Advanced Materials Research
Vol. 1001
Vol. 1001
Advanced Materials Research
Vol. 1000
Vol. 1000
Advanced Materials Research
Vols. 998-999
Vols. 998-999
Advanced Materials Research
Vol. 997
Vol. 997
Advanced Materials Research
Vol. 996
Vol. 996
Advanced Materials Research
Vol. 995
Vol. 995
Advanced Materials Research
Vols. 989-994
Vols. 989-994
Advanced Materials Research
Vol. 988
Vol. 988
Advanced Materials Research
Vols. 986-987
Vols. 986-987
Advanced Materials Research
Vols. 984-985
Vols. 984-985
Advanced Materials Research
Vol. 983
Vol. 983
Advanced Materials Research
Vol. 982
Vol. 982
Advanced Materials Research
Vol. 981
Vol. 981
Advanced Materials Research Vols. 989-994
Paper Title Page
Abstract: Network information filtering can be projected into link prediction in bipartite network to alleviate information overload. The paper discovers that node transfers redundant recommendation energy in network and gives bad effect on information filtering efficiency. Gathering node’s overlapping degree by factorizing negative matrix, redundant energy is reduced with overlapping degree and initial recommendation energy. The method endows information filtering system with dynamic recommendation prediction, the empirical results indicates the method can enhance information filtering performance.
4400
Abstract: In Wireless Sensor Networks (WSNs), besides the energy efficient, trust and Quality of Service (QoS) supported should be considered under some circumstances. All of them unveil additional challenges for routing scheme design. Based on Hybrid Energy - Efficient Distributed clustering (HEED) protocol, this paper presents a trust QoS routing algorithm for WSNs. Hierarchical structure is adopted and the trust value of the node is constructed by the direct trust value and the indirect trust value. In HEED, the combination of the trust value and residual energy as the main parameter and the propagation delay as the secondary parameter. The former guarantees the credibility of the data transmission, and the latter ensures the load balance of the entire network. Compared to typical routing algorithms of sensor networks, the proposed algorithm has better performance.
4405
Abstract: This paper analyzes and summarizes existing ring signcryption schemes, combined with self-certified cryptosystem and ring signcrypption, we proposed a self-certified ring signcryption based on Discrete Logarithm Problem. The scheme proposed not only guaranties ring signcrption’s anonymity, confidentiality, unforgeability and other security features, but also solves certificate management and key escrow issues, which can save storage space and communication cost. By removing bilinear pairings in the process of design, the efficiency of this scheme has been greatly improved. Concluded from the experimental results, this scheme has the advantages of high computational efficiency, high security, and low communication cost.
4409
Abstract: The paper, in which Government Affair Workflow Model as an illustrated application is discussed, clarifies nature and concept of Ontology. Based on the characteristics of the workflow model and application of Government Affair Workflow , this paper puts forward Government Affair Workflow Model and creates a Workflow Meta-Model, Document Meta-Model and Determent Meta-Model and offers framework of OWL+RDF+XML. It is proved in the experiments that Ontology can be applied effectively in Government Affairs Workflow.
4413
Abstract: Random Boolean networks have been proposed as a basic model of genetic regulatory networks for more than four decades. Attractors have been considered as the best way to represent the long-term behaviors of random Boolean networks. Most studies on attractors are made with random topologies. However, the real regulatory networks have been found to be modular or more complex topologies. In this work, we extend classical robustness and entropy analysis of random Boolean networks to random modular Boolean networks. We firstly focus on the robustness of the attractor to perturbations with different parameters. Then, we investigate and calculate how the amount of information propagated between the nodes when on an attractor, as quantified by the average pairwise mutual information. The results can be used to study the capability of genetic information propagation of different types of genetic regulatory networks.
4417
Abstract: The quality and effect of network instruction is largely affected by the effectiveness of network instruction interaction. Firstly, we explain the definition and elements of network instruction interaction, as well as the concept of interaction of network instruction platform. Then, we focus on the overall analysis of network instruction interaction from the horizontal and longitudinal aspects. In the horizontal analysis, we discuss the network instruction interaction mode in detail. In the longitudinal analysis, we integrate all the instruction modes to introduce the instruction interaction hierarchical model. As the network instruction platform is a key element in the implementation of network instruction, its interactivity greatly affecting the effectiveness of network instruction as well, we finally design network instruction interaction mode including interactive classification and overall architecture of network instruction platform, in order to provide information technology support to create flexible network instruction interaction environment.
4421
Abstract: With the rapid development of information society, the number of information data transmitting in the Internet is growing quickly, so congestion control becomes very important and it is a hot research field on the Internet now. In this paper, the sliding window, reasons and TCP algorithms of congestion control such as slow start, congestion avoidance, fast retransmit and fast recovery are discussed. Different TCP versions about congestion control are studied and analyzed. As a result, improvements on the congestion control algorithm and the research is still an important topic in the study of Internet congestion control.
4427
Abstract: Cloud computing is getting more and more attention from the information and communication technologies industry recently, security issues is becoming more important. Forensics technology on cloud computing is becoming a researched focus. In this paper, we discuss the impact and challenges to digital forensics, finally we present the improved measure of log and forensics system based on logs on SaaS.
4432
Abstract: To describe the performances of a new kind of neural network, the complexity for training neural network using orthogonal weight functions is analysed. The full adders are used as the neurons of the neural networks, and the weight functions are orthogonal functions. We derive the relationships of the iteration time with the number of input dimensions, output dimensions and training patterns. Finally, some simulation examples verified the theoretical results obtained in this paper.
4437
Abstract: Software Crowdsourcing development model shows the increasingly strong advantage in solving the development of ultra large scale system, mode of development of this new software development process chang to mass, openness and community. At the same time, Software Crowdsourcing development process also reflects the strong competitive, crowdsourcing software development mode is a periodical process of releasing requirement-bidding competition-software review.In order to promote the community members to collaborate, compete and develop, and to improve the software development efficiency and quality,This paper discusses the group in the process of Software Crowdsourcing development, reward and remuneration of reputation and ranking, corporate governance.thus,we can Improve process management, improve the quality and efficiency of software development.
4441