Advanced Materials Research Vols. 765-767

Paper Title Page

Abstract: During the last few years, the integration and sharing of the urban traffic information is one of the popular topics, further comparison and analysis carried out on these different methodology and technology available to the issue, and the 3G network model is built. The model is used to discuss the integration and sharing of the transportation information based on the 3G model, and it is useful to the further formulation of the unban traffic information.
1469
Abstract: The rural informatization refers to the widespread application and promotion of communication technology and computer technology in rural production, life and social management, and is a very important part of social informatization. Following the development of IT and advance of new socialist countryside, rural information management as the core content of rural informatization construction has the direct impact on the level of rural information service. Based on the analysis of situation and existing problem of China's rural information management, an rural information management multi-level platform based on cloud computing was provided. The theory, technology, service and deploy model and characteristic of cloud computing were discussed in detail. Combined with the characteristics of rural information data, requirement definition of this platform was analyzed. The basic concept, model of design and method of implementation of this platform was discussed in details.
1473
Abstract: Risk assessment is the key and core technologies ensuring IT system security. Based on the comprehensive analysis to complex information systems, this paper first summarizes the typical characters of complex information systems and then gives new risk factors that complex system need to face. Furthermore, a new risk assessment method is proposed to evaluate the complex information systems. The method takes full account of the effect of complexity of complex information systems in each process of risk assessment, and utilizes multi-level risk views to carry out in-depth analysis to the risk of complex system.
1481
Abstract: With the development of network, the computer systems of universities in China gradually use network management and services. However, in network the system faces security threats like virus, malicious software and human attack, which may cause data damage, missing and stealing of confidential documents, or even lead to the breakdown of network system. Therefore, it is important to promote the security of computer network systems of universities. This paper gives the comprehensive analysis on the security system of computer network systems of universities in China, analyzes the factors easily leading to the security and provides suggestions and reference for network construction.
1486
Abstract: Web service selection has been a hot research area in recent years. In order to improve users satisfaction of service selection, optimization algorithm and recommendation algorithm have been used in the web service selection process. This paper uses context information in selecting and implementing process of Web services recommendation to make the recommendation result more accurate. According to different users different requests, combining with contexts obtained from environment, we give matching recommendation strategy suitable for the current situation, personalize the recommendation process and make it possible to improve the accuracy of the recommendation result.
1490
Abstract: Understanding the online user behaviors in the mobile app markets is vital for the development of mobile app ecosystems. However, user transaction data is difficult to obtain by the general research community so that little efforts have been paid to measure such behaviors. Therefore, we develop novel approaches to characterize the user behaviors. We firstly exploit app networks from the app market, which are derived from user behaviors thus capture the behavior features. We then introduce the metrics of network measurement and propose a new method to measure the app similarity. Using these metrics and methods, we generate statistics of the app networks and reveal patterns and motivations of user behaviors, which may give fundamental data and motivation supports for future works.
1494
Abstract: Industrial cluster is a complex network composed of different enterprises in the industry chain. Based on BA and LC network, this paper designs a cluster complex network model, and analyzes its distribution characteristics. The result shows that the industrial cluster network degree obeys power-law distribution, while the size of the industrial clusters initial node can influence the degree distribution.
1498
Abstract: In this paper, we propose an improved topic detection method based on the HowNet semantic expansion. Using the HowNet to extent the VSM of micro-blog content, solve the problem that the similarity calculation is not accurate because of the length of the micro-blog text is too small and the gap of user comments number is too large through the two-step above. The similarity calculated accurately, would there be a good clustering effect. Put forward a more complete topic heat assessment methods that take into account the number of fans of the Micro-Bo users, the number of forwarding Micro-Bo text, comments, and time factors.
1502
Abstract: This paper presents the Component-Based Software Engineering (CBSE) approach for usability testing of a web-site based on ISO 9241-11 usability guidance to achieve specified goals with effectiveness, efficiency and satisfaction. Usability testing is a technique used to evaluate a product by testing it on users. A particular type of website i.e. university web site was chosen and segmented in different components in modular forms according to the purpose of that component. Then component wise tasks as per ISO 9241-11 usability guidance were prepared to carry out the usability testing for evaluating the test web-site. After analyzing the results of component based usability testing, a proto-type version of the test web-site was designed in a limited form including all the feedback of test results. Finally, the proto-type web-site was re-evaluated for establishing the effectiveness of component based web usability method with the same tasks. The proposed component based usability testing method is expected to improve the design/content issues of web-site resulting the web-site much more user friendly, effective and less time and cost consuming.
1507
Abstract: How to detect Botnet has become a very important problem in security network. The existent detection methods based on network traffic and host behaviors cant handle the emergency Botnets. In this paper we present an optimized method to analyze the similarity and time period of Botnets behaviors. In the end, our method gets an effective result. Our method uses the IDS-like architecture, which develops six specific components to detect six important Botnets abnormal behaviors. And it builds correlation rules to calculate match score. Through the experiments described in the paper, we can see that our method can not only detect already known Botnets precisely, but also detect unknown Botnets to some extent. The experiments prove that our method is effective and it has some advantages compared with other methods. At last, the paper proposes the future direction and the points that need to be improved.
1512

Showing 321 to 330 of 717 Paper Titles