Advanced Materials Research Vols. 926-930

Paper Title Page

Abstract: With the advent of cloud computing era, various types of Internet applications and large data emerging, database technology has to adapt to this change, the multitenant feature in Oracle12c supports widely for big data and cloud computing, and it is a new feature can be used in various database application scenarios.
2241
Abstract: According to the single sign-on authentication mode, cloud computing unified login authentication method was put forward, and point set topology changing method was used for generating fractal random key, improved login authentication safety grade. Firstly, analyzed cloud computing login authentication system structure, and then used network public databases of fingerprint image as an example do fractal changes ring operation, generated a pseudo-random sequence, then the sequence encrypted and sent to the server for authentication through UDP. Lastly, made a simulation example.
2245
Abstract: Abstract. For the present time being, tourist industry is thriving on fire and compute application software has been more and more widely used in tourist trade. However ,there is not yet such an application software as to offer advice to tourists, employees of travel agencies and senior managers. For that purpose, the author designs an application software for traveling tips. This paper focuses on several basic functions of the software and outlines the background of the research and its significance and describes the objective,the major functions , the overall design , the function module and the implementation technology of this software.
2249
Abstract: In order to enrich campus card recharging methods and improve the cardholders experience, this paper first briefly introduces the campus card online recharging modes based on the third-party payment platform, then analyzes the business processes of the self-help recharging mode and the automatic recharging mode, introduces the validation processes of the transactions, and expounds the fund flows and the double reconciliation mechanism at last.
2253
Abstract: Computer technology has been widely applied in the field of security. The powerful computing power the microcontroller out of abundance and diversity of data processing, providing users with a friendly and intelligent service at the same time. With the development of multimedia technology and network technology, the applications of security requirements also reached a new stage. Considering the security itself the characteristics of high reliability and high availability, we need to do more complete design of safety monitoring system. This paper designed a system framework, it through data collection, analysis, processing, rules, criterion, violations, stop, and record all the process, to realize the protection and monitoring of all kinds of information in local or remote computer, and then it discusses the module and different function in the system.
2259
Abstract: Ontology definition metamodel has been widely adopted in aspect of building ontology. However existing ontology metamodel is only suitable for building ontology in a certain domain. With collaboration and sharing among multiple domains, we face the seriously problem that is how to overcome semantic interoperability. For this problem, we need to combine general ontology with domain ontology and merge all existing ontologies by ontology metamodel. In this paper, we define main components of ontology metamodel and present conditional context and contextual concept unit. In addition, we introduce the method of mapping between conditional context and contextual concept unit. Finally, we use an example about information retrieval to illustrate its function and analysis its feasibility.
2263
Abstract: With fast development of PBN flight procedures in our country, accuracy, integrity, alarm time, continuity and availability become more and more important for navigation source. Ground-based augmentation system (GBAS) is a satellite-based navigation technology and it is also an integrated system which is composed of ground equipment, air equipment, airborne equipment. In this paper, we firstly apply GBAS to increase the position accuracy of navigation system. The experiment shows GBAS has a lot of benefits and make a solid foundation for PBN flight procedure design.
2267
Abstract: This paper describes the design idea of yak farming hardware of remote image acquisition system, from the camera communication circuit, wireless communication circuit, power supply circuit for yak farms node wireless remote image acquisition, transmission system hardware design.
2272
Abstract: In view of the Gannan Tibetan yak breeding situation, proposed the Gannan yak disease early warning system based on Internet of things technology, from the model base management, information management, assessment prediction of disease,disease alarm four aspects of the design of the system framework.
2276
Abstract: With the increasing of input data size, process cost will be very long, for the explosive growth of the Internet data even reached the point of single machine can handle. This article mainly introduces the architecture of the concept of cloud computing and, the mainstream of the analysis of the current data mining algorithms, based on cloud computing to develop the data mining system, providing the operation feasibility of data mining in cloud computing platform, having strong guiding significance.
2280

Showing 521 to 530 of 1117 Paper Titles