Applied Mechanics and Materials
Vol. 723
Vol. 723
Applied Mechanics and Materials
Vol. 722
Vol. 722
Applied Mechanics and Materials
Vol. 721
Vol. 721
Applied Mechanics and Materials
Vols. 719-720
Vols. 719-720
Applied Mechanics and Materials
Vol. 718
Vol. 718
Applied Mechanics and Materials
Vols. 716-717
Vols. 716-717
Applied Mechanics and Materials
Vols. 713-715
Vols. 713-715
Applied Mechanics and Materials
Vol. 712
Vol. 712
Applied Mechanics and Materials
Vol. 711
Vol. 711
Applied Mechanics and Materials
Vol. 710
Vol. 710
Applied Mechanics and Materials
Vol. 709
Vol. 709
Applied Mechanics and Materials
Vol. 708
Vol. 708
Applied Mechanics and Materials
Vol. 707
Vol. 707
Applied Mechanics and Materials Vols. 713-715
Paper Title Page
Abstract: By analyzing eight value-passing methods between Web pages under ASP.NET MVC mode, this paper expounds the necessary concepts, functions and features for realizing these methods, then describes the basic application of them by presenting the sample codes under the View and Controller, and finally compares and analyzes the listed common value-passing methods so as to choose a method of high efficiency and good performance according to the application environment in the project development.
2398
Abstract: Cloud computing is Internet-based computing model which can share new information resources through virtualization, it can be dynamically according to the user needs to provide computing, storage, network bandwidth, software and other resources and it has great market potential and become the focus of the current IT giants construction of the project. However, just as other new things, there are flaws and loopholes need to continuously improve and enhance the development process in the future of cloud computing. In this paper, the development process of computing services of cloud security incidents is discussed and we analyzes the potential security risks of cloud computing services, security building and then put forward the ideas of security management development under cloud computing environment.
2405
Abstract: We propose a film retrieval method based on ontology. This method can realize automatically recommendation when users query film resources, even though not giving search keywords explicitly. In this paper, we represent the film retrieval method and film ontology model. And then we define several inference rules and give an example to illustrate the reasoning process. Furthermore, it is discussed how to recommend related films. The film retrieval method based on ontology can do benefit to search film resources intelligently and easily.
2409
Abstract: Traffic in today’s data center networks grows rapidly. Traditional routing and forwarding protocols in data center usually rely on static hashing, and may cause avoidable bottlenecks. We present a genetic algorithm to make better use of the resources. Our goal is to minimize the maximum single link utilization of the network. And results show that our algorithm performs better than a recent greedy algorithm.
2414
Abstract: Data management has experienced three stages: labor management, file systems, and database systems. In this paper, manage equipment data using a combination of HDFS file system and HBase database: the principles of HBase data management is studied; equipment data’s reading and writing processes is established; data model of equipment database is designed based on HBase.
2418
Abstract: With the rapid development of the Internet of Things technology, IOT terminal equipments collect a large amount of data. So the preprocessing and storage become a big challenge. In this paper we presents a universal preprocessing and storage architecture for IOT data in cloud environment. In the data preprocessing module, with the sensor equipments are not stable, a large number of mistake, missing data will be produced, so we propose a imputation algorithm based on clustering to perform data preprocessing. For the data storage module, because of the existence of a large number of unstructured and semi-structured data, we present a storage architecture for heterogeneous data in cloud environment. Experiments show that our architecture can effectively complete the data preprocessing and storage, for the subsequent work, such as query data provides good support.
2423
Abstract: By studying multicast routing algorithm for MANET, this paper proposes a new heuristic algorithm to improve MAODV performance. Algorithm calculate the cost function under the delay constraint conditions, dynamically adjust the leader node, thus reducing crowded areas produce, for MAODV provide Qos. Simulation results show that when the expansion of the network, this algorithm has less routing overhead, high efficiency.
2427
Abstract: The traditional network intrusion data detection brings a lot of problems, like congestion control, leading to poor clustering effect. An improved intrusion detection algorithm based on ant guide data clustering is proposed, the accuracy of the output probability is determined by the size of the gene-bit random number, updating status categories sufficient statistics to obtain invasion characteristics observation probability and initial probability, and performing cluster center update rules. Simulation results show that the algorithm has better application performance in data clustering and network intrusion detection.
2431
Abstract: Based on cloud computing and cloud storage, this paper discussed three kinds of typical virtualization technology in cloud computing, that is, storage virtualization based on host or server, storage virtualization based on storage devices, and storage virtualization based on Storage Area Network (SAN). In addition, application value of storage virtualization technology was discussed. What’s more, platform architecture model of cloud storage was proposed, and the characteristics of cloud backup were discussed as an example.
2435
Abstract: People's opinion and behavior can influence each other and spread on social network through communication and sharing. In this paper, based on the consistency principle of attitude and behavior, we propose a discrete-time dynamical model of behavior spreading, which the individual's attitude towards a behavior is described by a variable called an opinion value. One’s behavior can be changed by the mutual influence and updated evolution of opinion value. We simulate the process of opinion evolution and behavior spreading on a real social network. The simulations suggest that the higher recognition of network group on the behavior, and the stronger individual’s ability on accepting them, the more widely the behaviors spread. Furthermore, the social resilience can inhibit behavior spread to some extent.
2440