Applied Mechanics and Materials Vols. 644-650

Paper Title Page

Abstract: The rapid development and wide application of computer network is a new challenge to information security and network security. Traditional security models and single security technology can not keep up with the change of complex network structure and alterable intrusion measure. Based on analysis of some classical security models and technologies, we think network security is a kind of dynamic security. So, this paper presents a dynamic self-adaptive network security model based on mobile agent, and emphases on its structure, control strategy and prototype implementation.
2996
Abstract: A method for implementing privileged management in security management based on role base access control model (RBAC2) is proposed. The idea is creating the users security information space and the security information space for the data base management system separately. The rule and method are given for implementing the mapping from the former onto the latter. The structure of the system for implementing the security management system in the client/server environment is also presented. The adoptability, easy usability and maintainability are primary characters of the method.
3000
Abstract: During the step-by-step construction of expressway management information system (EMIS), it should be seriously considered to assure the reliable connection and oneness of the system. Aimed at the requirement of constructing provincial EMIS, this paper thoroughly studies the organizing of shared information among subsystems, and puts forward technical project for the establishment of shared information platform (SIP).
3004
Abstract: security objectives, and the commonly used Mobile Ad hoc networks security protection technology, and finally discusses the application of mobile Ad hoc network in the field, and their security policy are analyzed.
3008
Abstract: Based on the principle and characteristics of cloud computing, we put forward the detailed introduction of the constitution and function of cloud information resource flow architecture. Therefore, the problems of network source information management, supervisory control, exploitation and utilization can be solved.
3012
Abstract: There are some lacks of intelligence, self-adaptability, initiative and processing power limitations in the traditional recommendation system. Using the multi-agent technology and the web log mining technology, this paper converts the function modules of traditional personalized recommendation system into an agent. This paper proposes an architecture model based on multi-agent e-commerce personalized recommendation system (MAPRS), and discusses the function of each component of the model and the system's running processes.
3016
Abstract: Traditional music retrieval system based on text information description can't meet people's demand for intelligent retrieval, on which basis content-based music retrieval method came into being. Emotional needs are introduced into retrieval and related researches are done to music retrieval method based on the emotion. This paper first constructs music emotion space to obtain the user's emotions; and then proposes emotional music template library through the study of the definition of emotional music model to meet users emotional needs matching template; Finally, based on this, advances the music retrieval system model based on emotional music template, trying to explore a kind of effective retrieval method based on emotion.
3020
Abstract: The existing trust model in P2P network is limited in inhibiting feedback-cheating peers’ behaviors and can not fully resist the collectives’ attack. To solve this problem, we present a new trust model. It take Malicious Percentage (MP) and Feedback Consistency Percentage (FCP) as the new trust evaluation criterion to help filter malicious peers in selection strategy of peers. For feedback-cheating peers, we use global trust value to distinguish between true and false feedback information. Experiments demonstrate that our model is effective in resisting feedback-cheating peers’ behaviors and collectives’ attack.
3024
Abstract: In this paper, we propose a hybrid greedy optimization algorithm for (WSN, wireless sensor networks) and then design the relay node layout system. The test results demonstrate that the hybrid algorithm greatly reduces the number of nodes required to avoid wasting too much unnecessary relay node.
3028
Abstract: Mobile e-government can help government provide citizens with a more convenient and efficient service. It is the inevitable trend of future development. However, due to the particularity of the mobile terminal itself, security threats they face are more complex with a higher risk. If security issues are not dealt with, it will cause the entire e-government security, and even affect the image of the government and national security. This paper firstly analyzes the main threats faced by the mobile terminal, then elaborates e-government mobile terminal security policies from prevention technology, safety management and personnel to reduce security risks, so that mobile government can play a more active role.
3032

Showing 671 to 680 of 1441 Paper Titles