Applied Mechanics and Materials
Vol. 616
Vol. 616
Applied Mechanics and Materials
Vol. 615
Vol. 615
Applied Mechanics and Materials
Vol. 614
Vol. 614
Applied Mechanics and Materials
Vol. 613
Vol. 613
Applied Mechanics and Materials
Vol. 612
Vol. 612
Applied Mechanics and Materials
Vol. 611
Vol. 611
Applied Mechanics and Materials
Vol. 610
Vol. 610
Applied Mechanics and Materials
Vols. 608-609
Vols. 608-609
Applied Mechanics and Materials
Vol. 607
Vol. 607
Applied Mechanics and Materials
Vol. 606
Vol. 606
Applied Mechanics and Materials
Vols. 602-605
Vols. 602-605
Applied Mechanics and Materials
Vols. 599-601
Vols. 599-601
Applied Mechanics and Materials
Vol. 598
Vol. 598
Applied Mechanics and Materials Vol. 610
Paper Title Page
Abstract: With the fast development of computer and internet technology, how to apply computer and internet technology into intercultural teaching to improve learners' intercultural competence aroused great interest in foreign language researchers and teachers. This essay tries to analyze the effects of CMIC on the intercultural competence of learners through the CMIC teaching practice between two universities from China and US. Based on the analysis of the questionnaire, students' reflective logs, and interviews, this essay concludes that the application of CMIC in intercultural teaching has positive effects on the improvement of learners' intercultural competence and that CMIC should be more widely applied into intercultural teaching.
667
Abstract: Now the identification of knowledge units and the relationship among them is still subjective and lacks systematic and scientific method. For improving rationality, the article applies digraph theory and arithmetic. The article puts forward to aggregation knowledge node into knowledge unit on certain arithmetic, and confirms the relationship among knowledge units in an organization. Case study shows that this method is more effective and rational than traditional simple method.
673
Abstract: With the fast development of the theories and techniques in information science in recent years, a variety of new methods have been used to help scholars in other fields manage the corresponding knowledge. This paper applied the research methods of information science to psychology to analyze the literature in psychology cited by ISI Web of Knowledge, then got a better understanding of psychology science. In order to understand the dynamics of psychology science, we conducted a quantitative analysis based on 8137 articles cited by SCI or SSCI, and used CiteSpace II to visualize the trends and patterns in the scientific literatures. In the end, the authors drew the following conclusions: (1) among all the individual authors, Cohen J and Seligman MEP share the highest citation times; (2) publications like Positive Psychology - An Introduction, Diagnostic and Statistical Manual of Mental Disorders (DSM), Statistical Power Analysis for the Behavioral Sciences have ranked first in the cited papers; (3) community psychology, clinical psychology, behavior, personality, model, self-are the hot areas and the frontier fields in psychology research.
680
Abstract: The diamond search (DS) algorithm is one of the most efficient block matching motion estimation algorithms by far and has already been applied in MPEG2/4. Through our research, we found that there is still some redundancy in the algorithm. In this paper, an improved new difference based search (DBS) algorithm is proposed. Simulation results demonstrate that the new algorithm outperforms the well-known diamond search (DS) algorithm and four step-searches (4SS). It obtains almost the same Peak Signal to Noise Ratio (PSNR) while requires less computations than the DS algorithm and 4SS algorithm.
686
Abstract: In recent years, the rapid development of cloud computing brings significant innovation in the whole IT industry. For the local tasks scheduling on each computational node of the top model of weapon network, an open task scheduling framework was introduced a task accept control scheme based on the tasks based on load balancing, quality of service (QoS) and an improved constant bandwidth server algorithm was presented. The result of simulation shows that the scheduling policies can improve the schedule speed when the number of tasks increases and can meet the demand better for the real time requirementsof the tactical training evaluation system for complexity and Large-scale.
695
Abstract: In this paper, the current problems and demands of campus information system was analyzed and the desktop virtualization solutions were probed. Thus, under the cloud system structure, the user can simply login by the client in desktop systems of data center, as well as traditional computer operating. As a result, the flexibility and security in application of resources are enhanced. More over, schools can avoid the repeated investment and reduce the pressure on hardware and software maintenance, and improve the working efficiency.
699
Abstract: Along with the popularity of Google Android operating system, the Android game designed for recreation, exercise thinking will become mainstream. This paper mainly introduces the development process of a 3D Sokoban game based on Android system.
703
Abstract: Cloud computing is an emerging technology, which has been the focus of the world since its birth. It is bound to bring tremendous and far-reaching changes to the field of information technology with its development. Because of its wide development space and huge appreciation potential, media cloud, as a branch of cloud computing, has become a research hotpot in recent years. It has achieved some preliminary results. As the rapid development and application of cloud computing becoming more in-depth, the disadvantages of cloud computing in security and personal privacy protection is much more obvious, which hinders the popularity and improvement of cloud computing. Those problems also exist in Media Cloud. This paper will analyze the characteristics of current media cloud and security problems based on the existing research at first. Then we propose a security framework model to solve this problem. At last, we will analyze the architecture of media cloud and try to investigate the security model for media cloud.
707
Abstract: With the rapid development of internet, E-mail has already been an indispensable tool of communication. However, because of some inherent technological insufficiencies, users’ weak sense of security and attacks from hackers, E-mail using is facing with many challenges such as virus-carrying E-mails and E-mail bombs, which results in severe consequences in terms of E-mail security. On the basis of studies of severe E-mail security events in recent years and with the application of technologies on information security, this paper attempts to give two kinds of proposals to solve problems concerning E-mail security from the perspectives of government, company, university and individual respectively. The first is a general proposal for all E-mail users and the second is a proposal on improving information security technology.
712
Abstract: — Among algorithms in recommendation system, Collaborative Filtering (CF) is a popular one. However, the CF methods can’t guarantee the safety of the user rating data which cause private preserving issue. In general, there are four kinds of methods to solve private preserving: Perturbation, randomization, swapping and encryption. In this paper, we mimic algorithms which attack the privacy-preserving methods with randomized perturbation techniques. After leaking part of rating history of a customer, we can infer this customer’s other rating history. At the end, we propose an algorithm to enhance the system so as to avoid being attacked.
717