Font Size: a A A

Research And Application Of Key Technologies Based On SNS 's Witkey Platform

Posted on:2016-11-26Degree:MasterType:Thesis
Country:ChinaCandidate:J L RenFull Text:PDF
GTID:2208330470952870Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Witkey model is that people rely on their own knowledge and expertise to get pai d business model, with the growing popularity of e-commerce, information technolog y under the influence, expertise needs, increasing number of guests, this model of the Internet knowledge transaction pricing, and promote professional knowledge in the fie Id of work and life, resulting in huge economic value.This highly efficient, low-cost b usiness model, once launched, to get people’s identity immediately, various Wik platfo rms are emerging.This paper makes a deep research on the key technology of recomm endation algorithms and information security Witkey platform.The main contents incl ude collaborative filtering personalized recommendation technology and theory, MD5encryption of information technology, RBAC access control theory, server clustering technology.The main results of this study are as follows:(1)A collaborative filtering recommendation algorithm based on baseline predicti on model.Firstly, based on traditional user similarity algorithm, add PEARSON coeffi cient, improve forecast accuracy.Then combine SVD technology to the global user rat ing matrix partial amount be used, so as to achieve the purpose of optimization, makin g the score more closely predict the user’s actual score.(2)The proposed modified MD5encryption algorithm.For lack of MD5and MD5attack, using a message preprocessing step function improvement techniques and met hods to increase the divergence function MD5do not only improve the ability of anti-collision, but also makes the avalanche effect produced faster and enhance the MD5S ecurity.(3)The improved RBAC access control algorithm is proposed.Role-based access control method in a user-Role-Control permissions on the relations between the use r and permissions with the changes, easy to produce redundant resource permissions o n system resources, and made the access management becomes complicated. This pap er will be converted into a permission set permissions so that the relationship between roles and permissions are changed, according to the needs of the user can activate the corresponding privileges, but does not affect other users of the same role permissions. (4)A minimum connection weights scheduling algorithm is proposed.The right value of the server cluster system can be dynamically allocated and updated so server efficiency can be greatly improved. Through experimental comparison, also confirme d the correctness of the improved use of the service clustering technology, making co mpression capability server stronger, more efficient.
Keywords/Search Tags:Witkey, Collaborative Filtering, Recommendation System, MD5, Information Security, Service Cluster
PDF Full Text Request
Related items