Advanced Materials Research
Vol. 1001
Vol. 1001
Advanced Materials Research
Vol. 1000
Vol. 1000
Advanced Materials Research
Vols. 998-999
Vols. 998-999
Advanced Materials Research
Vol. 997
Vol. 997
Advanced Materials Research
Vol. 996
Vol. 996
Advanced Materials Research
Vol. 995
Vol. 995
Advanced Materials Research
Vols. 989-994
Vols. 989-994
Advanced Materials Research
Vol. 988
Vol. 988
Advanced Materials Research
Vols. 986-987
Vols. 986-987
Advanced Materials Research
Vols. 984-985
Vols. 984-985
Advanced Materials Research
Vol. 983
Vol. 983
Advanced Materials Research
Vol. 982
Vol. 982
Advanced Materials Research
Vol. 981
Vol. 981
Advanced Materials Research Vols. 989-994
Paper Title Page
Abstract: As the study on and promotion of wireless sensor networks (WSN) are deepening, people have increasingly higher requirements for the transmission speed and transmission performance of wireless sensor networks. Network congestion is an important factor of the transmission performance of a network, so congestion control becomes a hot research topic in the studies on the improvement of WSN services. Based on the study on WSN congestion control mechanism, this paper proposes an adaptive congestion control algorithm and simulates the algorithm. The simulation result shows that this algorithm can ensure stable network performance.
4493
Abstract: This paper proposes the concept of software logical model, the basic idea and the approach of constructing the model. It describes the structure of this model, the ways of expression and the related definitions in detail. At the same time, it has also analyzed the application direction of this model. It discusses the roles playing on the aspects of research and the analysis detailedly, in which this model improves the performance of software, optimizes the structure of software and guarantees the software will run in security. Based on this model, a kind of early security warning mechanism of software is proposed.
4497
Abstract: Empty nest" is increasingly serious and jQuery Mobile (JQM) has become a mainstream UI framework for Mobile web development. According to which phenomenon, formulate 18 kinds of service items according to the practical needs of the old. Build modular interface by means of JQM, and then fill detailed function in each module combining with MySQL database. The content of the database includes service resources and information about the old, which need to be updated in real time. Realize foreground-background communication through SOCK_DGRAM. Results show that the platform can accomplish the prospective service for the old. This mode has low cost and strong scalability, and it is a new socialization care for the old platform which is clear to operate, supporting the use of resources and multi-party benefit.
4501
Abstract: The purpose of this paper is to basing on the design of the mobile e-commerce personalized recommender systems, presents a method of personalized recommendation product information, and makes every effort to provide effective personalized service solutions for mobile e-commerce sites.
4506
Abstract: In network traffic classification, by conventional PCA method, more features still exist due to uniform contribution rates for most of features. To overcome this problem, in this paper, a novel feature selection method is proposed to reduce data dimension of network traffic. A contribution rate of various features in each component is calculated by a new weight criterion. A maxima-order principle is proposed to determine feature selection. Based on three multi-class classification methods, performance comparison is conducted by actual traffic data with 10-fold cross-validation. Experiment shows that the proposed method has higher classification accuracy than conventional PCA method.
4510
Abstract: The BYOD (Bring Your Own Device) scenario puts traditional two-factor authentication into great security challenge. To strengthen the authentication in BYOD scenario, we propose a security compliance based mobile user authentication scheme, which includes a novel calculation method for device identifier, and a fine-grained compliance strategy and its management. The scheme provides a secure authentication mechanism for BYOD scenario and satisfies the requirements of device authentication in mobile user authentication.
4514
Abstract: To deploy network components of a security multicast which is based on the multicast group security architecture and its key management architecture, an IPv6 security multicast system using CA authentication is designed. The multicast group members use CA certificate to access network, while the role of Group Controller/key Server deployed in the network is to establish and manage the group key and negotiate SA with multicast source. The proposed scheme solves the problem of components deployment of multicast system with security, and has strong scalability as well which means various multicast protocols and group management protocols can run on this system.
4519
Abstract: A modified spreading dynamic model with feedback-mechanism based on scale-free networks is presented in this study. Using the mean field theory, the spreading dynamics of the model is analyzed. The spreading threshold and equilibriums are derived. The relationship between the spreading threshold, the epidemic steady-state and the feedback-mechanism is analyzed in detail. Theoretical results indicate the feedback-mechanism can increase the spreading threshold, resulting in effectively controlling the epidemic spreading.
4524
Abstract: Access control is an important technique which is used to protect system resources from damage by unauthorized users. With the advantage of web services, the access control module was released as web services interfaces. In order to control accessing to system resources and take advantage of web services,this paper proposes the web service-oriented access control (WSOAC) model. The development of access control is firstly introduced; after that the authors describe this model with two levels—platform and tenant and then present the execution process. At last, the paper summarizes the characteristics of the model and the next step.
4528
Abstract: This paper expounds the concept of art electronic commerce, analyzes the connotation of art e-commerce, and introduces some related security technology from security problems in e-commerce transactions so as to effectively eliminate safety troubles in e-commerce activities, guide and promote healthy and rapid development of art electronic commerce in our country.
4533