Advanced Materials Research
Vol. 1001
Vol. 1001
Advanced Materials Research
Vol. 1000
Vol. 1000
Advanced Materials Research
Vols. 998-999
Vols. 998-999
Advanced Materials Research
Vol. 997
Vol. 997
Advanced Materials Research
Vol. 996
Vol. 996
Advanced Materials Research
Vol. 995
Vol. 995
Advanced Materials Research
Vols. 989-994
Vols. 989-994
Advanced Materials Research
Vol. 988
Vol. 988
Advanced Materials Research
Vols. 986-987
Vols. 986-987
Advanced Materials Research
Vols. 984-985
Vols. 984-985
Advanced Materials Research
Vol. 983
Vol. 983
Advanced Materials Research
Vol. 982
Vol. 982
Advanced Materials Research
Vol. 981
Vol. 981
Advanced Materials Research Vols. 989-994
Paper Title Page
Abstract: Opportunistic networks are similar to the mobile ad hoc networks (MANETs) that does not have fixed infrastructure, and the messages can be transmitted by nodes in a "store - carry - forward" approach. The mobile nodes randomly move, which result in a constantly changed network topology and frequently interrupted link. Thus, multipath routing has been proposed to improve the stability of link, extend path lifetime and reduce packet loss rate. The paper first analyzes the traditional multipath routing protocol and its path selection theory, and then investigates quality of service (QoS) metric to improve transmission efficiency of opportunistic networks, and finally proposes a reliable node based on multipath QoS routing protocol, named as RNMR. In RNMR, the stable path contains primary path and two backup paths. The primary path consists of reliable nodes and intermediate nodes, and the two backup paths are formed by two disjoint sub-paths selected from two adjacent and reliable nodes. By comparing with the backup source routing (BSR) protocol and greed-based routing (GBR-WB) protocol, the paper proves RNMR protocol has longer path lifetime, deliver rate and relay are also improved.
4669
Abstract: In this paper, we propose to use Web Workers [1], isolated parallel threads in current browser working in the background, to enforce privilege separation in chrome extensions. Our tests show that our design is applicable to most chrome extensions (those not using the jquery library) and achieves a reduction in TCB up to 77 percent for our examples. Our implementation shows that our design is efficient enough to enforce privilege separation in chrome extensions and not needs to modify the browser or learn new high-level languages.
4675
Abstract: Information theoretic metrics is popular theory to measure anonymity. However the difficulty in getting the probability distribution of subjects hampers its practical usage. In this paper we propose a Bayesian inference method to tackle this problem. Our method makes it possible to compare the anonymity of different anonymous systems. We use this method to analyze Threshold Mix and point out different system parameters which do and do not have influence on anonymity.
4680
Abstract: At present, existing methods are difficult to analyze the Safety of Multitasking and complex timing sequence software. In order to overcome this difficulty, a new analysis method of multiple state transfer and real-time logic analysis method (MSTRT-TPN ) is proposed. This method extends the time Petri net analysis rules and proposes the concept of synchronous synthesis and sharing synthesis. It combines temporal logic and state transition, establishes software failure model. Through the model, the possibility of high-risk state of software can be analyzed. The effectiveness of the proposed method is verified through application in three protection device software which is typical safety-critical military software.
4684
Abstract: With the growing demand for information, it has a strategic importance for the future of sustainable development how to create a safe and robust network system to ensure the security of important information. Intrusion detection technology can proactively react against intrusion behavior and adjust its strategies in time. So it provides an effective means for network security to minimize or avoid loss when network system is attacked. It is an important part of network security system. This article first explains the current framework and the working principle of SDN. Then it explains the existing security threats of current framework. Next intrusion detection system based on SDN is proposed after the introduction of the intrusion detection system. And we made experiments to verify it. Finally we analyze the lack of the structure and propose some improvements.
4690
Abstract: In recent years, the OTT (Over The Top) was very popular in the communications industry and the mobile Internet industry. The behavior of Internet companies such cross operators, to develop a variety of value-added services and products Internet-based or mobile-Internet-based poses a serious threat to the operators’ benefits. In order to change this situation and enhance their competitiveness, it is necessary for the operators to find new interests growth point. So the concept of three-dimensional mobile operators is proposed, and the nature of the pipeline, such as systematicness, spatiality and openness were studied. Finally, the application of 3D pipeline in mobile e-commerce is researched.
4694
Abstract: To discover the existing or possibly existing vulnerability of present authentication protocol, we proposed a structure of authentication protocol analysis, which consist of white box analysis, black box analysis and indicator system as the three main functional components. White box analysis makes use of the transformation from MSCs (Message Sequence Charts) to Promela (Process Meta Language), the input language of the remarkable model checker SPIN; black box analysis is based on the attack platform of authentication protocol analysis; indicator system is decided by deducibility restraint methods. Compared with the UML modeling methods based on Promela, the MSC2Promela methods we figured out on the context have more advantages than its disadvantages. Finally, we proposed a structure of authentication protocol analysis based on the transformation from MSC2Promela, which makes sense to the later work on the area of authentication protocol analysis.
4698
Abstract: The current most news recommendations are suitable for news which comes from a single news website, not for news from different news websites. Little research work has been reported on utilizing hundreds of news websites to provide top hot news services for group customers (e.g. Government staffs). In this paper, we present hot news recommendation system based on Hadoop, which is from hundreds of different news websites. We discuss our news recommendation system architecture based on Hadoop.We conclude that Hadoop is an excellent tool for web big data analytics and scales well with increasing data set size and the number of nodes in the cluster. Experimental results demonstrate the reliability and effectiveness of our method.
4704
Abstract: With the increase of the scale and complexity of software system software crowdsourcing development have gradually favored by the industry and scholars, to solve the large-scale, large system to develop effective solutions. In this background, this article first introduces the crowdsourcing the basic framework of the development process of software, the basic framework of crowdsourcing and then based on the software development process of put forward a comprehensive software Quality (Quality), the software task Cost (Cost) and software (Value) of a reward QCV model. Finally, this paper, by using data from the topcoder, the QCV process model is verified, it is concluded that the software quality, software cost and interaction relationship between reward.
4708
Abstract: Although the construction of E-government in our country has advanced into the era of E-government 2.0 from E-government 1.0, whose development greatly promotes the integration and improvement of governmental public service and management ability. Basic government is the main supplier of lots of public services,and for basic government,using E-government 2.0 to provide and to improve public service is an important mean to improve service quality and efficiency.However,in practice,E-government still faces obstacles in aspects of concept,institution and resource in the application of basic public service.Eliminating these obstacles,and promoting E-government 2.0 to function,will further improve the efficiency and level of basic public service.
4713