Applied Mechanics and Materials
Vol. 658
Vol. 658
Applied Mechanics and Materials
Vol. 657
Vol. 657
Applied Mechanics and Materials
Vol. 656
Vol. 656
Applied Mechanics and Materials
Vol. 655
Vol. 655
Applied Mechanics and Materials
Vol. 654
Vol. 654
Applied Mechanics and Materials
Vols. 651-653
Vols. 651-653
Applied Mechanics and Materials
Vols. 644-650
Vols. 644-650
Applied Mechanics and Materials
Vol. 643
Vol. 643
Applied Mechanics and Materials
Vols. 641-642
Vols. 641-642
Applied Mechanics and Materials
Vols. 638-640
Vols. 638-640
Applied Mechanics and Materials
Vols. 635-637
Vols. 635-637
Applied Mechanics and Materials
Vols. 633-634
Vols. 633-634
Applied Mechanics and Materials
Vols. 631-632
Vols. 631-632
Applied Mechanics and Materials Vols. 644-650
Paper Title Page
Abstract: In the context of Chinese textile and apparel industry revitalization, innovation and technology reformation, building Chinese independent brand system, improving the branded fashion enterprise R&D capabilities by IT integration has become essential for the apparel industry competition. In this context, we focus on introducing the branded apparel collaborative design, the product platform and the methods of branded apparel collaborative based on product platform.
5730
Abstract: Due to the highly developed modern technology,Smart phones and other mobile devices are become more and more universal. Most of those devices are used to process or store sensitive and confidential data.Consequently,it may cause many problems,such as privacy disclosure,mobile phone virus,spyware,etc. In order to solve those issues,We need a smart phone security evaluation system to evaluate malicious applications.In this paper we starting from classifying the effects of attack caused by all kinds of malicious mobile applications and analyzed malicious code database.according to the consequence those applications have made, we pointed that a smartphone application`s malicious behaviour can be divided into five classifications.and based on this classification,we proposed a smartphone application security evaluation system and by using Fuzzy Analytical Hierarchy Process to determine the security target weight.
5733
Abstract: The evaluation index system of emergency management system is necessary in order to improve the level of emergency management. This article establishes a set of evaluation index system by the critical success factor method and applies fuzzy comprehensive evaluation model to evaluate the case of the emergency management information system. The result proves that the evaluation index system is reasonable and scientific.
5737
Abstract: Firstly, this paper introduces the decision tree and then the basic ideas and implementation methods of ID3 algorithm are discussed. Next, processes the data of customer behavior in the AIP business based on ID3 and constructs the decision tree meanwhile the rules are established. Finally, gives the results of the prediction and advices on how to design marketing strategy of fund business. This study can be used to make marketing strategy for fund companies and improve service quality of fund companies consequently.
5741
Abstract: Facing the challenge of educational information reform, teacher training is one of the effective ways to promote teachers’ ability. However, currently there are many problems existing in training ways, exchanges and communication, and time arrangement and so on. Blended training works well to integrate the features of C-training and E-training. This essay analyses the function and background of blended training from three fundamental theories: behaviorism, cognitivism and constructivism. Meanwhile, it also combines the characteristics of MOODLE platform following four respective steps: pre-class preparation, class lecture, online research and exchange reflection. We hope researchers can benefit from the model we constructed and can attain the most effective results through addressing contradictories when training by resorting to MOODLE blended training.
5745
Abstract: Based on set pair analysis theory, set pair analysis model of the evaluation on the architecture engineering quality had been set up. The identical-discrepancy-contrary system about the correlation degree of evaluation indexes and evaluation factors of the evaluation on the architecture engineering quality had been analyzed. The result has indicated that set pair analysis model is not only easy calculation but also has merits of high usability of information in the course of evaluation, objective and reasonable system and confidence, etc. This model is applied to analyze the evaluation on the four architecture engineering quality in Guangdong. The application shows that the model is effective and practical.
5749
Abstract: The aim of athletics is "higher, faster, and stronger". The athletes improve their speed and strength by challenge themselves all the time. Scientific training method is an effective way to improve athlete's level, besides hard training. CAS is such a scientific training method that will improve athlete's training level when it is applied in athletics training. This article makes a summary of athletics training on the basis of CAS, combining my study, and at the end it mainly deals with the furor of the application of CAS in athletics training.
5753
Abstract: Teacher as a profession, has its own specialty. To make teachers have strong professional, the quality of teacher education is the key. The teaching mode called "flip class" is beneficial to the development of the teachers' theory quality and technological literacy. If we bring it into the teacher education curriculum teaching, it’ll promote teachers' professional specialization development.
5756
Abstract: This document explains and demonstrates the concept and characteristics of recycling logistics, probes into the present situation of abandoned objects recycling logistics in universities and colleges, analyzes and presents the corresponding development strategy.
5761
Abstract: With the integration of computer technology, network technology and mobile communication technology continuously, the formation of personalized resource recommendation has become possible. Based on teachers' demand investigation and analysis, this paper analyzes the teacher system architecture, personalized resource recommendation and service safeguard mechanism.
5765