Journal of China Universities of Posts and Telecommunications最新文献

筛选
英文 中文
A software protection framework for mobile devices 移动设备的软件保护框架
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60231-9
Hang DONG , Jing LI , Miao ZHANG , Shuai SU , Yi-xian YANG
{"title":"A software protection framework for mobile devices","authors":"Hang DONG ,&nbsp;Jing LI ,&nbsp;Miao ZHANG ,&nbsp;Shuai SU ,&nbsp;Yi-xian YANG","doi":"10.1016/S1005-8885(13)60231-9","DOIUrl":"10.1016/S1005-8885(13)60231-9","url":null,"abstract":"<div><p>The software protection technology is the main component of modern software security technology. Generally, confusion and encryption methods are using in software protection technology to provide traditional desktop applications. But applications based on mobile devices are also faces with threats such as piracy and tampering. The security problem in existing applications for mobile devices will do far more harm to users than traditional virus, but there is no effective software protection security framework for them. A software application framework for mobile devices is proposed in this paper, and the white box decryption algorithm involved is improved. And it is analyzed in this paper the performance and security of the framework proposed, the operational efficiency of the improved encryption algorithm is verified.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 136-140"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60231-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74351887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face detection in video based on AdaBoost algorithm and skin model 基于AdaBoost算法和皮肤模型的视频人脸检测
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60259-9
Cui-huan DU , Hong ZHU , Li-ming LUO , Jie LIU , Xiang-yang HUANG
{"title":"Face detection in video based on AdaBoost algorithm and skin model","authors":"Cui-huan DU ,&nbsp;Hong ZHU ,&nbsp;Li-ming LUO ,&nbsp;Jie LIU ,&nbsp;Xiang-yang HUANG","doi":"10.1016/S1005-8885(13)60259-9","DOIUrl":"10.1016/S1005-8885(13)60259-9","url":null,"abstract":"<div><p>A real-time method is proposed to detect faces in videos. First it uses frame difference method to extract the motion area. Next the clustering character of skin is used to get the general face area. AdaBoost algorithm is applied to make concrete detection of human face. Finally an improved CamShift algorithm method is used to keep the tracking and improving algorithm speed. The experiments demonstrate the robustness and high speed of the proposed algorithm.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 6-9, 24"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60259-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77948300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Multi-class pattern recognition with the group match competition method 基于分组匹配竞争法的多类模式识别
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60238-1
Xiao-yu LIU, Zhong-yuan YU, Yu-min LIU, Hou-jian KANG, Jin-hong MU
{"title":"Multi-class pattern recognition with the group match competition method","authors":"Xiao-yu LIU,&nbsp;Zhong-yuan YU,&nbsp;Yu-min LIU,&nbsp;Hou-jian KANG,&nbsp;Jin-hong MU","doi":"10.1016/S1005-8885(13)60238-1","DOIUrl":"10.1016/S1005-8885(13)60238-1","url":null,"abstract":"<div><p>High recognition rate of multi-class pattern recognition is difficult to obtain, especially when the feature extraction is not ideal. So achieving a high recognition rate with nonideal feature extraction makes great sense. Based on the early study of multiple-set-compete method (MSCM) and the algorithm of result reliability, this article proposes a new recognition method named group match competition method (GMCM). The GMCM precedes the early work with a larger scope of applications. Early work which the authors did can only deal with the recognition work with the number of powers of 2 classes, while GMCM can cope with the classes of any number. This article further illustrates the MSCM, the algorithm of result reliability and their functions in the GMCM. Three sets of cases are demonstrated and formats of grouping are discussed. The recognition results show that the GMCM is a robust method and it is capable of achieving the high recognition rate of the multi-class pattern recognition.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 105-108"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60238-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76247528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient service request detection algorithm based on hormone regulation mechanism in the Internet of things 基于物联网激素调节机制的高效服务请求检测算法
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60242-3
Yan-ling JIN , Yong-sheng DING , Kuang-rong HAO , Yan-jun LIU
{"title":"Efficient service request detection algorithm based on hormone regulation mechanism in the Internet of things","authors":"Yan-ling JIN ,&nbsp;Yong-sheng DING ,&nbsp;Kuang-rong HAO ,&nbsp;Yan-jun LIU","doi":"10.1016/S1005-8885(13)60242-3","DOIUrl":"10.1016/S1005-8885(13)60242-3","url":null,"abstract":"<div><p>With the raising challenges of the Internet of things (IoT), e.g. the giant-scale heterogeneous network elements, and the uncertainty of sensing information and the dynamic environment that the system resides, there is no complete and widely accepted theory. In this paper, a hormone-based service detection algorithm (HSDA) for detecting the service requests generated randomly in the IoT is proposed. Inspired by the endocrine mechanism in human body, the nodes in the network without centralized command or sinks can tune themselves spontaneously by exchanging information among regional neighbors through different hormones. A dynamic activation scheme is realized as the HSDA to guarantee the rapidness of the network on responding the service requests. Simulation results show that the HSDA algorithm entitles the network with intelligent decision-making and cooperative working abilities, based on which the stability of the network and the effectiveness for detecting service requests generated randomly can be guaranteed simultaneously.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 86-90"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60242-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78300690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Programmable virtual network as a service: towards a future Internet testbed based on IaaS cloud 可编程虚拟网络即服务:迈向基于IaaS云的未来互联网试验台
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60233-2
Jun-xue LIANG , Zhao-wen LIN , Yan MA , Yu-ning WANG , Can ZHANG , Zheng MI , Jian LI
{"title":"Programmable virtual network as a service: towards a future Internet testbed based on IaaS cloud","authors":"Jun-xue LIANG ,&nbsp;Zhao-wen LIN ,&nbsp;Yan MA ,&nbsp;Yu-ning WANG ,&nbsp;Can ZHANG ,&nbsp;Zheng MI ,&nbsp;Jian LI","doi":"10.1016/S1005-8885(13)60233-2","DOIUrl":"10.1016/S1005-8885(13)60233-2","url":null,"abstract":"<div><p>During recently years, several OpenFlow-enabled testbeds have been deployed in world-wide research community. Typically, these OpenFlow-enabled testbeds need to stitch to other testbeds to link to virtual servers and immit experimentation traffic. From the view point of researchers, these OpenFlow-enabled testbeds only provide OpenFlow networking resource, and they have to resort to other experiment infrastructure to provide computing and storage resource. Due to the OpenFlow networking and other resource belongs to different infrastructure provider and is managed by their own control software, it is difficult to coordinate these partners to provide a full programmable experiment environment. Meanwhile, the control software of these testbeds are tight coupling with their substrate resources, which means that these substrate resources, together with virtualization technologies, are permanently dedicated to the control software and difficult to be used by other services. In this paper, a new future Internet testbed architecture based on the open Infrastructure-as-a-service cloud and software defined network (SDN) paradigm is proposed. It extends the current virtual network service by adding programmable virtual switch and controller resources that can be controlled by the researcher. Its loose coupling model allows the testbed operator decouple the experiment service from the infrastructure provider, which is a more flexible way to build the testbed. The initial prototype implementation in this paper shows that this new testbed architecture built on IaaS cloud and SDN is feasible and flexible to provide programmable virtual network service.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 126-130"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60233-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90403540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Programmable virtual network instantiation in IaaS cloud based on SDN 基于SDN的IaaS云中可编程虚拟网络实例化
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60234-4
Yong-juan WU , Jun-xue LIANG , Hua ZHANG , Zhao-wen LIN , Yan MA , Zhong TIAN
{"title":"Programmable virtual network instantiation in IaaS cloud based on SDN","authors":"Yong-juan WU ,&nbsp;Jun-xue LIANG ,&nbsp;Hua ZHANG ,&nbsp;Zhao-wen LIN ,&nbsp;Yan MA ,&nbsp;Zhong TIAN","doi":"10.1016/S1005-8885(13)60234-4","DOIUrl":"10.1016/S1005-8885(13)60234-4","url":null,"abstract":"<div><p>A possible approach to cope with the diversity of future networks is to set up multiple isolated virtual networks on top of a single shared physical substrate, and each virtual network is customized to some specific purposes. However, in the current realization of virtualized infrastructure, the OpenStack infrastructure as a service (IaaS) cloud, whose isolation and programmability are limited in terms of scalability and performance. To overcome these limitations, we propose a solution based on software defined networking (SDN) which is composed of a centralized server and distributed agents. The server has complete view of the whole network substrate, and is responsible for the installation and management of virtual network through the distributed agents. Each agent has the local view of the substrate node. They can manage the local resources, dispatch and filter the inner- programmable virtual network (PVN) traffic based on MAC isolation which is more scalable than virtual local area network (VLAN) and more efficient than GRE. Our prototype implementation shows that this architecture is feasible and provides a better compromise between flexibility and performance than the solo centralized and distributed solutions.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 121-125"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60234-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87292212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on search engine techniques of Surakarta game 苏拉卡塔游戏的搜索引擎技术研究
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60235-6
Hong-kun QIU , Ya-jie WANG , Fu-xiang GAO , Quan QIU
{"title":"Research on search engine techniques of Surakarta game","authors":"Hong-kun QIU ,&nbsp;Ya-jie WANG ,&nbsp;Fu-xiang GAO ,&nbsp;Quan QIU","doi":"10.1016/S1005-8885(13)60235-6","DOIUrl":"10.1016/S1005-8885(13)60235-6","url":null,"abstract":"<div><p>Computer game (CG) is one of the most challenging research directions in the fields of computer science and artificial intelligence (AI). Relational techniques of computer game are discussed in this article. The main work is listed below as three aspects: First of all, we analyzed the characteristics of Surakarta and modeled the game process of Surakarta. Next then, we discussed the techniques of search engine, which include game state evaluation and game tree search. Lastly, a series of experiments for the search engine were done. And then, combined with the experiments we get the empirical equation. These techniques made the evaluation of the game state more accurate, and the performance of the search engine was more effective and intelligent. The results and conclusions of these experiments have some reference values to other computer game procedures. And they have been proved by a series of experiments and competitions.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 117-120"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60235-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75594097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human machine interactive system on smart home of IoT 物联网智能家居的人机交互系统
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60240-X
Kun-kun DU , Zhi-liang WANG , Mi HONG
{"title":"Human machine interactive system on smart home of IoT","authors":"Kun-kun DU ,&nbsp;Zhi-liang WANG ,&nbsp;Mi HONG","doi":"10.1016/S1005-8885(13)60240-X","DOIUrl":"10.1016/S1005-8885(13)60240-X","url":null,"abstract":"<div><p>Along with the development of human-computer interaction technology and improvement of people's living standards, study of Internet of things (IoT) has become the focus for years. Meanwhile, smart home system has drawn more and more attention in IoT. In correlative research, artificial psychology theory and the harmony of human-computer interaction play an important role in smart home of IoT. In this study, software platform of the management system in smart home is designed, and users are Chinese. So the language in the system is Chinese. To analyze the basic interaction between users and computer, calendar, weather forecast, internet browsing, several electrical models are designed. To deal with the humanized interaction between human and computers, some features are implemented such as: analysis of emotional models, creation of the emotional models, text emotion recognition, and other basic functions in human-computer interaction.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 96-99"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60240-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74443617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Distributed joint spectrum detection and power allocation in multi-band cognitive radio networks 多频带认知无线电网络中的分布式联合频谱检测与功率分配
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60247-2
Xiao-yu WANG , yuan-an LIU , Gang XIE
{"title":"Distributed joint spectrum detection and power allocation in multi-band cognitive radio networks","authors":"Xiao-yu WANG ,&nbsp;yuan-an LIU ,&nbsp;Gang XIE","doi":"10.1016/S1005-8885(13)60247-2","DOIUrl":"10.1016/S1005-8885(13)60247-2","url":null,"abstract":"<div><p>This article proposes a novel dynamic spectrum sharing scheme in distributed multi-band cognitive radio networks. A non-cooperative game has been utilized to model the spectrum sharing among secondary base stations (SBSs). A distributed joint spectrum detection and power allocation algorithm is designed for maximizing the downlink throughput of secondary networks. Simulation results demonstrate that the proposed algorithm converges fast and achieves a better throughput performance than uniform threshold case. Meanwhile, the convergence of algorithm is proved by Nikaido-Isoda (N-I) function method.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 59-63"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60247-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80497913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security threats and measures for the cyber-physical systems 网络物理系统的安全威胁与对策
Journal of China Universities of Posts and Telecommunications Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60254-X
Li ZHANG, Qing WANG, Bin TIAN
{"title":"Security threats and measures for the cyber-physical systems","authors":"Li ZHANG,&nbsp;Qing WANG,&nbsp;Bin TIAN","doi":"10.1016/S1005-8885(13)60254-X","DOIUrl":"10.1016/S1005-8885(13)60254-X","url":null,"abstract":"<div><p>Governments, companies and research institutions are pressuring research and development of the cyber-physical systems. However, the development of cyber-physical systems is constrained by security and privacy threats. This paper summarizes security threats to cyber-physical systems to provide a theoretical reference for study of cyber-physical systems as well as useful security measures. The architecture of cyber-physical systems is used to classify threats for the perception-execution layer, transport layer and application-control layer. The perception-execution layer threats include security threats for the nodes such as sensors and actuators. Transport layer threats include data leakage or damage and security issues during massive data integration. Application-control layer threats include the loss of user privacy, incorrect access control policies and inadequate security standards. Finally, this paper gives security measures and recommendations for all types of security threats.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 25-29"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60254-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88129761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信