Applied Mechanics and Materials Vols. 556-562

Paper Title Page

Abstract: Burst contention is the key issue to solve for optical burst switching (OBS), deflection routing is researched as an effective contention resolution approach. A pre-deflection Routing (CAPDR) algorithm based on Congestion Avoidance is proposed in the paper, using periodic feedback network congestion information, the algorithm deflects in advance parts of the bursts in some probability. Compared with the traditional shortest path deflection routing, the new algorithm can avoid congestion and also balance the load of the network. Simulation results show that the proposed algorithm outperforms shortest path deflection routing in terms of the burst loss ratio (BLR), throughput and average link utilization.
5863
Abstract: This paper based on the PSO algorithm is a neural network model, and with other learning algorithm, and the results show that the performance comparisons are based on improved PSO algorithm two perceptron networks have higher classification accuracy and strong generalization ability. Particle Swarm Optimization (PSO) as an emerging evolutionary algorithm fast convergence speed, robustness, global search ability, and does not need the help of the characteristics of the problem itself (such as gradient). Combination of PSO and neural network PSO algorithm to optimize the connection weights of the neural network can be used to overcome the problem of BP neural network can not only play the generalization ability of the neural network, but also can improve the convergence rate of the neural network and learning capacity.
5869
Abstract: As the wide application of computer and information sharing, database security and privacy of data become a research hotspot. First this paper analyzes the security threats the database face, from internal personnel errors, configuration, social engineering, and not patched vulnerabilities four aspects. And then it expounds database system security technologies that are database authentication, access control and audit. Finally, this paper introduces the privacy protection of the database. It hopes to provide the certain reference significance in improving the database security and privacy protection technology.
5873
Abstract: With the popularity of smart mobile terminals, mobile database technology is moving from research to a wide range of applications gradually.First this paper analyzes the concept and characteristics of mobile database, and then it lists several main key technologies of mobile database.Finally it studies the mobile database technology in the field of logistics, manufacturing, mobile banking, health care and public utilities. It hopes to have the future reference significance for the development of mobile database.
5877
Abstract: With the development of human beings and the improvement of science and technology, computer information technology has played a huge role in various industries, food safety is always the focus of human attentions, and makes it more convenient and quick to grasp the dynamic of food safety due to the application of information technology. This paper will discuss the application of information technology in the detection of food safety and food safety traceability system. If you want to control our food security, you must strengthen the application of information technology.
5881
Abstract: 3D virtual fitting technology utilizes 3D industry standard to provide all-round 3D stereo visual effect for users to learn garment information when they are purchasing garment on line. This article introduces the current situation of domestic virtual fitting system, analyses the problems exiting in the system according to the current situation, and proposes vision of the new fitting system and the technical problems during the developing process.
5884
Abstract: The attribute-based encryption scheme of cloud storage application environment helps achieve a flexible access control and confidentiality of the data. However, at present efficient and fine-grained access control can not be achieved. This is caused by the heavy re-encryption workload of data owner while attribute revocation. Besides, there is no solution to revoke user directly. By introducing key segmentation and proxy re-encryption technology to encrypt the part of the heavy work to the cloud service provider to perform, the new scheme greatly reduces the computational cost of data owner. In addition, a special attribute which the data owner controls independently is added to construct different attribute domains of CP-ABE so that the data owner can completely control of the user permissions. The new scheme not only can support multiple threshold fine access control policies, but also can achieve cancellation directly to the user as well as to the user attribute. Experimental results show that the new scheme is superior to the general scheme, achieve highly efficient, fine, and flexible access control.
5888
Abstract: Network security risk assessment is an important means of acquiring and mastering the current and future state of network, which is of great significance to maintain the safe operation of the network. This paper presents an improved risk assessment method based on Markov game that has simply changed the past, in which the risk status of the network assets were classified into fixed categories. Depending on the game relationship between fixing vulnerabilities and threat attacking, this method has more detailed characterization of the network risk. Network attacks and vulnerabilities are sorted, which reduces the state space, making the scale of model input greatly reduced, improving the assessment of large-scale network efficiency. Simulation results demonstrate the feasibility and effectiveness of this method.
5893
Abstract: In the process of oil production and transportation, oil spill accidents are usually occurred due to various reasons during the drilling platform exploration, oil tanker and pipeline transportation. After the oil spill accident, it is very important to provide effective disposal technology timely. This paper successfully constructed an Oil Spill Pollution Contingency Disposal System based on .NET framework, Oracle Database, ArcGIS Desktop and Microsoft Visual Studio. The system could not only offer the selection of various technology and tools in time, but also protect the nearby sensitive resources. The developed system makes a contribution to oil spill contingency response and increasing accident emergency disposal ability in our country.
5898
Abstract: In view of poor accuracy and slow calculation of the traditional on-line handwriting signature verification, an on-line handwriting signature verification based on Early Abandon Dynamic Time Warping (EADTW) was designed and implemented after numerous researched. The training template followed the mechanism of benchmark signature, while the certification part adopted EADTW algorithm. The experimental results showed that compared with on-line handwritten signature system based on DTW (dynamic time warping), this new system not only greatly reduced cumbersome and repeated calculation, but also obviously improved the accuracy, The bigger the test sample is, the more obvious the advantage is.
5902

Showing 1311 to 1320 of 1532 Paper Titles