Advanced Materials Research
Vol. 854
Vol. 854
Advanced Materials Research
Vol. 853
Vol. 853
Advanced Materials Research
Vol. 852
Vol. 852
Advanced Materials Research
Vols. 850-851
Vols. 850-851
Advanced Materials Research
Vol. 849
Vol. 849
Advanced Materials Research
Vol. 848
Vol. 848
Advanced Materials Research
Vols. 846-847
Vols. 846-847
Advanced Materials Research
Vol. 845
Vol. 845
Advanced Materials Research
Vol. 844
Vol. 844
Advanced Materials Research
Vol. 843
Vol. 843
Advanced Materials Research
Vol. 842
Vol. 842
Advanced Materials Research
Vols. 838-841
Vols. 838-841
Advanced Materials Research
Vol. 837
Vol. 837
Advanced Materials Research Vols. 846-847
Paper Title Page
Abstract: Digital campus is an important part of university construction, original campus network teaching, research, management, service and other application system, use a separate identity authentication, neither convenient memory, but also manage and maintain trouble. Contrary to identity authentication problem, this paper research uniform identity authentication key technology, include uniform identity authentication system model, remote authentication dial in user service, lightweight directory access protocol and so on. Uniform identity authentication is the foundation work of digital campus, the disperse user centralized management and permissions resources, help achieve the intranet information portal user uniform authentication, simplify user accessing to the internal process of the application system, so users only need to pass uniform identity authentication once have permission to access all resources.
1685
Abstract: In order to improve the user’s experience in using mobile applications, a layered context-aware agent for mobile applications was proposed based on user’s needs hierarchy. In the proposed model, the layers were employed to distinguish different types of needs in the hierarchy and the priority of different layers was used to determine the time for showing the recommendation information. At first, the agent framework was proposed. And then, based on the proposed framework, the layered context-aware agent was developed based on the Maslow’s theory. At last, an experiment was conducted on the comparison between two methods of the random model and the proposed layered model for sending recommendation messages. And the result verified that the proposed agent was effective.
1689
Abstract: Enterprise's information integration can combine the variety of information resources and business of the enterprises organically, realizes the integration crossing over system border. The purpose is to integrate the existing platform, database, application and server together organically step by step from the data aspect, to solve "information island" and the problem existed in information interact. This paper analyses the disadvantages of the traditional integrated scheme and the advantages of integrated scheme based on Web Service, researches the present Web Service theory and correlated technology, and establishes the scheme of enterprise information integration based on Web Service, applies to the construction of campus informatization integrated database platform and realizes the campus database sharing.
1693
Abstract: Taking the AODV protocol as an example, the attack characteristics of different types of black holes are analyzed. Then, an attack model of black hole is established. Finally, the effects of black hole attacks to network performance are analyzed by simulations in different types and intensities. The simulation results show that this model can accurately simulate the impact of black hole attack on network performance and can provide reference and corresponding simulation environment for the security research of Ad Hoc network.
1697
Abstract: As the relational database be the main data storage mode, but the traditional keyword based syntactic matching defects in precision and recall. This paper provides a ontology matching mechanisms for relational database, which realizes the semantic level of the data retrieval by using the intelligent search technology from Agent and Ontology. The mechanism using DCL domain ontology, SQC services query policy, SearchPolicyMap mapping to solve the problems as data object description, retrieval conditions description, and the mapping between those two description. And provided the preconditions for the semantic matching under the relational database. Solve the semantic matching problem of interaction between human and Agent by the WI interface and CM mechanism . Solve the problem of interaction between Agent and relational database by the service customization Interface SBI. Finally, solve the problem of semantic retrieval and quantitative calculation by querying adapter QA and core algorithm CMA. The mechanism has a strong practicality and application domains independent. Can implement a specific level semantics of relational database retrieval through the application domain ontology creation and mapping configuration.
1701
Abstract: The authors present a new remote user authentication scheme on three dimensions for multi-server environments. The merits include: the scheme can be used in multi-server environments; the system does not need to maintain any verification table; the users who have registered with various servers do not need to remember different login passwords for each; the ability to choose passwords freely and change them offline; mutual authentication is provided between the user and the remote system; a session key agreed by the user and the remote system is generated in every session. Furthermore, we propose a specific Access Right (AR). The AR means the legal users have different level of authorization based on which server in the multi-server environment in used.
1707
Abstract: Mountain torrent is one of major natural disasters for humans. With the development of the Internet of things, the instrumented terminals, through which the host PC could obtain the real-time water and rainfall information and could alert to a coming disaster, have been widely applied to mountain torrent warning system. In order to ensure the effectiveness of network alerting, the program in the terminals need to be updated for some specific situations, but large quantities of terminals are usually built in complex terrain and fragmented geographically, so that it is difficult and expensive to update or repair the programs. In this paper, a method of remote update, realized on the BAM-4300 hydrologic remote terminal to update the complex programs via GPRS modules, was highly reliable. Experiments show that this method is of safety and reliability, and cumbersome processes of onsite update and maintenance could be avoided.
1711
Abstract: A simplified database access framework, which originated from a vehicle tracking system, is introduced. This framework is developed on Microsoft .NET platform and uses DAO.NET as the supporting technology. Meanwhile, Design Patterns [ were adopted in analyzing, designing and developing. The platform not only works effectively as a data-accessing layer for the vehicle tracking system, but also realized the idea of linking to the database once, using for many times. The platform reduces the cost of database connection initialization and accelerates the responding speed to users.
1716
Abstract: A Detection and Analysis algorithm base on BP neural network was proposed to solve the problem of low intercept rate, which was exist in traditional algorithm. The traditional algorithm cannot detect the intrusion effectively because the intruder was always combined with other computer virus. The BP neural network can transfer the input to output with nonlinear method, the characteristic was extracted and compare, then the intruder can be detected and intercepted with higher probability. Compared with traditional algorithm, the new algorithm can intercept the intruder with 22% higher rate. Result shows good performance of the algorithm in the intrusion signal detection and excellent perspective in practice.
1720
Abstract: The author analyzes and researches the heterogeneous data of the food traceability system,then propose the template-based adaptive heterogeneous data processing algorithms. According to the algorithm, the middle-ware ,with the design of embedded RFID achieves the processing and integration of heterogeneous data . The middle-war it work with the back-end server online, but also possess high practicality when the network off-line works alone.Copyright © 2013 IFSA.
1724