention to the following: join the international information security law system positively, build the legal basis for e-government information security actively and promote the execution efficiency of e-government information security laws and regulations.
5367
Abstract: In recent years, hybrid storage has gradually become a hotspot in the research of data storage owing to its high-performance and low cost. An OpenStack-based hybrid storage system is presented in this paper. According to the characteristics, the data is divided into small data, big data and temporary data in this hybrid storage system; meanwhile a storage strategy, combining database storage system, the virtual file system and servers file system, is designed. In the application of iCampus project, this proposed hybrid storage system shows better performance and higher efficiency than the traditional single storage systems.
5371
Abstract: This article will design the typical word operation question and use word 2010’s command button and after the button operation it will bring about the tracking of operation question training and automatic grading in label controls.
5377
Abstract: This paper discussed the terminal application of vehicle networking and proposed software and hardware implementation of electric vehicles travel recorder. The structures and construction method were analyzed for electric vehicles networking. Finally, the scalable networked data processing architecture vehicle was made.
5381
Abstract: Based on the Model of the Systems Development Life Cycle and the concept of The Internet of Things, the development of The Smart Storage Management System will follow the stages of The System Research, The Feasibility Analysis, System Design, System Implementation, System Testing and Software Maintenance. The Paper will focus on the steps and skills in every stage to make sure the key points in the development and pay attention to some stages which need methods like Scrum. In this way, the Development of the Storage Management will go on safely and suit customers’ demands very well.
5385
Abstract: This paper illustrated the shortcomings of present stage surveillance. For the higher demand of stage surveillance and dispatch, we proposed a new method for stage surveillance based on network technology. it is composed of a LAN, some network video cameras, a storage device and a control device. Compared to the traditional surveillance system, this network stage surveillance system will centralize the system functions for a easier control of all devices. Data communication through the network will also reduce the transmit noise and solve the problem of unclear display, which will enhance the visibility and accuracy of stage surveillance and dispatch.
5391
Abstract: Data integrity is one of the biggest concerns with cloud data storage for cloud user. Besides, the cloud user’s constrained computing capabilities make the task of data integrity auditing expensive and even formidable. Recently, a proof-of-retrievability scheme proposed by Yuan et al. has addressed the issue, and security proof of the scheme was provided. Unfortunately, in this work we show that the scheme is insecure. Namely, the cloud server who maliciously modifies the data file can pass the verification, and the client who executes the cloud storage auditing can recover the whole data file through the interactive process. Furthermore, we also show that the protocol is vulnerable to an efficient active attack, which means that the active attacker is able to arbitrarily modify the cloud data without being detected by the auditor in the auditing process. After giving the corresponding attacks to Yuan et al.’s scheme, we suggest a solution to fix the problems.
5395
Abstract: For Networked Control System (NCS) with random network-induced delay and packet loss, an observer is designed to reconstruct the states using output values. A piece-wise time-delay strategy and the timestamp technique are used, improving the system performance. Depending on whether data dropout occurs or not, system is modeled as an Asynchronous Dynamical System (ADS), and theorem guaranteeing the system closed-loop stability is also given. Based on Lyapunov and Linear Matrix Inequality (LMI), controller gain and observer gain are solved and TrueTime toolbox is used to verify the effectiveness of the algorithm.
5400
Abstract: The workflow technology is the core of OA (office automation), and the workflow engine determines software quality of OA. We study the main stream of workflow—JBPM, put use of it to OA. We also make requirement analysis of workflow management module, and design and implement it. The result shows that the framework has better stability, lower couple and better maintenance. The system improves the traditional structure of web application component, which makes more suitable to the existing solution of object persistence and system structure of load balance in network.
5404