Loading...

Table of Content

    20 July 2017, Volume 0 Issue 7
    Analysis on Driving Force of Dishes Based on Complex Data Network in Catering Field
    WEN Zhen-qian, LIN You-fang, WU Zhi-hao
    2017, 0(7):  1-9.  doi:10.3969/j.issn.1006-2475.2017.07.001
    Asbtract ( 220 )  
    References | Related Articles | Metrics
    In catering field, the driving force of dishes can be defined as the ability of dishes to stimulate the overall consumption growth of other dishes due to their own consumption growth. However, there is no clear method to calculate the driving force of dishes. This paper puts forward a novel method to quantify the driving force of dishes through historical bills. First, the paper extracts the characteristics of dishes contained in dataset. Secondly, the paper analyzes the relationship between the dishes to build dishes complex networks, and then based on the complex network, the paper calculates the driving force of dishes through the network spreading procedure with a propagation model. Finally, the paper validates the effectiveness of the proposed method in the real historical billing data set of a catering enterprise.
    Analysis of Text Sentiment Orientation
    WANG Na-na, LI Xiang-qian
    2017, 0(7):  10-15+52.  doi:10.3969/j.issn.1006-2475.2017.07.002
    Asbtract ( 227 )  
    References | Related Articles | Metrics
    Aiming at the problem of manual annotation in the text sentiment analysis, a new method based on five tuple of appraisal expression is proposed. This  method just needs appropriate sentiment dictionary. The sentiment tendencies of comments are analyzed without lots of markup work. Through the combination of unsupervised and supervised learning methods to construct the evaluation thesaurus and evaluation object list; the extraction of appraisal expression is based on these lists, using linear chain conditional random fields model, which is in the chain of sentiment words. Finally, evaluation objects are divided into four categories and emotional words are divided into five types according to the relationship between semantic collocation, combined with the influence of sentence pattern, negative word and degree word on the sentiment analysis, a method of calculating the sentiment tendency of the text is put forward. Compared with other methods, this method based on the appraisal expression has obtained better F value, and it has a certain cross domain.
    Collaborative Filtering Recommendation Algorithm Based on User Score and User Attributes Similarity
    YANG Xiu-ping
    2017, 0(7):  16-19.  doi:10.3969/j.issn.1006-2475.2017.07.003
    Asbtract ( 234 )  
    References | Related Articles | Metrics
    In order to improve the of efficiency and accuracy of collaborative filtering recommendation, and provide personalized recommendation service to users, a novel collaborative filtering recommendation algorithm based on user score and user attributes similarity is proposed. Firstly, the similarity between the users is calculated according to the similarity of user scores, similarity of the user interest tendency, confidence. Secondly, the similarity between users is measured based on user attributes. Finally, the paper uses MovieLens data set and Book-Crossing data set to do comparative test, such as comparing precision, versatility and performance in different sparsity degree and cold start condition. The result shows that the proposed algorithm not only can improve the recommendation accuracy, but also is better than other collaborative filtering algorithms, and it has higher practical application value.
    Design and Implementation of HBase Query Based on SQL
    YUAN Zhao-zheng1, SHAO Xiu-li1, YAN Kai-jing2, LI Dan2, GUO Jian-jun3
    2017, 0(7):  20-26+61.  doi:10.3969/j.issn.1006-2475.2017.07.004
    Asbtract ( 287 )  
    References | Related Articles | Metrics
    In the age of the Internet and big data, SQL relational database can not adapt to the growing amount of data, NoSQL database such as HBase becomes very important. But HBase database operation is more complex, this paper designs and implements a query method of HBase based on SQL, which can enable HBase users to operate the HBase database through the familiar SQL query statement. This paper first builds the compiler of SQL language, translates the SQL statement into the syntax tree, and then translates the syntax tree into the operation of HBase. The coprocessor is used to deal with the aggregate functions and complex expressions in the SQL query statement.
    Application of Multithread Technology in Segmentation of  Data Stream from Space TT&C Network
    LIU Yong, LI Hai-chao, LIANG Li-ming, BAI Yun-gao
    2017, 0(7):  27-31.  doi:10.3969/j.issn.1006-2475.2017.07.005
    Asbtract ( 198 )  
    References | Related Articles | Metrics
     Multithread technology can be applied to solve the problem that the data stream of space Tracking Telemetry and Command (TT&C) network is difficult to be segmented and saved into files when multiple space targets are tracked by multiple space TT&C stations. Firstly, the model of the data stream in space TT&C network is analyzed and the conception of data segmentation is presented. Then, the necessity and possibility of using multithread technology are explained. At the same time, the method of data segmentation and data file generation is proposed by using the waiting mechanism of multithread synchronous object, and the key program code of the application is given. The practical application and the test show that the lossless data segmentation can be realized by this method in processing the data stream of space TT&C station and generating data file, and the method is high reliable and real-time.
    A Path Automatic Generation Method for Dynamic Taint Analysis
    DONG Guo-Liang1,2, ZANG Lie1, LI Hang1, GAN Lu1
    2017, 0(7):  32-37+41.  doi:10.3969/j.issn.1006-2475.2017.07.006
    Asbtract ( 314 )  
    References | Related Articles | Metrics
    Based on the research and analysis of the existing dynamic taint analysis platform, a path automatic generation method is proposed. The sequence of instructions can be obtained by using binary static analysis technique and the binary code coverage rate is calculated with the base block as the granularity. The execution path of the target program is captured in the dynamic execution of the target program and the new path constraint conditions are constructed by the collected path constraint conditions, new test cases which will cover other paths can be generated by constraint solving. The parallel implementation of dynamic taint analysis by using virtualization technology can greatly improve the efficiency and code coverage of the taint analysis.
    A Big Data Deduplication Algorithm Based on Simhash
    ZHOU Chun-hui
    2017, 0(7):  38-41.  doi:10.3969/j.issn.1006-2475.2017.07.007
    Asbtract ( 482 )  
    References | Related Articles | Metrics
     Data deduplication is a main step in big data preprocess. To improve efficiency in deduplication and optimize performance in terrible condition of classic algorithm, this paper uses Chinese text data of microblog and modifies formula of calculating similarity based on classic Simhash algorithm. Duplication rate is considered in the advanced formula, besides, this paper draws on the experience of bucket sorting, distributes threads for several times and levels to improve efficiency. The result of experiment shows that advanced algorithm can reduce running time and improve accuracy compared with classic algorithm.
    Taint Analysis of Fragments in Android Applications
    HU Wang-sheng
    2017, 0(7):  42-47.  doi:10.3969/j.issn.1006-2475.2017.07.008
    Asbtract ( 240 )  
    References | Related Articles | Metrics
    Nowadays, mobile devices have become an important part of peoples life, which also brings many novel security problems. Normally mobile devices store lots of users’ private data such as contacts’ information, which could be utilized by malwares leading to data leaks. Existing taint analysis tools of Android applications cannot deal with Fragment API, this paper designs a method based on simulation of Fragment lifecycles and static taint analysis to inspect the potential data leaks in Fragments of Android applications. The experiment results verify the effectiveness of the method.
    Multi-modal Action Recognition Based on Deep Learning Framework
    HAN Min-jie
    2017, 0(7):  48-52.  doi:10.3969/j.issn.1006-2475.2017.07.009
    Asbtract ( 286 )  
    References | Related Articles | Metrics
    This paper proposes an approach for multi-modal action recognition based on deep neural networks. In order to process different modal video information, different artificial networks are utilized and combined to exploit the multi-modal features. We mainly consider the static and dynamic modalities of human action. With the assistance of Microsoft Kinect sensor camera, the visual and depth skeleton data of video can be captured simultaneously. For the static RGB information, we implement Convolutional Neural Networks, while for the dynamic information we use Recurrent Neural Networks. Finally, we combine the extraction features through these two networks and train the action classifier. The experiment results on the MSR 3D datasets show the effectiveness of our method.
    Application of Chaotic Mapping Combining Finite Field Operation  in Digital Image Encryption
    LIU Bing1,2, LIU Xue-mei3
    2017, 0(7):  53-56.  doi:10.3969/j.issn.1006-2475.2017.07.010
    Asbtract ( 195 )  
    References | Related Articles | Metrics
    A new method of image encryption is proposed by introducing a 3D chaotic mapping and combining matrix operations on finite fields. Firstly, the original image is mapped into two 2D matrices by using chaotic mapping. Then, the original image matrix is respectively combined with the two matrices to perform the addition and multiplication operations on the finite fields. The experimental results show that the proposed algorithm achieves satisfactory results in terms of anti-jamming capability and execution efficiency.
    Template Matching Target Tracking Algorithm Based on Kalman Filtering and Perceptual Hash Technology
    HU Zheng-wei1,2, LIU Chuang-ye1,2
    2017, 0(7):  57-61.  doi:10.3969/j.issn.1006-2475.2017.07.011
    Asbtract ( 261 )  
    References | Related Articles | Metrics
    This paper proposes a tracking algorithm based on Kalman filtering, image perceptual hashing, and template matching to solve the problem that traditional template matching tracking algorithm has high computational complexity and is prone to tracking drift in the case of target deformation, illumination variation, and occlusion. This proposed algorithm uses the hash algorithm to extract the target hash value as a template to match, and the Kalman filtering is used to predict the search region of candidate objects in the next frame, then, a new matching rule is designed to match the templates hash value and target position change information. Finally, according to the matching results, the adaptive template updating strategy and the tracking strategy are used to track the target.The result shows that this proposed algorithm has some robustness in this case of target deformation, illumination variation, and occlusion, and can meet the requirements of real-time tracking.
    Design of Distributed Water-saving Irrigation System Based on ZigBee
    XIAO Ling-lu1,2
    2017, 0(7):  62-67.  doi: 10.3969/j.issn.1006-2475.2017.07.012
    Asbtract ( 145 )  
    References | Related Articles | Metrics
     In view of the current shortage of agricultural water and the low utilization rate of irrigation water, a water-saving irrigation system based on ZigBee wireless sensor network is designed. This system takes embedded microprocessor S3C2440 as the control core, uses CC2530 to build ZigBee wireless network, collects the soil moisture by sensor nodes distributed in the field, uses ZigBee network to realize wireless transmission of data and instruction. According to the soil moisture content and the threshold value of the soil moisture, the opening and closing of the electromagnetic valve node can be controlled to realize the water-saving irrigation. The experimental results show that the measuring points placement of the monitoring system is flexible, the data communication is smooth and effective, the operation is stable and reliable, and all expected design objectives have been achieved.
    Mobile Health Monitoring System Based on Cloud Computing
    CHEN Fang, ZHAO Yang
    2017, 0(7):  68-71+90.  doi: 10.3969/j.issn.1006-2475.2017.07.013
    Asbtract ( 132 )  
    References | Related Articles | Metrics
    In order to cope with the increasing demand for health monitoring, a mobile medical monitoring system based on cloud computing is proposed. Based on wireless sensor network and cloud computing, the system constructs a set of mobile medical monitoring platform including medical data collection, transmission, processing and storage. The physiological parameters of human body are acquired by sensor and pretreated, and then the data is transmitted to the cloud platform, where the data is analyzed and stored, through the wireless sensor network. According to the result of data analysis, some suggests are provided to the people, so as to realize the remote monitoring of physiological parameters of human body and the intelligent early warning of health risk.
    A Mobile Ad-hoc Network Testbed Based on Ethernet
    YI Xiu-liang1, REN Shu-ting2, SUN Yan-tao1,3
    2017, 0(7):  72-78.  doi:10.3969/j.issn.1006-2475.2017.07.014
    Asbtract ( 195 )  
    References | Related Articles | Metrics
    In the research of mobile Ad-hoc network(MANET), software simulation and field test are generally adopted to verify the routing protocols. Software simulation is used to carry out a preliminary verification on the principle and performance of routing protocols. Field test is commonly used in the test of development process and the final validation of the product on line.Although the result is accurate and reliable in the way of field test during the development process of MANET routing protocol, its cost is higher, the operation is relatively complex and the result is easy to be affected by the external factors such as the geographical environment. In terms of this issue, this paper presents a method of building a MANET testbed based on wired Ethernet. And a MANET testbed closed to the real test environment is designed and implemented based on VxWorks. The testbed extends the standard TCP/IP protocol stack, and aims to simulate the characteristics such as node mobility and wireless channel of MANET by adding emulated wireless link layer in the middle of the network layer and the data link layer.In addition, it can configure different scenarios by the management and control platform and collect experimental data for each layer of the protocol stack in real time, so as to facilitate the network researchers to test and verify protocols. The MANET testbed not only overcomes disadvantages of high cost and complex operation, but solves the problem of repeatability of scenarios in field test. It can reduce the test time and improve the efficiency of the development.
    Resource Allocation Strategy in Cloud Computing Based on Task Characteristics
    JIANG Wei-cheng, LI Lan-ying, LIU Hua-chun, GUO Wei-shu
    2017, 0(7):  79-84.  doi:10.3969/j.issn.1006-2475.2017.07.015
    Asbtract ( 161 )  
    References | Related Articles | Metrics
    There are a lot of resources in cloud computing. Efficient use of resources is a main challenge of resource allocation in cloud computing. Based on task flow modeling, the resource occupation and task flow execution are analyzed, and the characteristics of the flow are mastered. A resource allocation scheme on partnership task flow is given. In the process of multi-task flow, the demand of resources may increase or decrease at the same time, which will lead to the phenomenon of the wave resonance. The application-arbitration mechanism is proposed to solve this problem, in which the task flow is transformed into the partnership for using resources efficiently. Results show that the resource consumption and overflow of the algorithm are less than that of the static method. The correctness of the algorithm is verified.
    Continuous Probabilistic Skyline Queries for Moving Data Points in Manhattan Road Networks
    LI Jin-yang, JIANG Shun-qing
    2017, 0(7):  85-90.  doi:10.3969/j.issn.1006-2475.2017.07.016
    Asbtract ( 165 )  
    References | Related Articles | Metrics
    Skyline queries are widely used in location-based service systems. In recent years, various application queries in Manhattan road network have received considerable attention. Considering the uncertain continuous movement of objects in road networks, we mainly research the problem of continuous probabilistic Skyline queries for uncertain moving data points in Manhattan road networks. In such queries, the query point is considered to be stationary, and the objects in road network are treated as moving data points, which are described by the probability density function. First, we acquire the initial Skyline result set according to the initial location and static attributes of the data points, then, calculate the events that could cause the Skyline result set to change by the domination relations among those moving data points, and at last, update the probability Skyline result set according to the calculated events order so as to achieve continuous probability Skyline query. Experimental results show the efficiency and effectiveness of our proposed methods.
    Research on Distributed SDN Controller Dragonflow Based on OpenStack
    ZHAN Han
    2017, 0(7):  91-94.  doi:10.3969/j.issn.1006-2475.2017.07.017
    Asbtract ( 315 )  
    References | Related Articles | Metrics
    With the rise and development of cloud computing, people have a requirement of taking on demand and charging on quantity demanded to cyber resources. Although the available types of IaaS(Infrastructure as a Service) suppliers provides the corresponding virtual cyber resources in the platform, but there is still a big difference between the performance of the virtual network purely based on cloud plaform and the performance of the actual hardware network. In order to improve the performance of the virtual network on the cloud platform, the combination of SDN (Software Define Network) and virtual network is particularly important, and has become the most popular and important project in cloud computing network research field. This paper firstly introduces Neutrons virtual network implementation principle in OpenStack, then introduces the implementation principle of plug-in DVR which solves some problems of North-South traffic concentration, and at last, analyzes and studies the implementation principle of distributed SDN controller plug-in Dragonflow, which is devoted to solving the North-South traffic concentration problem.
    A Source Location Privacy Preserving Protocol Based on Controllable Energy Consumption in WSN
    ZHU Shi-zhao, XUE Shan-liang
    2017, 0(7):  95-100+123.  doi:10.3969/j.issn.1006-2475.2017.07.018
    Asbtract ( 172 )  
    References | Related Articles | Metrics
     Existing source location privacy preserving protocols applied to WSN use random walk, and the routing energy is hard to control. In order to solve this problem, this paper proposed a protocol based on controllable energy consumption (CEP). The proposed protocol took the distance of nodes as measure of energy consumption and created a 3-phase route between source node and sink node using controllable energy consumption. CEP increased the diversity of the routing path through phantom route phase, annular route phase, and credit route phase. Theoretical analysis and simulation experiment show that, the proposed strategy enhances safety of source node and controls the energy consumption.
    Internal Threat Detection Based on Nave Bayesian Theory
    GUO Xiao-ming1,2, SUN Dan1,2
    2017, 0(7):  101-106.  doi:10.3969/j.issn.1006-2475.2017.07.019
    Asbtract ( 203 )  
    References | Related Articles | Metrics
    Compared with the external threats of information system, the internal threat attack of information system is more subtle and more difficult to be discovered. In this paper, the concept and the three common characteristics of internal threats are researched. In view of the general rules of user command operation, a new detection method of internal threat is proposed based on Nave Bayesian using the open security data set called S-M. This method can detect the internal threat attack with mixed operation behavior in the users. This detection method greatly improves the accuracy rate of internal threat detection and decreases the false alarm rate, so that the idea of machine learning has been widely applied in the field of internal threat detection.
    A RFID Mutual-authentication Protocol
    JIAN Bi-yuan1, WANG Hai-tao2, LIU Dao-wei1
    2017, 0(7):  107-110.  doi:10.3969/j.issn.1006-2475.2017.07.020
    Asbtract ( 177 )  
    References | Related Articles | Metrics
    In the Internet of things application, the existing RFID security authentication protocols have problems like security flaws and low authentication efficiency. Aiming at these problems, this paper proposed an improved RFID mutual-authentication protocol based on bit operation. It keeps the freshness of the label using random number, and was formally proved with the BAN logic formalized method at the same time.
    Method of Access Control of Attribute-based Ciphertext Policy for Cloud Storage
    SHI Ting-jun, ZHANG Ying-jie
    2017, 0(7):  111-116.  doi:10.3969/j.issn.1006-2475.2017.07.021
    Asbtract ( 185 )  
    References | Related Articles | Metrics
    This paper puts forward an access control method with ciphertext-policy attribute-based encryption in cloud storage. It encrypts the data with asymmetric encryption. As the attribute of users is revoked, authority generates new version key of attribute group which is sent to the cloud to reencrypt the ciphertext so as to decrease the computing overload of data owner. Because this method doesnt need to update the private key of users, the complexity of algorithm is decreased. The theoretical analysis and experiment result show that this method performs well in the security of data as the attribute of users is revoked. In addition, the method also makes some contributions for reducing the computing overload of authority and transmission cost.
    Development of HTML5 Game Based on LayaFlash Engine
    XU Hui
    2017, 0(7):  117-123.  doi:10.3969/j.issn.1006-2475.2017.07.022
    Asbtract ( 331 )  
    References | Related Articles | Metrics
    This paper analyzes and compares the methods for converting Flash game to HTML5 game, uses Flash AS3 to design a game, converts the game into HTML5 based on LayaFlash in Layabox product frameset, according to the conversion requirements,modifies the initialization code and changes the material loading method. After compiling and debugging, the game has passed the test in the mobile phone browser. At last, the performance analysis is carried out.
    Construction of Digital Laboratory Based on VMware vSphere Private Cloud Computing Model
    WANG Cheng-xi, MENG An-ning
    2017, 0(7):  124-126.  doi: 10.3969/j.issn.1006-2475.2017.07.023
    Asbtract ( 138 )  
    References | Related Articles | Metrics
     Traditional laboratories usually use ordinary PC or diskless workstations. This approach makes the system be vulnerable to viruses, rogue software attact, which results in the increase of system garbage software, lower system performance, and higher failure rate. In order to solve the above problems, this paper studies the digital laboratory construction based on private cloud computing, through the hierarchical service platform. Firstly, this paper analyzes the feasibility of using the private cloud computing model to digitize the laboratory, then designs a digital laboratory based on the private cloud computing model, and finally, studies the key technologies and measures adopted in private cloud computing.