Advanced Materials Research
Vol. 854
Vol. 854
Advanced Materials Research
Vol. 853
Vol. 853
Advanced Materials Research
Vol. 852
Vol. 852
Advanced Materials Research
Vols. 850-851
Vols. 850-851
Advanced Materials Research
Vol. 849
Vol. 849
Advanced Materials Research
Vol. 848
Vol. 848
Advanced Materials Research
Vols. 846-847
Vols. 846-847
Advanced Materials Research
Vol. 845
Vol. 845
Advanced Materials Research
Vol. 844
Vol. 844
Advanced Materials Research
Vol. 843
Vol. 843
Advanced Materials Research
Vol. 842
Vol. 842
Advanced Materials Research
Vols. 838-841
Vols. 838-841
Advanced Materials Research
Vol. 837
Vol. 837
Advanced Materials Research Vols. 846-847
Paper Title Page
Abstract: Traditional teaching management mode can't meet the needs of the teaching management information age, to develop the management system of college English learning, is the extension and expansion of conventional English teaching in English teaching and the inevitable requirement to improve the quality of English teaching. Aiming at the existing problem of system development, this paper makes research on the frame structure. First of all, the research consists of eight functions to complete the whole learning process management function framework; then, study on the technology framework is composed of model, view and controller, design concept is decoupling performance logic and business logic through controller; Finally, the work principle of the struts2 framework, and the working process is described. In this paper, the research content, improve the labor productivity of software development, changed the traditional mode of software development, plays an important role in improving college students' English level.
1558
Abstract: Scheme selection and decision-making is the important link of the feasibility study phase, determines the success or failure of the software project and benefit, determines the future and destiny of the entire project. For software project scheme selection and decision-making difficulties on the basis of study selection and decision theory method, show the specific examples of decision-making. The main research study the common methods of operational research, including definite decision-making, Uncertain decision-making, risk decision-making etc, in which Uncertain decision-making studied max-min regret rate method and optimistic coefficient method. The results show that this research method has important practical value for software project scheme selection and decision-making, specific application should be combined with the software project reality, take various factors into account, make scientific decision-making.
1562
Abstract: With the continuous development of online shopping, a day will generate tens of thousands of consumer records. E-commerce sites want to recommend the consumers that they may be interested in the products by analyzing the consumer historical consumption data. However massive consumer records led to recommendation speed getting slow by using the traditional personalized recommendation algorithm. By researching on the collaborative filtering algorithm based on ALS and the MapReduce parallel programming model, we explore parallelization of collaborative filtering algorithm based on ALS. The experimental results show that the algorithm in this paper can improve the computing efficiency.
1566
Abstract: Data security and privacy protection of cloud computing as a new IT application mode are the most valued and concerned issues of the cloud user,and thus of utmost significance to the security of cloud computing. This paper describes and analyzes in detail the risks of data security and privacy showup brought by cloud computing,discusses the protective approaches of data security and privacy in cloud computing environment. Furthermore, this paper based on the newly developed fully homomorphism encryption then proposed a data security scheme which can operate encrypted data directly on cloud server without decrypt while all communication between client and server is encrypted, it can assure data security at the mean time assure the operate efficiency.
1570
Abstract: The era of Web 2.0 has been coming, and more and more Web 2.0 application, such social networks and Wikipedia, have come up. As an industrial standard of the Web 2.0, the XML technique has also attracted more and more researchers. However, how to mine value information from massive XML documents is still in its infancy. In this paper, we study the basic problem of XML data mining-XML data mining model. We design a multi-level XML data mining model, propose a multi-level data mining method, and list some research issues in the implementation of XML data mining systems.
1574
Abstract: With the rise and rapid development of the systems biology, in order to explore the relationship between different levels of Bioinformatics relevance, the need of integrated visualization of biological scientific computing data at different levels is increasingly urgent. This paper propses a molecular structure and genome sequence synthesized visualization metadata model, and then implements the integration management of the visualization data of molecular structure and genome sequence. This method can effectively support the development of visualization capabilities of molecular structure and gene sequence. Based on the XML technology, by deep researching in the field of visualization data format and applying this synthesized visualization metadata model, this paper designs and introduces the conversion method for visualization data of molecular structure and genome sequence. Ultimately, based on this synthesized visualization metadata model, a synthesized visualization prototype system for molecular structure and gene sequence (VMG) has been developed.
1578
Abstract: To solve the problems of ciphertext storage and query on cloud, this paper proposes a ciphertext query algorithm according to the multiplication homomorphic encryption characteristic of RSA. Moreover, this paper sorts and displays the query result of the ciphertext efficiently by the ciphertext similarity, which is the combination of inclined angle's cosine of vector, vector's mapping length and words' weight. Finally, the ciphertext query time is investigated in a lab environment. The ciphertext query time is considered as acceptable to users.
1582
Abstract: With the rapid growth of colleges and universities teaching affairs and resources, the amounts of data also grow rapidly. The data also requires stricter than ever on the data security and efficiency. So it has become the top priority of the School information-building department to keep the valuable data safe, reliable and integrity. This article describes the design of the campus storage and backup solutions based on the SAN, to meet the common needs of multiple applications in the files, databases, office business, to achieve the unified allocation and management of the resource sharing.
1590
Abstract: With the application of cloud computing, in data storage, data management, and more widely, how to ensure that cloud computing data security is becoming an important research direction. This paper analyzes the cloud computing data security issues, discusses the cloud computing data security technologies, and proposes a cloud data security solution and the corresponding security mechanism.
1595
Abstract: Cloud computing based on a large number of distributed computer gathers a wide variety of computing resources data and builds huge virtual resources space and provides information technology resources for the majority of computer users through the Internet. Security issues is one of the core elements which constrains the depth development of cloud computing. It also is the hot issue of research in this field. This paper first analyzes the architecture and threat signatures of cloud computing system and data application model based on the data of cloud computing and data security threat characteristics. It builds a data security implementation model under cloud computing. Based on this, it builds information security model of cloud computing strategy and analyzes configuration program of the model in the cloud computing.
1600