{"title":"Safety defect analysis and method study of data network","authors":"Kang-ming JIANG, Xiao-yun ZHANG, Shao-rui LIN","doi":"10.1016/S1005-8885(13)60232-0","DOIUrl":"10.1016/S1005-8885(13)60232-0","url":null,"abstract":"<div><p>This paper cascades crash analysis and NS2 simulation analysis to study the network system hidden. It is combined with the theory of complex systems from the nodes and links in the network system vulnerability analysis. Firstly, we abstract complex network systems to the node and link network topology. And then we remove key nodes and link vulnerability analysis center between lines metrics to analyze the effect of the network functionality caused by node crashes or link crashes. Secondly, we construct a cascade collapse model, using NS2 simulation to study outside deliberate attack and simulation system failure analysis; and give the embodiment of cascading breakdown on the network function.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 131-135"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60232-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82688935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual community-based video resource sharing solution in MANETs","authors":"Shi-jie JIA , Xi-hu ZHI , Chang-qiao XU , Jian-feng GUAN , Jun-qiang LU , Hong-ke ZHANG","doi":"10.1016/S1005-8885(13)60241-1","DOIUrl":"10.1016/S1005-8885(13)60241-1","url":null,"abstract":"<div><p>The virtual community has emerged as a state-of-the-art technology, grouping the user with the common interest and providing a feasible solution for large-scale deployment of resource sharing services. Efficient sharing for video resources and low maintenance cost of overlay topology are key factors in MP2P video on demand systems. In this paper, a novel virtual community-based video resource sharing (VCVRS) solution in MANETs is proposed. VCVRS design a virtual community construction strategy to group the nodes with the common playback behavior and a flexible community maintenance mechanism so as to obtain the fast supplier discovery and low maintenance overhead. Simulation results show how VCVRS achieves higher lookup success rate, lower server stress, lower node load and less overlay maintenance overhead, in comparison with another state of the art solution.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 91-95, 135"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60241-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83392963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of left-turning travel time at traffic intersection","authors":"Song BI, Zhi-jian WANG, Cun-wu HAN, De-hui SUN, Wei-feng ZHAI, Zhong-cheng ZHAO","doi":"10.1016/S1005-8885(13)60257-5","DOIUrl":"10.1016/S1005-8885(13)60257-5","url":null,"abstract":"<div><p>Traffic guidance is a promise approach of traffic congestion alleviation, and the travel time is one of the most important basic data for the reasonable and effective route planning which is the core of traffic guidance. The traffic intersection is one of the chief components of the whole traffic road networks, so the estimation of travel time of the intersection plays an important role in traffic guidance. This paper pays more attention to the estimation of travel time for left-turning lane connected to an intersection, introduces the features for travel time estimation, and designs an estimator based on the learning vector quantity (LVQ) neural network. A suite of reasonable test shows that the method can effectively estimate the travel time of vehicles at left-turning lane with lower error to the real data.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 10-14"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60257-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88212945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic dictionary based method for short text classification","authors":"Hao-jin TANG, Dan-feng YAN, Yuan TIAN","doi":"10.1016/S1005-8885(13)60256-3","DOIUrl":"10.1016/S1005-8885(13)60256-3","url":null,"abstract":"<div><p>The traditional short-text classification's accuracy usually highly relies on statistical feature selection. Owing to the fact that short-text has inherent defects such as short length, weak signal and less features. It is hard to avoid noise words when doing feature extension which will highly influence the accuracy of classification. In order to solve the above problem, this paper proposes a semantic dictionary method for short-text classification. The method builds a set of domain dictionary by analyzing the specific characteristics in certain field. As each word's weight in the dictionary is designed according to the correlation between the word and the category, classification accuracy has improved to some extent. Then, in order to enhance dictionary vocabulary coverage, association rules are utilized to automatically extend semantic dictionary. Finally, an experiment based on micro-blog data is conducted which shows that the method has a good effect.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 15-19"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60256-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80526150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ya-jie WANG , Hong-kun QIU , Lin-lin WANG , Xiang-bin SHI
{"title":"Research on algorithm of night vision image fusion and coloration","authors":"Ya-jie WANG , Hong-kun QIU , Lin-lin WANG , Xiang-bin SHI","doi":"10.1016/S1005-8885(13)60255-1","DOIUrl":"10.1016/S1005-8885(13)60255-1","url":null,"abstract":"<div><p>An new color image fusion method is presented based on dual-tree complex wavelet transform (DT-CWT) and <em>Lαβ</em> space for visual and infrared night image fusion. The color transfer technology is conducted to colorize the gray-scale visual image based on <em>Lαβ</em> space and the three component values of <em>L, α</em> and <em>β</em> can be gained. The appropriate dynamic range of gray image in <em>Lα β</em> space is proposed, and the reason of oversaturated colors is analyzed. The DT-CWT is applied in gray image fusion processing because of it's properties: shift invariance, directional selectivity, in order to obtaining exact position and clear image presentation. The different fusion rule is used aiming at high and low frequency components. The weighted average method is employed to low frequency part, and the high frequency parts are of selection greater local energy. The component <em>L</em> of colorized visual image is replaced by the gray-scale fused image. And the color fusion image is obtained by from <em>Lα β</em> to RGB(R: red, G: green, B:blue). The experiment results indicate that the proposed algorithm can achieve three requirements: detectability of the target, clear details and natural colors.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 20-24"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60255-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90252883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS-aware computational method for IoT composite service","authors":"Ming ZHOU, Yan MA","doi":"10.1016/S1005-8885(13)60252-6","DOIUrl":"10.1016/S1005-8885(13)60252-6","url":null,"abstract":"<div><p>This paper integrated the quality of service (QoS) requirements of Internet of things (IoT) composite services, and put forward effective decomposition and optimization methods of the QoS metrics. The authors break down the complex QoS calculation model into four basic models, and each model is given a computational method. Combined with the QoS technology of the composite service, the authors adopt the algorithm to find the sub-optimal service with an acceptable cost under the QoS constraints. The proposed algorithm can quickly provide QoS computing services than other two algorithms for large-scale IoT compose services.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 35-39"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60252-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76263999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ren-wei MAO, Min RAO, Li-ming LUO, Xu-ren WANG, Xiang-yang HUANG
{"title":"Communication framework for MMOG based on custom protocol","authors":"Ren-wei MAO, Min RAO, Li-ming LUO, Xu-ren WANG, Xiang-yang HUANG","doi":"10.1016/S1005-8885(13)60248-4","DOIUrl":"10.1016/S1005-8885(13)60248-4","url":null,"abstract":"<div><p>This paper presents a real-time communication framework for massive multiplayer online games (MMOG), which is to ensure the efficiency of communication and software readability at the same time. Firstly, we compare the current mainstream serialization technologies and demonstrate the significance of custom protocol through analysis of those technical limitations. Then, the paper puts forward the concept of protocol-bean innovatively. By this means, we implement an object-oriented custom protocol method, which has higher performance and more readability. Finally, through the comparison of data bandwidth and real-time response time, experimental data shows this framework could ensure the lowest data bandwidth without destroying software structure. And compared with real-time server Red5, response time is improved by 40 times.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 55-58, 80"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60248-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86028220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design on enterprise service bus message conversion protocol based on XSLT","authors":"Ming-zhe YU","doi":"10.1016/S1005-8885(13)60249-6","DOIUrl":"10.1016/S1005-8885(13)60249-6","url":null,"abstract":"<div><p>Enterprise service bus (ESB) plays the part as intermediate hubs in enterprise service integration frameworks, and it is to implement the communications of shared contents in different systems. These contents are heterogeneous and message conversion protocols make rule of the transformation among them. This article studies about designing on enterprise service bus message conversion protocol based on extensible stylesheet language transformations (XSLT). It includes three parts of design of the ESB: message conversion frame, message conversion optimization and heterogeneous message integration. The first part introduces the process of service request and response using simple object access protocol (SOAP) in ESB and makes analysis about XSLT file elements. The second part sets up multiple-request message pattern by XSLT processor and ESB pre-defined request message content format based on Schema. The third part optimizes intelligent message conversion in ESB by automatic Schema mapping rule. All the functions help to develop the intelligent message conversion in ESB and improve the efficiency of the conversion.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 50-54"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60249-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86767090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dan-feng YAN, Yuan TIAN, Jun-lin HUANG, Fang-chun YANG
{"title":"Privacy-aware RBAC model for web services composition","authors":"Dan-feng YAN, Yuan TIAN, Jun-lin HUANG, Fang-chun YANG","doi":"10.1016/S1005-8885(13)60253-8","DOIUrl":"10.1016/S1005-8885(13)60253-8","url":null,"abstract":"<div><p>Web services collaborative environments are highly automatic, dynamic, and heterogeneous. These characteristics always lead to high risks of services for interaction participants. Hence, it becomes one of the most important things to guarantee that the private information in cross-domain services is not illegally collected, used, disclosed or stored when the Web services are required to combine secure composition. This paper proposes the privacy-aware role based access control model for Web services composition (WSC-PRBAC), which provides protection for private data of users in composite service. The element services are divided into local services and outside services. Because the local service is authorized by users, it is exactly different from other services in the composition. To avoid sending private information to other outside services directly, we define global roles to help access these data in local service. Using global roles can realize a more strict control of the private data. In the end, the experiment and analysis of the proposed model show its and efficiency.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 30-34"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60253-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89217711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rough implication operation and residuated based fuzzy logic system","authors":"Xiao-hong ZHANG , Jian-hua DAI","doi":"10.1016/S1005-8885(13)60237-X","DOIUrl":"10.1016/S1005-8885(13)60237-X","url":null,"abstract":"<div><p>Theories of fuzzy sets and rough sets are different and complementary generalizations of classical set theory, both of them are motivated by practical needs to manage and process uncertainty information. The aim of this paper is to study the relationship between fuzzy sets and rough sets from the view of logic. A new implication operation of rough sets is constructed, and the rough sets semantics of residuated based fuzzy logic system is presented.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 109-112"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60237-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78231942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}