Applied Mechanics and Materials
Vol. 748
Vol. 748
Applied Mechanics and Materials
Vol. 747
Vol. 747
Applied Mechanics and Materials
Vols. 744-746
Vols. 744-746
Applied Mechanics and Materials
Vol. 743
Vol. 743
Applied Mechanics and Materials
Vol. 742
Vol. 742
Applied Mechanics and Materials
Vol. 741
Vol. 741
Applied Mechanics and Materials
Vol. 740
Vol. 740
Applied Mechanics and Materials
Vols. 738-739
Vols. 738-739
Applied Mechanics and Materials
Vol. 737
Vol. 737
Applied Mechanics and Materials
Vol. 736
Vol. 736
Applied Mechanics and Materials
Vol. 735
Vol. 735
Applied Mechanics and Materials
Vol. 734
Vol. 734
Applied Mechanics and Materials
Vol. 733
Vol. 733
Applied Mechanics and Materials Vol. 740
Paper Title Page
Abstract: Software engineering risk is an important issue in software engineering research and the formation and measuring of software risk is also a difficulty. Since the risk transmission effect is not considered in traditional software projects, based on risk element transmission theory and hidden Markov model, a new model called Hidden Risk Markov Model was proposed. The model takes into account the effect of software engineering risk transmission in different prototype stages on final software engineering risk and uses the observable risk element transmission to calculate the degree of engineering risk. Finally, an example of software engineering risk control was presented.
795
Abstract: This paper introduced the workflow concept, analysis of the Activiti5 open source workflow management system architecture. And from a practical point of view, to training system task workflow as an example, a detailed analysis of the design scheme of task workflow. The scheme in the practice application received good results in the training system.
802
Abstract: Because of the nodes inherent rationality, P2P network system will generate the free-riding that will result in conflict between the personal interests and the system performance. This kind of free-riding will significantly reduce the network efficiency and utility. A set of social norms and model applied in media streaming will be established based on the social norm in combination with taxation mechanism. This model can punish the nodes that have evaded tax and stimulate the node to remit taxes. The results of the simulation experiment show that the model can both promote the nodes to pay taxes and reduce the wealth gap between nodes.
806
Abstract: Retracted paper: SQL injection came with a bang and caused revolution in database attacking. Inrecent years, with the explosion in web-based commerce and information systems, databases havebeen drawing ever closer to the network and it is critical part of network security. This paper is incorporated with our research and firsthand experience in hacking the database by SQL injection. Database is the Storage Brain of a website. A hacked database is the source for Passwords and juicy information like credit card number, bank account number and every important thing that are forbidden. Importance should be given for preventing database exploitation by SQL injection. The aim of this paper is to create awareness among web developers or database administrators about the urgent need for database security. Our ultimate objective is to totally eradicate the whole concept of SQL injection and to avoid this technique becoming a plaything in hands of exploiters.
810
Abstract: This document discusses an instant communication method of design and development based on Socket local area network. Based on the Socket local area network communication, software can provide for the original enterprise a good, safe, fast communication mechanism. It achieved without any changes for the original Local area network (LAN) hardware, and in the enterprise internal communication, discussion and other applications, it has a certain practical value.
815
Abstract: Device-to-Device (D2D) communication allows user devices in proximity to directly communicate with each other through reusing resources in cellular communication system. D2D improves the system capacity while it also raises some challenges on interference. This paper adopts reconfigurable antenna in D2D communication generating directional signal transmission between D2D pairs which mitigates the interference to other users. The simulations show that such scheme improve the system capacity compared to the traditional one.
819
Abstract: Firstly, the characteristics of regular Zigbee localization algorithms-the received signal strength indicator algorithm (RSSI) and the weighted centroid localization algorithm are introduced. Then, the factors of the errors existing in the aforementioned algorithms are analyzed. Based on these above, the improved RSSI algorithm-correction geometric measurement based on weighted is proposed. Finally, utilizing this algorithm to design and implement the localization nodes, which have the CC2431 wireless microcontroller on them. The simulation and experimental results show that the accuracy of this localization algorithm improved about 2%, comparing with the regular algorithms.
823
Abstract: An adapted prediction algorithm for H.264 is proposed in this paper. For I frames, a new intra algorithm is proposed in which a novel Intra_4×4 mode selection method is designed. Nine Intra_4×4 modes are divided into three classes, the suitable mode class for current 4×4-block is predicted using the mode classes of neighboring left and up blocks. For inter frames, a new inter prediction algorithm is proposed, and two matrixes which are composed of sum of absolute values of the integer transform coefficients in 4×4-residual-block contained in luminance 16×16-block and 8×8-block are defined respectively, the novel MB and sub-MB mode selection criteria which use the derived gradients of the two matrixes are then proposed.
830
Abstract: Nowadays, China is stepping into an aging society, and most people care about their personal health with the Chinese economic development. Chronic-diseases have become the major threat to the elder people in China. In order to ensure a real-time health care for the elders, we propose health cloud platform with IoT for community health service. The platform includes IoT health services subsystem, health cloud application service subsystem and data management subsystem. The System development and service scheme is composed of six parts according to the function: front-end data acquisitioning module, message middleware, storage center, data mining center, medical graphics image processing center and presentation layer. The health cloud platform has two main functions: real time medical care technology and personalized health service. The successful deployment of health cloud can take demonstration for others application, and promote itself cloud computing technologies development.
834
Abstract: Trust is part of the main problems in the development of C2C e-commerce. Calculating the value of reputation based on feedback rating is an effective way to create trust in e-commerce transactions. This paper proposes a computing model built on the reputation of e-commerce by introducing a feedback score, the transaction value, time, penalty factor and other parameters. Simulation results demonstrate that the model can effectively prevent the credibility of slander, reputation hype, reputation conspiracy and other issues.
839