Advanced Materials Research Vol. 679

Paper Title Page

Abstract: As the development of Internet, E-commerce gradually becomes a new form of business activities; the security of the traditional cryptographic technique application method is under threat too. Not only domestic scholars but also foreign scholars are all devoting themselves to study the solutions faced to business application. Using cryptographic technique with E-commerce to the application of cryptographic technique and the development of E-commerce is very important to practical significance. This paper studied the security problems of e-commerce transactions and analyzed solutions combining the password techniques from the technology angle; moreover aimed at characteristics of E-commerce and the existing problems. The paper uses digital signature technology integration and digital signature design method to put forward the digital signature which is new and original. The E-commerce applies the digital signature to solve security work.
121
Abstract: Proposed a QoS model based differentiated service through analysis of quality of service requirements of system data in the coexistence of industrial control systems and Internet environment. And then focused on the queue scheduling problems, gave the mathematical expectation of the delay time and the buffers; provided an important basis for the design and configuration of the QoS.
127
Abstract: In web2.0 era, tag marks that users have become from passive consumers into active information creators. Users can create and use any tags which represent their will freely on the Internet; they can also share all kinds of tags which other users have created. At the same time, personalized information recommendation can solve the problem of the flood of information, so how to conduct personalized information recommendation based on tags has become the focus of many scholars. This paper summarized three categories about the information recommendation model based on tags: Graph theory- based model, Tensor-based model and Topic-based model, then the author put forward the defects of the existing model and the problems that need to be solved in the future, such as how to reduce noise, how to use social network analysis method to study social tag system and so on.
131
Abstract: In Web 3.0 times, Internet and Electronic Commerce develop rapidly, it is necessary to solve the problem which is how to recommend the personalized information to the user when the user faces numerous of information. But now, it is only studied from three aspects: collaborative filtering, content analysis, associated rules, which belong to the two sides based on the user and the goods. All of them dig the information from the individual records of history, or the user who similar to the record of history. After analyzing the content of web 3.0, this paper point out how to mining information from the perspective of semantic-formal concept analysis based on the user, and then draw the personalized information recommendation model. After analyzing the user’s information behavior, we can find the the user’s preferences, finally recommend the proper information about commodity to the user and improve the user's satisfaction.
137
Abstract: Database system is information aggregation. So the security of database is very important. This paper describes the research process of tracking SQL server database data tampered. Now we can monitor the important data in daily work. And providing a guarantee for the safety, accuracy of database.
143

Showing 21 to 25 of 25 Paper Titles