J. Digit. Content Technol. its Appl.最新文献

筛选
英文 中文
A Cloud Tracing and Filtering Framework for Defensing Against Denial of Service Attacks 一种防御拒绝服务攻击的云跟踪和过滤框架
J. Digit. Content Technol. its Appl. Pub Date : 2010-12-31 DOI: 10.4156/JDCTA.VOL4.ISSUE9.26
Fan Lin, Wenhua Zeng, Yi Jiang
{"title":"A Cloud Tracing and Filtering Framework for Defensing Against Denial of Service Attacks","authors":"Fan Lin, Wenhua Zeng, Yi Jiang","doi":"10.4156/JDCTA.VOL4.ISSUE9.26","DOIUrl":"https://doi.org/10.4156/JDCTA.VOL4.ISSUE9.26","url":null,"abstract":"Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. One of the most serious threats to cloud computing itself comes from Denial of Service attacks, especially HTTP or XML-Based Denial of Service attacks. These types of attacks are simple and easy to implement by the attacker, but to security experts they are twice as difficult to stop. In this paper, we introduced a security service called Cloud Tracing & Filtering (CTF), which is like a service broker within a SOA model, and a back propagation neutral network called Cloud Shield, which was trained to detect and filter DoS attack traffic. And we also presented a solution to detect and trace through CTF to find the source of those attacks. The experimental results show that CTF is able to detect and filter most of the attack messages and to identify the source of the attack within a short period of time.","PeriodicalId":293875,"journal":{"name":"J. Digit. Content Technol. its Appl.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128118898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Design and Development of Testing Information System of Psychodiagnosis for Equestrianism Players 马术运动员心理诊断测试信息系统的设计与开发
J. Digit. Content Technol. its Appl. Pub Date : 2010-12-31 DOI: 10.4156/JDCTA.VOL4.ISSUE9.6
Bin Wang, Gaofeng Pan, X. Li, Chunyan Su
{"title":"The Design and Development of Testing Information System of Psychodiagnosis for Equestrianism Players","authors":"Bin Wang, Gaofeng Pan, X. Li, Chunyan Su","doi":"10.4156/JDCTA.VOL4.ISSUE9.6","DOIUrl":"https://doi.org/10.4156/JDCTA.VOL4.ISSUE9.6","url":null,"abstract":"Combining with the characteristics of equestrian sports and the psycho diagnosis technology and using the tools such as Visual Basic, Photoshop, Microsoft Access, Psychodiagnosis Testing System for Equestrianism Players was developed. About 40 athletes who participated in the whole national equestrian championship game and the whole nation outstanding equestrian players game were divided three terms and measured successively. Results indicate that the testing system has higher reliability and validity than traditional mental test such as good effect, simple operation convenient inquiry and objective evaluation. It can rapidly diagnose and reflect psychological characteristics and mental state of equestrian players.","PeriodicalId":293875,"journal":{"name":"J. Digit. Content Technol. its Appl.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131786788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A LFSR Reseeding Scheme Based on Division by 2 to the Power of Integer 一种基于2整数次方除法的LFSR重播方案
J. Digit. Content Technol. its Appl. Pub Date : 2010-12-31 DOI: 10.4156/JDCTA.VOL4.ISSUE9.11
Wenfa Zhan, Jun Ma, Shanshan Du, Jun Liu
{"title":"A LFSR Reseeding Scheme Based on Division by 2 to the Power of Integer","authors":"Wenfa Zhan, Jun Ma, Shanshan Du, Jun Liu","doi":"10.4156/JDCTA.VOL4.ISSUE9.11","DOIUrl":"https://doi.org/10.4156/JDCTA.VOL4.ISSUE9.11","url":null,"abstract":"As the number of specified bits of different test patterns varies widely in a deterministic test cube, all test patterns are concatenated to a data flow. The original test data can be re-divided by 2 to the power of integer according to the successful characteristics of the LFSR coding, whose length equals to the power of 2 in every division. In the new test approach, the numbers of specific bits in the new test vectors are very close. Hence the encoding efficiency can be enhanced in the process of LFSR. And experimental results show that the compression ratio of this scheme can improve 2.32 % than that of hybrid coding. Compared with the previous schemes, the proposed scheme can increase the encoding efficiency with simple decompression structure and less area overhead.","PeriodicalId":293875,"journal":{"name":"J. Digit. Content Technol. its Appl.","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Utility Based Optimal Task Scheduling Problem in a Multi-agent System 多智能体系统中基于效用的最优任务调度问题
J. Digit. Content Technol. its Appl. Pub Date : 2010-12-31 DOI: 10.4156/JDCTA.VOL4.ISSUE9.4
Xiaowei Zhang, Bin Li, Junwu Zhu, Jun Wu
{"title":"Utility Based Optimal Task Scheduling Problem in a Multi-agent System","authors":"Xiaowei Zhang, Bin Li, Junwu Zhu, Jun Wu","doi":"10.4156/JDCTA.VOL4.ISSUE9.4","DOIUrl":"https://doi.org/10.4156/JDCTA.VOL4.ISSUE9.4","url":null,"abstract":"A multi-agent system (MAS) has been built based on characteristics of emergency system, in which task schedulable and maximum task scheduling problem for the MAS has been discussed in our previous work. However, the mentioned task scheduling method both supposed that all tasks were equally important and agents have the same capability in playing a certain role, and evaluated the quality of task scheduling only by the number of accomplished tasks, which ignored the differences among tasks or Agents that conflicts with our real life. In order to make the task scheduling be more close to actual process of emergencies, the utility based optimal task scheduling problem (UOTSP) is proposed in this paper. The method assigns each task with a utility to represent the earnings from accomplishing it and adds preference on each Agent to distinguish the Agent’s preferences and roleplay abilities. The UOTSP problem is proved to be NP complete by reducing MAX-S to it in polynomial time, and two approximate algorithms (GTS and RTOM) are proposed to solve the UOTSP problem approximately. The experiment results show that both GTS and RTOM can get excellent approximate solutions, and the time performance of GTS is wonderful which makes it suitable for the emergency applications of MAS (emergency system).","PeriodicalId":293875,"journal":{"name":"J. Digit. Content Technol. its Appl.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129414911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On Using Tabu Search for RNA Secondary Structure Prediction 禁忌搜索在RNA二级结构预测中的应用
J. Digit. Content Technol. its Appl. Pub Date : 2010-12-31 DOI: 10.4156/JDCTA.VOL4.ISSUE9.30
Yongguo Liu, Jianrui Hao
{"title":"On Using Tabu Search for RNA Secondary Structure Prediction","authors":"Yongguo Liu, Jianrui Hao","doi":"10.4156/JDCTA.VOL4.ISSUE9.30","DOIUrl":"https://doi.org/10.4156/JDCTA.VOL4.ISSUE9.30","url":null,"abstract":"In this article, a novel approach is proposed to predict RNA secondary structure called RNA secondary structure prediction based on Tabu Search (RNATS). In the RNATS algorithm, two search models, intensification search and diversification search, are developed to exploit the local regions around the current solution and explore the unvisited solution space, respectively. Simulation experiments are conducted on eight RNA sequences to show that the proposed method is feasible and effective.","PeriodicalId":293875,"journal":{"name":"J. Digit. Content Technol. its Appl.","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127558209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-supervised Distributed Clustering with Mahalanobis Distance Metric Learning 半监督分布聚类与Mahalanobis距离度量学习
J. Digit. Content Technol. its Appl. Pub Date : 2010-12-31 DOI: 10.4156/JDCTA.VOL4.ISSUE9.16
Martin Yuecheng Yu, Jiandong Wang, Guansheng Zheng, Bin Gu
{"title":"Semi-supervised Distributed Clustering with Mahalanobis Distance Metric Learning","authors":"Martin Yuecheng Yu, Jiandong Wang, Guansheng Zheng, Bin Gu","doi":"10.4156/JDCTA.VOL4.ISSUE9.16","DOIUrl":"https://doi.org/10.4156/JDCTA.VOL4.ISSUE9.16","url":null,"abstract":"Semi-supervised clustering uses a small amount of supervised information to aid unsupervised learning. As one of the semi-supervised clustering methods, metric learning has been widely used to clustering the centralized data points. However, there are many distributed data points, which cannot be centralized for the various reasons. Based on MPCK-MEANS framework [1] , the method of distributed Mahalanobis distance learning, called Distributed MPCK-MEANS, is proposed. Similar to MPCK-MEANS, Distributed MPCK-MEANS adopts EM iteration framework to performance clustering and metric learning simultaneously. To decrease the communication costs and protect the data security and privacy, corresponding transmission parameters are designed; furthermore, the transmission techniques are realized too. The proposed method is different to Parallel K-means, but is similar to Parallel K-means with some degrees. The proposed method is tested on artificial data sets and real data sets. Compared with Parallel K-means, Distributed MPCK-MEANS can effectively improve the quality of clustering.","PeriodicalId":293875,"journal":{"name":"J. Digit. Content Technol. its Appl.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Positioning Method in Wireless Sensor Networks Using Genetic Algorithms 一种基于遗传算法的无线传感器网络定位方法
J. Digit. Content Technol. its Appl. Pub Date : 2010-12-31 DOI: 10.4156/JDCTA.VOL4.ISSUE9.21
Mojtaba Romoozi, H. Ebrahimpour-Komleh
{"title":"A Positioning Method in Wireless Sensor Networks Using Genetic Algorithms","authors":"Mojtaba Romoozi, H. Ebrahimpour-Komleh","doi":"10.4156/JDCTA.VOL4.ISSUE9.21","DOIUrl":"https://doi.org/10.4156/JDCTA.VOL4.ISSUE9.21","url":null,"abstract":"Abstract The recent area of Wireless Sensor Networks (WSNs) has brought new challenges to developers of net-work protocols. Energy consumption and network coverage are two important challenges in wireless sensor networks. We investigate intelligent techniques for node positioning to reduce energy consumption with coverage preserved in wireless sensor network. A genetic algorithm Is used to create energy efficient node positioning in wireless sensor networks. The simulation result shown that the proposed intelligent algorithm can extend the network network lifetime for different network positioning method.","PeriodicalId":293875,"journal":{"name":"J. Digit. Content Technol. its Appl.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129205053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Texture Image Classification Based on Nonsubsampled Contourlet Transform and Local Binary Patterns 基于非下采样Contourlet变换和局部二值模式的纹理图像分类
J. Digit. Content Technol. its Appl. Pub Date : 2010-12-31 DOI: 10.4156/JDCTA.VOL4.ISSUE9.23
Zhengli Zhu, Chunxia Zhao, Yingkun Hou
{"title":"Texture Image Classification Based on Nonsubsampled Contourlet Transform and Local Binary Patterns","authors":"Zhengli Zhu, Chunxia Zhao, Yingkun Hou","doi":"10.4156/JDCTA.VOL4.ISSUE9.23","DOIUrl":"https://doi.org/10.4156/JDCTA.VOL4.ISSUE9.23","url":null,"abstract":"This paper presents a new approach of texture image classification based on nonsubsampled contourlet transform, Local binary patterns and Support vector machines. Nonsubsampled contourlet transform and Local binary patterns are used to extract texture features of images, Support vector machines are used to classify texture images. Nonsubsampled contourlet transform has translation invariability. Local Binary Patterns has rotational and gray invariance. Support vector machines have good performance in a variety of pattern recognition problems. Experimental results demonstrate that the proposed method performs much better than some existing methods. It achieves higher classification accuracy.","PeriodicalId":293875,"journal":{"name":"J. Digit. Content Technol. its Appl.","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122657599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform 一种新型通用企业应用业务基础架构软件平台的设计与实现
J. Digit. Content Technol. its Appl. Pub Date : 2010-12-31 DOI: 10.4156/JDCTA.VOL4.ISSUE9.9
Yao Rong, Jiandong Wang
{"title":"Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform","authors":"Yao Rong, Jiandong Wang","doi":"10.4156/JDCTA.VOL4.ISSUE9.9","DOIUrl":"https://doi.org/10.4156/JDCTA.VOL4.ISSUE9.9","url":null,"abstract":"Platform-based development is currently the dominant development method of enterprise application, but the features provided by current mainstream enterprise application development platforms focus on technical aspects rather than business, so it lead to a high degree of difficulty and heavy workload during the building of specific enterprise applications. Other platforms might offer some better business-oriented features, but at the same time they have strong industry limitations. This paper presents a novel general-purpose enterprise application business infrastructure software platform, in which the technology complexity is encapsulated in the bottom, so the technical ability requirement of the user that uses platform to build specific enterprise application is largely reduced. Whether user can successfully build an enterprise application through platform is mainly depended on their cognitive level of the enterprise business. Enterprise applications built upon the platform can agilely respond to the changes of business. The efficiency and flexibility of the prototype platform built with the ideas and methods have gotten an initial validation from the simulation construction of a certain civil aviation airport prototype information system.","PeriodicalId":293875,"journal":{"name":"J. Digit. Content Technol. its Appl.","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131607078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Classified Credential Selection Scheme with Disclosure-minimizing Privacy 具有最小化隐私的机密凭证选择方案
J. Digit. Content Technol. its Appl. Pub Date : 2010-12-31 DOI: 10.4156/JDCTA.VOL4.ISSUE9.25
Yajun Jiang, Bo Yang, Mingwu Zhang
{"title":"A Classified Credential Selection Scheme with Disclosure-minimizing Privacy","authors":"Yajun Jiang, Bo Yang, Mingwu Zhang","doi":"10.4156/JDCTA.VOL4.ISSUE9.25","DOIUrl":"https://doi.org/10.4156/JDCTA.VOL4.ISSUE9.25","url":null,"abstract":"In this paper, we propose a classified credential selection scheme with disclosure-minimizing privacy and give protocols for realizing it in point-based management model. The client has two or more classes of credentials, and defines a quantitative privacy score for each credential, while the server defines a point value for each credential disclosed by the client and a minimum access threshold of point values to access a resource. When the server requires the client to disclose at least one credential in each class, the proposed scheme allows the server and client to jointly compute an optimal subset of credentials without revealing their private information such that the total private scores of disclosed credentials is minimal while the server’s access threshold is satisfied. We also prove the security of the protocols in our scheme in the semi-honest model.","PeriodicalId":293875,"journal":{"name":"J. Digit. Content Technol. its Appl.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129798862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信