Applied Mechanics and Materials
Vol. 697
Vol. 697
Applied Mechanics and Materials
Vol. 696
Vol. 696
Applied Mechanics and Materials
Vol. 695
Vol. 695
Applied Mechanics and Materials
Vol. 694
Vol. 694
Applied Mechanics and Materials
Vol. 693
Vol. 693
Applied Mechanics and Materials
Vol. 692
Vol. 692
Applied Mechanics and Materials
Vols. 687-691
Vols. 687-691
Applied Mechanics and Materials
Vol. 686
Vol. 686
Applied Mechanics and Materials
Vol. 685
Vol. 685
Applied Mechanics and Materials
Vol. 684
Vol. 684
Applied Mechanics and Materials
Vol. 683
Vol. 683
Applied Mechanics and Materials
Vol. 682
Vol. 682
Applied Mechanics and Materials
Vol. 681
Vol. 681
Applied Mechanics and Materials Vols. 687-691
Paper Title Page
Abstract: Researches on how to solve visual perception concept in UI design with the help of visual thinking are a kind of creation to the mode of UI design which make full use of the theory of visual thinking as well as a conclusion to the combination of the theory of visual thinking and digital medium. Not only did the essay make conclusion and summarization to the application of visual thinking in the field of UI design, at home and overseas. Meanwhile the author also made her attempt to analyze and probe into the use of visual thinking in 3D UI design in light of her own practical experiences. The essay emphasized the important role and advantages that visual thinking take in the study of UI design, which will open a new window for the further study and application, as well as provide a practical reference accordingly.
2714
Abstract: Firstly, associative-sets-based collaborative filtering algorithm is proposed. During the process of personalized recommendation, some items evaluated by users are performed by accident, in other words, they have little correlation with users' real preferences. These irrelevant items are equal to noise data, and often interfere with the effectiveness of collaborative filtering. A personalized recommendation algorithm based on Associative Sets is proposed in this paper to solve this problem. It uses frequent it sets to get associative sets, and makes recommendations according to users' real preferences, so as to enhance the accuracy of recommending results. Test results show that the new algorithm is more accurate than the traditional. Secondly, a flexible E-Commerce recommendation system is built. Traditional recommendation system is a sole tool with only one recommendation model. In e-commerce environment, commodities are very rich, personal demands are diversification; E-Commerce systems in different occasions require different types of recommended strategies. For that, we analysis the recommendation system with flexible theory, and proposed a flexible e-commerce recommendation system. It maps the implementation and demand through strategy module, and the whole system would be design as standard parts to adapt to the change of the recommendation strategy.
2718
Abstract: With the enlargement of the test scale, the examination system has become the direction of large-scale. Large-scale examination system has advantage over the calculation in a cloud environment. But more candidates and examinations lead to network congestion. On the solutions of network congestion, there has been a lot of wan processing methods. But they are not suitable for application to run in the LAN's examination system according to actual condition. Therefore, this paper will introduce an improved method of multi-source multipath to alleviate the burden to the public network channel in the process of network data transmission. In order to improve the stability of the system by optimizing software to reduce the dependence on hardware. In the end, this paper will discuss the performance of this strategy.
2722
Abstract: In this paper, a design and an implementation on an intelligent guide system based on Android platform is proposed. The hardware of system is based on ARM platform, and the schematics of its main modules such as power, SDRAM are given. Then Android operation system is transplanted on the ARM platform. On this basis, the application software is developed using Eclipse and Android SDK, and it is consisted of three modules: multimedia application, web maps and recording. The module of multimedia application includes audio, picture and video. Web maps can display Google Maps on the device and achieve positioning. The record module has implemented the several normal operation on a record, such as creating, modifying and displaying.
2728
Abstract: With the coming of the era of big data, the importance of data is more and more concerned, Oracle also provides various of ways to protect user data, in which the flashback technology is the most useful to user data. And with the improved version, the flashback technology has also been continuously enhanced.
2732
Abstract: This article presents a new solution of mobile and portable electronically published content protection which using function area and algorithm to ensure the mobile storage media security and secure authentication protocols to protect communication between data in storage media and document server, on condition that no security system installed on the target computer, the theft of mobile storage media, and key stolen when user access to the documents etc. To facilitate the communication between inside and outside of enterprise, while at the same time guarantee the authorization of confidential message, an information protection proxy-based system and method to authorize the confidential message is provided. User sends its message for outside receiver to his/her approver, and approver check the message and send the message to proxy if he/she agrees. The information protection system is based on a hash chain-based authorization protocol. The information protection proxy can prevent enterprise users from sending confidential involved messages to outside without approval, and at the same time audit the whole information authorization process. The authorization procedure is based on peer to peer mode and the proxy overhead is very low, and can also be used in mobile internet applications.
2736
Abstract: Based on P2P architecture, using Java language, achieve multi-enterprise instant messaging users. Design and implementation of enterprise user registration, login, user lists, multi-user real-time chat, chat records management, file transfer and online video conferencing.
2740
Abstract: In this paper, routing protocols of wireless Meshnet work is studied about implmentation and verification them on platform. Fistly, routing algorithm of a single-interface Mesh network is studied about implementation routing protocols. This Mesh platform can provid us with wireless aceess, video surveillance and some other services. Experiments results demonstrate that the path throughout will deerease rapidly as the number of Hops increases. Because in a single interface Mesh network, all links are working on the same interfaee, which causes serious interference.
2744
Abstract: According to the website security and judicial forensics demands, a new Website Intrusion Forensics Model is proposed foe research. The model can discovery the website intrusion and forensic in time. This paper first describes the overall structure of the model, then according to the various types of intrusion websites. Put forward a comprehensive and detailed design plan about Data acquisition, transmission, preprocessing, storage, analysis, data control and user view module.
2748
Abstract: Small-scale enterprises are different, their production and management features are not the same too.This article cited an example: Build computerized accounting system.And made a computerized accounting system for small businesses embodiment.
2752