Journal of China Universities of Posts and Telecommunications最新文献

筛选
英文 中文
Safety defect analysis and method study of data network 数据网络安全缺陷分析及方法研究
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60232-0
Kang-ming JIANG, Xiao-yun ZHANG, Shao-rui LIN
{"title":"Safety defect analysis and method study of data network","authors":"Kang-ming JIANG,&nbsp;Xiao-yun ZHANG,&nbsp;Shao-rui LIN","doi":"10.1016/S1005-8885(13)60232-0","DOIUrl":"10.1016/S1005-8885(13)60232-0","url":null,"abstract":"<div><p>This paper cascades crash analysis and NS2 simulation analysis to study the network system hidden. It is combined with the theory of complex systems from the nodes and links in the network system vulnerability analysis. Firstly, we abstract complex network systems to the node and link network topology. And then we remove key nodes and link vulnerability analysis center between lines metrics to analyze the effect of the network functionality caused by node crashes or link crashes. Secondly, we construct a cascade collapse model, using NS2 simulation to study outside deliberate attack and simulation system failure analysis; and give the embodiment of cascading breakdown on the network function.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 131-135"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60232-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82688935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual community-based video resource sharing solution in MANETs 基于虚拟社区的manet视频资源共享解决方案
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60241-1
Shi-jie JIA , Xi-hu ZHI , Chang-qiao XU , Jian-feng GUAN , Jun-qiang LU , Hong-ke ZHANG
{"title":"Virtual community-based video resource sharing solution in MANETs","authors":"Shi-jie JIA ,&nbsp;Xi-hu ZHI ,&nbsp;Chang-qiao XU ,&nbsp;Jian-feng GUAN ,&nbsp;Jun-qiang LU ,&nbsp;Hong-ke ZHANG","doi":"10.1016/S1005-8885(13)60241-1","DOIUrl":"10.1016/S1005-8885(13)60241-1","url":null,"abstract":"<div><p>The virtual community has emerged as a state-of-the-art technology, grouping the user with the common interest and providing a feasible solution for large-scale deployment of resource sharing services. Efficient sharing for video resources and low maintenance cost of overlay topology are key factors in MP2P video on demand systems. In this paper, a novel virtual community-based video resource sharing (VCVRS) solution in MANETs is proposed. VCVRS design a virtual community construction strategy to group the nodes with the common playback behavior and a flexible community maintenance mechanism so as to obtain the fast supplier discovery and low maintenance overhead. Simulation results show how VCVRS achieves higher lookup success rate, lower server stress, lower node load and less overlay maintenance overhead, in comparison with another state of the art solution.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 91-95, 135"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60241-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83392963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Estimation of left-turning travel time at traffic intersection 十字路口左转弯行驶时间的估计
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60257-5
Song BI, Zhi-jian WANG, Cun-wu HAN, De-hui SUN, Wei-feng ZHAI, Zhong-cheng ZHAO
{"title":"Estimation of left-turning travel time at traffic intersection","authors":"Song BI,&nbsp;Zhi-jian WANG,&nbsp;Cun-wu HAN,&nbsp;De-hui SUN,&nbsp;Wei-feng ZHAI,&nbsp;Zhong-cheng ZHAO","doi":"10.1016/S1005-8885(13)60257-5","DOIUrl":"10.1016/S1005-8885(13)60257-5","url":null,"abstract":"<div><p>Traffic guidance is a promise approach of traffic congestion alleviation, and the travel time is one of the most important basic data for the reasonable and effective route planning which is the core of traffic guidance. The traffic intersection is one of the chief components of the whole traffic road networks, so the estimation of travel time of the intersection plays an important role in traffic guidance. This paper pays more attention to the estimation of travel time for left-turning lane connected to an intersection, introduces the features for travel time estimation, and designs an estimator based on the learning vector quantity (LVQ) neural network. A suite of reasonable test shows that the method can effectively estimate the travel time of vehicles at left-turning lane with lower error to the real data.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 10-14"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60257-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88212945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic dictionary based method for short text classification 基于语义词典的短文本分类方法
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60256-3
Hao-jin TANG, Dan-feng YAN, Yuan TIAN
{"title":"Semantic dictionary based method for short text classification","authors":"Hao-jin TANG,&nbsp;Dan-feng YAN,&nbsp;Yuan TIAN","doi":"10.1016/S1005-8885(13)60256-3","DOIUrl":"10.1016/S1005-8885(13)60256-3","url":null,"abstract":"<div><p>The traditional short-text classification's accuracy usually highly relies on statistical feature selection. Owing to the fact that short-text has inherent defects such as short length, weak signal and less features. It is hard to avoid noise words when doing feature extension which will highly influence the accuracy of classification. In order to solve the above problem, this paper proposes a semantic dictionary method for short-text classification. The method builds a set of domain dictionary by analyzing the specific characteristics in certain field. As each word's weight in the dictionary is designed according to the correlation between the word and the category, classification accuracy has improved to some extent. Then, in order to enhance dictionary vocabulary coverage, association rules are utilized to automatically extend semantic dictionary. Finally, an experiment based on micro-blog data is conducted which shows that the method has a good effect.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 15-19"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60256-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80526150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on algorithm of night vision image fusion and coloration 夜视图像融合与着色算法研究
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60255-1
Ya-jie WANG , Hong-kun QIU , Lin-lin WANG , Xiang-bin SHI
{"title":"Research on algorithm of night vision image fusion and coloration","authors":"Ya-jie WANG ,&nbsp;Hong-kun QIU ,&nbsp;Lin-lin WANG ,&nbsp;Xiang-bin SHI","doi":"10.1016/S1005-8885(13)60255-1","DOIUrl":"10.1016/S1005-8885(13)60255-1","url":null,"abstract":"<div><p>An new color image fusion method is presented based on dual-tree complex wavelet transform (DT-CWT) and <em>Lαβ</em> space for visual and infrared night image fusion. The color transfer technology is conducted to colorize the gray-scale visual image based on <em>Lαβ</em> space and the three component values of <em>L, α</em> and <em>β</em> can be gained. The appropriate dynamic range of gray image in <em>Lα β</em> space is proposed, and the reason of oversaturated colors is analyzed. The DT-CWT is applied in gray image fusion processing because of it's properties: shift invariance, directional selectivity, in order to obtaining exact position and clear image presentation. The different fusion rule is used aiming at high and low frequency components. The weighted average method is employed to low frequency part, and the high frequency parts are of selection greater local energy. The component <em>L</em> of colorized visual image is replaced by the gray-scale fused image. And the color fusion image is obtained by from <em>Lα β</em> to RGB(R: red, G: green, B:blue). The experiment results indicate that the proposed algorithm can achieve three requirements: detectability of the target, clear details and natural colors.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 20-24"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60255-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90252883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
QoS-aware computational method for IoT composite service 物联网复合服务的qos感知计算方法
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60252-6
Ming ZHOU, Yan MA
{"title":"QoS-aware computational method for IoT composite service","authors":"Ming ZHOU,&nbsp;Yan MA","doi":"10.1016/S1005-8885(13)60252-6","DOIUrl":"10.1016/S1005-8885(13)60252-6","url":null,"abstract":"<div><p>This paper integrated the quality of service (QoS) requirements of Internet of things (IoT) composite services, and put forward effective decomposition and optimization methods of the QoS metrics. The authors break down the complex QoS calculation model into four basic models, and each model is given a computational method. Combined with the QoS technology of the composite service, the authors adopt the algorithm to find the sub-optimal service with an acceptable cost under the QoS constraints. The proposed algorithm can quickly provide QoS computing services than other two algorithms for large-scale IoT compose services.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 35-39"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60252-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76263999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Communication framework for MMOG based on custom protocol 基于自定义协议的MMOG通信框架
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60248-4
Ren-wei MAO, Min RAO, Li-ming LUO, Xu-ren WANG, Xiang-yang HUANG
{"title":"Communication framework for MMOG based on custom protocol","authors":"Ren-wei MAO,&nbsp;Min RAO,&nbsp;Li-ming LUO,&nbsp;Xu-ren WANG,&nbsp;Xiang-yang HUANG","doi":"10.1016/S1005-8885(13)60248-4","DOIUrl":"10.1016/S1005-8885(13)60248-4","url":null,"abstract":"<div><p>This paper presents a real-time communication framework for massive multiplayer online games (MMOG), which is to ensure the efficiency of communication and software readability at the same time. Firstly, we compare the current mainstream serialization technologies and demonstrate the significance of custom protocol through analysis of those technical limitations. Then, the paper puts forward the concept of protocol-bean innovatively. By this means, we implement an object-oriented custom protocol method, which has higher performance and more readability. Finally, through the comparison of data bandwidth and real-time response time, experimental data shows this framework could ensure the lowest data bandwidth without destroying software structure. And compared with real-time server Red5, response time is improved by 40 times.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 55-58, 80"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60248-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86028220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design on enterprise service bus message conversion protocol based on XSLT 基于XSLT的企业服务总线消息转换协议设计
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60249-6
Ming-zhe YU
{"title":"Design on enterprise service bus message conversion protocol based on XSLT","authors":"Ming-zhe YU","doi":"10.1016/S1005-8885(13)60249-6","DOIUrl":"10.1016/S1005-8885(13)60249-6","url":null,"abstract":"<div><p>Enterprise service bus (ESB) plays the part as intermediate hubs in enterprise service integration frameworks, and it is to implement the communications of shared contents in different systems. These contents are heterogeneous and message conversion protocols make rule of the transformation among them. This article studies about designing on enterprise service bus message conversion protocol based on extensible stylesheet language transformations (XSLT). It includes three parts of design of the ESB: message conversion frame, message conversion optimization and heterogeneous message integration. The first part introduces the process of service request and response using simple object access protocol (SOAP) in ESB and makes analysis about XSLT file elements. The second part sets up multiple-request message pattern by XSLT processor and ESB pre-defined request message content format based on Schema. The third part optimizes intelligent message conversion in ESB by automatic Schema mapping rule. All the functions help to develop the intelligent message conversion in ESB and improve the efficiency of the conversion.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 50-54"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60249-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86767090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy-aware RBAC model for web services composition 用于web服务组合的隐私感知RBAC模型
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60253-8
Dan-feng YAN, Yuan TIAN, Jun-lin HUANG, Fang-chun YANG
{"title":"Privacy-aware RBAC model for web services composition","authors":"Dan-feng YAN,&nbsp;Yuan TIAN,&nbsp;Jun-lin HUANG,&nbsp;Fang-chun YANG","doi":"10.1016/S1005-8885(13)60253-8","DOIUrl":"10.1016/S1005-8885(13)60253-8","url":null,"abstract":"<div><p>Web services collaborative environments are highly automatic, dynamic, and heterogeneous. These characteristics always lead to high risks of services for interaction participants. Hence, it becomes one of the most important things to guarantee that the private information in cross-domain services is not illegally collected, used, disclosed or stored when the Web services are required to combine secure composition. This paper proposes the privacy-aware role based access control model for Web services composition (WSC-PRBAC), which provides protection for private data of users in composite service. The element services are divided into local services and outside services. Because the local service is authorized by users, it is exactly different from other services in the composition. To avoid sending private information to other outside services directly, we define global roles to help access these data in local service. Using global roles can realize a more strict control of the private data. In the end, the experiment and analysis of the proposed model show its and efficiency.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 30-34"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60253-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89217711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Rough implication operation and residuated based fuzzy logic system 基于粗糙蕴涵运算和残馀的模糊逻辑系统
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60237-X
Xiao-hong ZHANG , Jian-hua DAI
{"title":"Rough implication operation and residuated based fuzzy logic system","authors":"Xiao-hong ZHANG ,&nbsp;Jian-hua DAI","doi":"10.1016/S1005-8885(13)60237-X","DOIUrl":"10.1016/S1005-8885(13)60237-X","url":null,"abstract":"<div><p>Theories of fuzzy sets and rough sets are different and complementary generalizations of classical set theory, both of them are motivated by practical needs to manage and process uncertainty information. The aim of this paper is to study the relationship between fuzzy sets and rough sets from the view of logic. A new implication operation of rough sets is constructed, and the rough sets semantics of residuated based fuzzy logic system is presented.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 109-112"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60237-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78231942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信