Applied Mechanics and Materials Vols. 644-650

Paper Title Page

Abstract: Most of structured deep web data sources are non-cooperation, therefore establish an accurate data source content summary by sampling is the core technology of data source selection. The content of deep web data source is updated from time to time, however existing efficient methods of non-cooperation structured data source selection does not consider summary update problem. Unrenewed summary of data source can not accurately characterize the content of the data source that produce a greater impact on data source selection. Base on this, we propose a dynamic data source selection method for non-cooperative structured deep web by combining subject headings sampling technology and subject headings extension technology. The experiment results show that our dynamic structured data source selection method has good recall ratio and precision besides being efficient.
2911
Abstract: This paper uses the principle of multi-objective optimization and introduces the digital new media technology into the travel management process and establishes multi-level optimization learning model and VB algorithm routine of tourist evaluation. In order to verify the validity and reliability of the algorithm and procedure, this paper uses the VB programming software to develop mobile phone interface of digital multimedia tourism management and develops simulation system of tourist behavior using Android system software. Using visitor satisfaction management comprehensive evaluation model, this paper calculates the influence of guest evaluation on management of different tourists perceive behaviors. It also calculates comprehensive scores of multi-order and multi-stage tourists’ evaluation which provides technical support for the research of computer innovation model of tourism management.
2915
Abstract: Assessment model of the vulnerability for information system is improved by using Bayesian equilibrium algorithm. The mathematical evaluation model of combined complex network information systems is established through the combination of weighted directional algorithm, and the algorithmic routine of network vulnerability assessment is designed. In order to verify the validity and reliability of the model and the algorithm, the test platform of complex network is built, and the vulnerability of network is detected with the weighted directional method, which has got the probability distribution nephogram of network vulnerability and the curve of network performance with time changing. At the last, the effect of different nodes of the network on the vulnerability of system is calculated with directed weights. And the results shown that the attacked number of different nodes and the attacked probability have improved the credibility of information analysis, which has provided theory reference for the research of information system vulnerability.
2920
Abstract: In order to further analyze data warehouse’s application value in teaching management system, this paper first analyzes the disadvantages of previous teaching management system data extraction, illustrates the basic structure of data warehouse system, then discusses the establishment of three kinds of models of data warehouse, finally from the demand perspective of teaching management system, analyzes key technologies such as the design of data warehouse model of teaching management system, the upload of teaching data, data display and data warehouse interfaces.
2925
Abstract: With the continuous development of internet technology, its application scope has been widely. In the field of education, it is becoming more and more mature and forming a complementary relationship with traditional education. In this paper, through t computer.NET platform architecture, we analyze the composition and running mechanism of.NET structure. Based on this we construct the exact image recognition method with block matching, which matches the martial arts action image. We use VB.NET internet technology to construct the martial arts teaching action design system, and use simulation technology to test. The results show that the system can meet the needs of martial arts teaching, and has strong practicability.
2929
Abstract: Innovation mechanism refers to cope with the market strain,it has the intrinsic development power and the mobilize people’s enthusiasm mechanism. Through the many years college ideological political education teaching experience, research experience and actual investigation, people have discovered college ideological political education pattern malpractice, to improve the mode of education teaching in practice. In depth analysis and constantly explore, linking theory with practice is put forward the university thought political education pattern based on the innovation mechanism. In this mode, it has greatly stimulated students’ enthusiasm, to make students have a self-learning, active, persistent learning activity.
2934
Abstract: As China's reform and opening up the market, in the process of the WTO entering China, a growing number of financial institutions, enterprises, and individual funds began to internationally trade in a variety of ways. This system is based on the domestic bank of international settlement business has carried on the earnest analysis, comprehensive bank core accounting system and the peripheral system experience, on the basis of the practical demand for business bank, under the guidance of senior international business professionals in the industry and the design and development. The international settlement system adopts B/S structure, based on the J2EE platform, achieve security, flexible, support for multiple platforms.
2939
Abstract: With the rapid development of web services technology, the security policies defined in WS-SecurityPolicy are widely used for expressing security properties, capabilities, constraints and requirements of web services. It is well-known that security policies are crucial in the negotiation phase of service discovery and selection. However, such security policies are hard to understand and extremely error-prone, due to the complexity of the WS-SecurityPolicy specification. At the same time, because the WS-SecurityPolicy is described by natural language, there have ambiguity problem. These problem seriously hindered the development of web services policy. Therefore, this paper proposes a web services security policy description model to describe accurately and clearly security policies. The security policy model employs the formal modeling method to convert the policy assertions into the security rules.
2943
Abstract: Currently, the algorithms for wireless sensor networks which are applied in the field of intelligent transportation use NS2, Matlab software to simulate. The theoretical research results remain a certain distance from their applications in practical system. In order to solve the problem, the simulation platform in city traffic environment based on TinyOS for wireless sensor networks is researched. The structural framework of simulation platform in city traffic environment which is composed of vehicle nodes, relay nodes and sink nodes is proposed. Four design steps of application program and five simulation steps which are composed of simulation compile, network configuration, python simulation, data statistics and simulation result analysis are proposed. CTP protocol and three different movement scenes are used to test and verify the platform. Experimental results show that the algorithm performances with different parameters are obtained, and the simulation platform can verify the algorithms of wireless sensor networks in city traffic environment. The simulation platform combines theory simulation and practical application. It provides a simulation platform for the research on intelligent traffic algorithms, and shortens the algorithm development time.
2947
Abstract: Automatic analysis of malware is a hot topic in recent years. While many methods were proposed it was still a challenge for automatic identification of malware. For example, scoring was commonly used to indicate threat scale of samples, but this metric was given by manual processing in most case. In this paper, a method to automatically generate the score of analyzed sample was proposed. Combine this method and practical problem, we tested up to 639 samples and got a correctness of 97.3%. Experimental result showed that this method could correctly indicate the threat scale of samples. The results of this paper can also offer some tips for manual analysis.
2952

Showing 651 to 660 of 1441 Paper Titles