Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S...Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.展开更多
This paper proposed a two-tier location management mechanism (TTLM) by improving the current registration mechanism (CR) in IP Multimedia Subsystem (IMS). The TTLM includes the visited network registration and t...This paper proposed a two-tier location management mechanism (TTLM) by improving the current registration mechanism (CR) in IP Multimedia Subsystem (IMS). The TTLM includes the visited network registration and the home network registration, in which the visited network registration is responsible for re-registration in IMS. When subscriber roams, the location information of home network will be updated by the visited network based on the change of user equipment (UE)' s IP address. Thereibre the TTLM can reduce the times of IMS registration signaling. Using the proposed analytical model, the performance of the CR and the proposed TTLM were investigated. After the performance analysis of CR and TTLM by using proposed analytical model, the cost of CR in IMS could significantly be reduced theoretically and also was proven by simulation experiments.展开更多
This paper describes in detail the web data mining technology, analyzes the relationship between the data on the web site to the tourism electronic commerce (including the server log, tourism commodity database, user...This paper describes in detail the web data mining technology, analyzes the relationship between the data on the web site to the tourism electronic commerce (including the server log, tourism commodity database, user database, the shopping cart), access to relevant user preference information for tourism commodity. Based on these models, the paper presents recommended strategies for the site registered users, and has had the corresponding formulas for calculating the current user of certain items recommended values and the corresponding recommendation algorithm, and the system can get a recommendation for user.展开更多
基金supported by the Foundation for Key Program of Ministry of Education, China under Grant No.311007National Science Foundation Project of China under Grants No. 61202079, No.61170225, No.61271199+1 种基金the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-09-015Athe Fundamental Research Funds in Beijing Jiaotong University under Grant No.W11JB00630
文摘Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.
基金Supported by National Science Fund for Distinguished Young Scholars (No. 60525110 )National Basic Research Program of China (No.2007CB307100, 2007CB307103)+1 种基金Program for New Century Excellent Talents in University (No. NCET-04-0111 )Development Fund Project for Electronic and Information Industry (Mobile Service and Application System Based on 3G)
文摘This paper proposed a two-tier location management mechanism (TTLM) by improving the current registration mechanism (CR) in IP Multimedia Subsystem (IMS). The TTLM includes the visited network registration and the home network registration, in which the visited network registration is responsible for re-registration in IMS. When subscriber roams, the location information of home network will be updated by the visited network based on the change of user equipment (UE)' s IP address. Thereibre the TTLM can reduce the times of IMS registration signaling. Using the proposed analytical model, the performance of the CR and the proposed TTLM were investigated. After the performance analysis of CR and TTLM by using proposed analytical model, the cost of CR in IMS could significantly be reduced theoretically and also was proven by simulation experiments.
文摘This paper describes in detail the web data mining technology, analyzes the relationship between the data on the web site to the tourism electronic commerce (including the server log, tourism commodity database, user database, the shopping cart), access to relevant user preference information for tourism commodity. Based on these models, the paper presents recommended strategies for the site registered users, and has had the corresponding formulas for calculating the current user of certain items recommended values and the corresponding recommendation algorithm, and the system can get a recommendation for user.