Advanced Materials Research Vols. 756-759

Paper Title Page

Abstract: The e-government is an important content of the national government informational progress, it has far-reaching significance, it's security also faces many threats and challenges, it has frequent occurrence of security incidents. To control such a huge security risk and avoid huge losses, and protect the security of e-government, this paper constructs the e-government security plan system, in the design of the system, the security protection of e-government system and institution, emergency response system and mechanism are made as a major part of the design, security protection include security management and technology, and quantitatively analyze the security services performance assessment standards, and detailedly design security services performance assessment algorithm, and the algorithm is integrated into the security management and is verified by an instance, the plan system can do a better safety risk assessment, can control certain risks and losses.
1580
Abstract: The purpose of WEB data extraction and integration is to provide the domain oriented value-added services. Based on the requirements of domain, and the features of web pages data. this paper proposes a WEB data schema and a domain data model. It also puts forward the web table positioning and web table records extracting based on WEB data schema and an integration algorithm based on the main data model. The experiment results are given to show effectiveness of the proposed algorithm and model.
1585
Abstract: Fully automatic methods that extract structured data from the Web have been studied extensively. The existing methods suffice for simple extraction, but they often fail to handle more complicated Web pages. This paper introduces a method based on tag path clustering to extract structured data. The method gets complete tag path collection by parsing the DOM tree of the Web document. Clustering of tag paths is performed based on introduced similarity measure and the data area can be targeted, then taking advantage of features of tag position, we can separate and filter record, finally complete data extraction. Experiments show this method achieves higher accuracy than previous methods.
1590
Abstract: At the moment Semantic Business Process Model (SBPM) build on the semantic annotation, the specification of process activity, the control flow between activities and business functions of process. However, the correctness of SBPM is based on technical knowledge and experiences of the model designer, which is apparently not feasible for complex and dynamic business processes. Therefore, the goal of this paper is present a formalization description which was understood by business experts and model designers, establishing a new method to verify the consistency between SBPM and requirement of enterprise. Our techniques are based on the SWRL and Business rule.
1595
Abstract: This paper discusses some basic problems of information visualization and knowledge organization, introducing the basic ideas and applications, and focused on information visualization tools in the field of knowledge organization with examples.
1600
Abstract: Cloud computing has already became one of the most sought-after center topics in the global IT industry, not only IT companies and the famous Internet enterprise, but also in each fields related to computer and the Internet are research and apply the cloud computing. The technology related to Cloud computing has also changed. This paper presents a hybrid P2P network model in the environment of cloud computing, defines the model, research and design the structure of the model, using DHT algorithm located the resource of Hash ring and analyzed the ring node in-and-out in detail. Finally, using the related mathematical theory deduce the performance evaluation results that the model of node can be hierarchical classification, improve the efficiency of information positioning and searching.
1605
Abstract: In order to solve the problem of concepts and terminology inconsistent of cross-organizational business process management, we have studied the methods of Domain Ontology construction and BPMNO elements, and constructed Meta ontology model of Logistic Warehousing business process. According to this, we further construct Logistics Warehousing domain ontology described by BPMN elements that makes it semantic.
1610
Abstract: In recent years, with a rapid development of some certain equipment, the level of technical support capabilities has become the key point to restricting the development of combat capability of armed forces. Based on the characteristics of technical support work of some certain equipment, this paper uses the theory of management information system (MIS) to discuss the design program of technical support management information of RFID-based some certain equipment from the basic functions of the system, architecture, hardware and software design and key technologies of system realization.
1615
Abstract: The construction of green mining is a transformation for mine enterprise management method. The technology innovation ability of Coal mine is a key aspect in green mining selection, and seriously impacting on competition. This paper analyses the data of coal mine which had participated in green mining competition, and gives a more reasonable evaluation rules by decision tree. The main methods process is calculated the information entropy of evaluation index in technology innovation ability, with its numerical size as classification node sort the basis. Through the reasonable form pruning decision tree, complete decision tree corresponds complete evaluation rules. Putting the original coal mine enterprise data into evaluation rules, the correctness of the evaluation rules were verified by evaluation results.
1620
Abstract: There may be exist multiple applications in the Java Smart Card, JCVM need to allocate memory space for each object during its running. As the restriction of the physical size of the Java Smart Card itself, the capability of the memory is usually small. It is very necessity to how to use efficiently the limitation resource. In order to solve this problem, In this paper, we will analyze the strategy of memory allocation. Considering the uses of the Java Smart Card, we will be analyzing several memory recovery algorithm, then determine the garbage, and design a kind of method of JCVM garbage collection, which can guarantee meet users tolerable time when trading.
1625

Showing 331 to 340 of 959 Paper Titles