首页 > 最新文献

Journal of China Universities of Posts and Telecommunications最新文献

英文 中文
A software protection framework for mobile devices 移动设备的软件保护框架
Q4 Computer Science Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60231-9
Hang DONG , Jing LI , Miao ZHANG , Shuai SU , Yi-xian YANG

The software protection technology is the main component of modern software security technology. Generally, confusion and encryption methods are using in software protection technology to provide traditional desktop applications. But applications based on mobile devices are also faces with threats such as piracy and tampering. The security problem in existing applications for mobile devices will do far more harm to users than traditional virus, but there is no effective software protection security framework for them. A software application framework for mobile devices is proposed in this paper, and the white box decryption algorithm involved is improved. And it is analyzed in this paper the performance and security of the framework proposed, the operational efficiency of the improved encryption algorithm is verified.

软件防护技术是现代软件安全技术的重要组成部分。一般来说,在软件保护技术中使用混淆和加密方法来提供传统的桌面应用程序。但基于移动设备的应用程序也面临着盗版和篡改等威胁。现有移动设备应用程序的安全问题对用户造成的危害远远大于传统的病毒,但目前还没有针对它们的有效的软件防护安全框架。提出了一种适用于移动设备的软件应用框架,并对其中的白盒解密算法进行了改进。并对所提出的框架的性能和安全性进行了分析,验证了改进后的加密算法的运行效率。
{"title":"A software protection framework for mobile devices","authors":"Hang DONG ,&nbsp;Jing LI ,&nbsp;Miao ZHANG ,&nbsp;Shuai SU ,&nbsp;Yi-xian YANG","doi":"10.1016/S1005-8885(13)60231-9","DOIUrl":"10.1016/S1005-8885(13)60231-9","url":null,"abstract":"<div><p>The software protection technology is the main component of modern software security technology. Generally, confusion and encryption methods are using in software protection technology to provide traditional desktop applications. But applications based on mobile devices are also faces with threats such as piracy and tampering. The security problem in existing applications for mobile devices will do far more harm to users than traditional virus, but there is no effective software protection security framework for them. A software application framework for mobile devices is proposed in this paper, and the white box decryption algorithm involved is improved. And it is analyzed in this paper the performance and security of the framework proposed, the operational efficiency of the improved encryption algorithm is verified.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 136-140"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60231-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74351887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face detection in video based on AdaBoost algorithm and skin model 基于AdaBoost算法和皮肤模型的视频人脸检测
Q4 Computer Science Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60259-9
Cui-huan DU , Hong ZHU , Li-ming LUO , Jie LIU , Xiang-yang HUANG

A real-time method is proposed to detect faces in videos. First it uses frame difference method to extract the motion area. Next the clustering character of skin is used to get the general face area. AdaBoost algorithm is applied to make concrete detection of human face. Finally an improved CamShift algorithm method is used to keep the tracking and improving algorithm speed. The experiments demonstrate the robustness and high speed of the proposed algorithm.

提出了一种视频中人脸的实时检测方法。首先采用帧差法提取运动区域;然后利用皮肤的聚类特征得到脸部的总面积。采用AdaBoost算法对人脸进行具体检测。最后采用改进的CamShift算法保持跟踪,提高算法速度。实验证明了该算法的鲁棒性和高速度。
{"title":"Face detection in video based on AdaBoost algorithm and skin model","authors":"Cui-huan DU ,&nbsp;Hong ZHU ,&nbsp;Li-ming LUO ,&nbsp;Jie LIU ,&nbsp;Xiang-yang HUANG","doi":"10.1016/S1005-8885(13)60259-9","DOIUrl":"10.1016/S1005-8885(13)60259-9","url":null,"abstract":"<div><p>A real-time method is proposed to detect faces in videos. First it uses frame difference method to extract the motion area. Next the clustering character of skin is used to get the general face area. AdaBoost algorithm is applied to make concrete detection of human face. Finally an improved CamShift algorithm method is used to keep the tracking and improving algorithm speed. The experiments demonstrate the robustness and high speed of the proposed algorithm.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 6-9, 24"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60259-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77948300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Multi-class pattern recognition with the group match competition method 基于分组匹配竞争法的多类模式识别
Q4 Computer Science Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60238-1
Xiao-yu LIU, Zhong-yuan YU, Yu-min LIU, Hou-jian KANG, Jin-hong MU

High recognition rate of multi-class pattern recognition is difficult to obtain, especially when the feature extraction is not ideal. So achieving a high recognition rate with nonideal feature extraction makes great sense. Based on the early study of multiple-set-compete method (MSCM) and the algorithm of result reliability, this article proposes a new recognition method named group match competition method (GMCM). The GMCM precedes the early work with a larger scope of applications. Early work which the authors did can only deal with the recognition work with the number of powers of 2 classes, while GMCM can cope with the classes of any number. This article further illustrates the MSCM, the algorithm of result reliability and their functions in the GMCM. Three sets of cases are demonstrated and formats of grouping are discussed. The recognition results show that the GMCM is a robust method and it is capable of achieving the high recognition rate of the multi-class pattern recognition.

多类模式识别的高识别率很难获得,特别是在特征提取不理想的情况下。因此,利用非理想特征提取实现高识别率具有重要意义。本文在对多集竞争法(MSCM)和结果可靠性算法进行研究的基础上,提出了一种新的识别方法——分组匹配竞争法(GMCM)。GMCM先于早期工作,应用范围更广。作者早期所做的工作只能处理2类的幂次数的识别工作,而GMCM可以处理任何数量的类。本文进一步阐述了MSCM、结果可靠性算法及其在GMCM中的作用。给出了三组实例,并讨论了分组的格式。识别结果表明,该方法具有很强的鲁棒性,能够实现高识别率的多类模式识别。
{"title":"Multi-class pattern recognition with the group match competition method","authors":"Xiao-yu LIU,&nbsp;Zhong-yuan YU,&nbsp;Yu-min LIU,&nbsp;Hou-jian KANG,&nbsp;Jin-hong MU","doi":"10.1016/S1005-8885(13)60238-1","DOIUrl":"10.1016/S1005-8885(13)60238-1","url":null,"abstract":"<div><p>High recognition rate of multi-class pattern recognition is difficult to obtain, especially when the feature extraction is not ideal. So achieving a high recognition rate with nonideal feature extraction makes great sense. Based on the early study of multiple-set-compete method (MSCM) and the algorithm of result reliability, this article proposes a new recognition method named group match competition method (GMCM). The GMCM precedes the early work with a larger scope of applications. Early work which the authors did can only deal with the recognition work with the number of powers of 2 classes, while GMCM can cope with the classes of any number. This article further illustrates the MSCM, the algorithm of result reliability and their functions in the GMCM. Three sets of cases are demonstrated and formats of grouping are discussed. The recognition results show that the GMCM is a robust method and it is capable of achieving the high recognition rate of the multi-class pattern recognition.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 105-108"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60238-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76247528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient service request detection algorithm based on hormone regulation mechanism in the Internet of things 基于物联网激素调节机制的高效服务请求检测算法
Q4 Computer Science Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60242-3
Yan-ling JIN , Yong-sheng DING , Kuang-rong HAO , Yan-jun LIU

With the raising challenges of the Internet of things (IoT), e.g. the giant-scale heterogeneous network elements, and the uncertainty of sensing information and the dynamic environment that the system resides, there is no complete and widely accepted theory. In this paper, a hormone-based service detection algorithm (HSDA) for detecting the service requests generated randomly in the IoT is proposed. Inspired by the endocrine mechanism in human body, the nodes in the network without centralized command or sinks can tune themselves spontaneously by exchanging information among regional neighbors through different hormones. A dynamic activation scheme is realized as the HSDA to guarantee the rapidness of the network on responding the service requests. Simulation results show that the HSDA algorithm entitles the network with intelligent decision-making and cooperative working abilities, based on which the stability of the network and the effectiveness for detecting service requests generated randomly can be guaranteed simultaneously.

随着物联网(Internet of things, IoT)面临的挑战越来越大,如庞大的异构网络元素、传感信息的不确定性以及系统所处的动态环境,目前还没有一个完整的、被广泛接受的理论。本文提出了一种基于激素的服务检测算法(HSDA),用于检测物联网中随机产生的服务请求。受人体内分泌机制的启发,网络中的节点不需要集中指挥或汇聚,通过不同的激素在区域邻居之间交换信息,自发地进行自我调节。为了保证网络对业务请求的快速响应,实现了一种动态激活方案作为HSDA。仿真结果表明,HSDA算法使网络具有智能决策和协同工作能力,同时保证了网络的稳定性和对随机产生的业务请求的检测有效性。
{"title":"Efficient service request detection algorithm based on hormone regulation mechanism in the Internet of things","authors":"Yan-ling JIN ,&nbsp;Yong-sheng DING ,&nbsp;Kuang-rong HAO ,&nbsp;Yan-jun LIU","doi":"10.1016/S1005-8885(13)60242-3","DOIUrl":"10.1016/S1005-8885(13)60242-3","url":null,"abstract":"<div><p>With the raising challenges of the Internet of things (IoT), e.g. the giant-scale heterogeneous network elements, and the uncertainty of sensing information and the dynamic environment that the system resides, there is no complete and widely accepted theory. In this paper, a hormone-based service detection algorithm (HSDA) for detecting the service requests generated randomly in the IoT is proposed. Inspired by the endocrine mechanism in human body, the nodes in the network without centralized command or sinks can tune themselves spontaneously by exchanging information among regional neighbors through different hormones. A dynamic activation scheme is realized as the HSDA to guarantee the rapidness of the network on responding the service requests. Simulation results show that the HSDA algorithm entitles the network with intelligent decision-making and cooperative working abilities, based on which the stability of the network and the effectiveness for detecting service requests generated randomly can be guaranteed simultaneously.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 86-90"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60242-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78300690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Programmable virtual network as a service: towards a future Internet testbed based on IaaS cloud 可编程虚拟网络即服务:迈向基于IaaS云的未来互联网试验台
Q4 Computer Science Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60233-2
Jun-xue LIANG , Zhao-wen LIN , Yan MA , Yu-ning WANG , Can ZHANG , Zheng MI , Jian LI

During recently years, several OpenFlow-enabled testbeds have been deployed in world-wide research community. Typically, these OpenFlow-enabled testbeds need to stitch to other testbeds to link to virtual servers and immit experimentation traffic. From the view point of researchers, these OpenFlow-enabled testbeds only provide OpenFlow networking resource, and they have to resort to other experiment infrastructure to provide computing and storage resource. Due to the OpenFlow networking and other resource belongs to different infrastructure provider and is managed by their own control software, it is difficult to coordinate these partners to provide a full programmable experiment environment. Meanwhile, the control software of these testbeds are tight coupling with their substrate resources, which means that these substrate resources, together with virtualization technologies, are permanently dedicated to the control software and difficult to be used by other services. In this paper, a new future Internet testbed architecture based on the open Infrastructure-as-a-service cloud and software defined network (SDN) paradigm is proposed. It extends the current virtual network service by adding programmable virtual switch and controller resources that can be controlled by the researcher. Its loose coupling model allows the testbed operator decouple the experiment service from the infrastructure provider, which is a more flexible way to build the testbed. The initial prototype implementation in this paper shows that this new testbed architecture built on IaaS cloud and SDN is feasible and flexible to provide programmable virtual network service.

近年来,一些支持openflow的测试平台已经在世界范围的研究社区中部署。通常,这些启用openflow的测试平台需要连接到其他测试平台,以连接到虚拟服务器,并限制实验流量。从研究人员的角度来看,这些启用OpenFlow的试验台只提供OpenFlow网络资源,他们必须借助其他实验基础设施来提供计算和存储资源。由于OpenFlow网络等资源属于不同的基础设施提供商,并且由各自的控制软件进行管理,因此很难协调这些合作伙伴提供完全可编程的实验环境。同时,这些试验台的控制软件与其底层资源是紧密耦合的,这意味着这些底层资源与虚拟化技术一起永久专用于控制软件,难以被其他服务使用。本文提出了一种基于开放式基础设施即服务云和软件定义网络(SDN)范式的未来互联网测试平台架构。它通过增加可编程的虚拟交换机和控制器资源来扩展现有的虚拟网络服务。它的松耦合模型允许测试平台运营商将实验服务与基础设施提供商分离,这是一种更灵活的构建测试平台的方式。本文的初步原型实现表明,这种基于IaaS云和SDN的新型测试平台架构在提供可编程虚拟网络服务方面是可行和灵活的。
{"title":"Programmable virtual network as a service: towards a future Internet testbed based on IaaS cloud","authors":"Jun-xue LIANG ,&nbsp;Zhao-wen LIN ,&nbsp;Yan MA ,&nbsp;Yu-ning WANG ,&nbsp;Can ZHANG ,&nbsp;Zheng MI ,&nbsp;Jian LI","doi":"10.1016/S1005-8885(13)60233-2","DOIUrl":"10.1016/S1005-8885(13)60233-2","url":null,"abstract":"<div><p>During recently years, several OpenFlow-enabled testbeds have been deployed in world-wide research community. Typically, these OpenFlow-enabled testbeds need to stitch to other testbeds to link to virtual servers and immit experimentation traffic. From the view point of researchers, these OpenFlow-enabled testbeds only provide OpenFlow networking resource, and they have to resort to other experiment infrastructure to provide computing and storage resource. Due to the OpenFlow networking and other resource belongs to different infrastructure provider and is managed by their own control software, it is difficult to coordinate these partners to provide a full programmable experiment environment. Meanwhile, the control software of these testbeds are tight coupling with their substrate resources, which means that these substrate resources, together with virtualization technologies, are permanently dedicated to the control software and difficult to be used by other services. In this paper, a new future Internet testbed architecture based on the open Infrastructure-as-a-service cloud and software defined network (SDN) paradigm is proposed. It extends the current virtual network service by adding programmable virtual switch and controller resources that can be controlled by the researcher. Its loose coupling model allows the testbed operator decouple the experiment service from the infrastructure provider, which is a more flexible way to build the testbed. The initial prototype implementation in this paper shows that this new testbed architecture built on IaaS cloud and SDN is feasible and flexible to provide programmable virtual network service.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 126-130"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60233-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90403540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Programmable virtual network instantiation in IaaS cloud based on SDN 基于SDN的IaaS云中可编程虚拟网络实例化
Q4 Computer Science Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60234-4
Yong-juan WU , Jun-xue LIANG , Hua ZHANG , Zhao-wen LIN , Yan MA , Zhong TIAN

A possible approach to cope with the diversity of future networks is to set up multiple isolated virtual networks on top of a single shared physical substrate, and each virtual network is customized to some specific purposes. However, in the current realization of virtualized infrastructure, the OpenStack infrastructure as a service (IaaS) cloud, whose isolation and programmability are limited in terms of scalability and performance. To overcome these limitations, we propose a solution based on software defined networking (SDN) which is composed of a centralized server and distributed agents. The server has complete view of the whole network substrate, and is responsible for the installation and management of virtual network through the distributed agents. Each agent has the local view of the substrate node. They can manage the local resources, dispatch and filter the inner- programmable virtual network (PVN) traffic based on MAC isolation which is more scalable than virtual local area network (VLAN) and more efficient than GRE. Our prototype implementation shows that this architecture is feasible and provides a better compromise between flexibility and performance than the solo centralized and distributed solutions.

应对未来网络多样性的一种可能方法是在单个共享物理基板上建立多个隔离的虚拟网络,并且每个虚拟网络都针对某些特定目的进行定制。然而,在目前虚拟化基础设施的实现中,OpenStack的IaaS (infrastructure as a service)云,其隔离性和可编程性在可扩展性和性能方面受到限制。为了克服这些限制,我们提出了一种基于软件定义网络(SDN)的解决方案,该解决方案由集中式服务器和分布式代理组成。服务器具有整个网络底层的完整视图,并通过分布式代理负责虚拟网络的安装和管理。每个代理都有基板节点的本地视图。基于MAC隔离的内部可编程虚拟网络(PVN)流量调度和过滤,具有比VLAN (virtual local area network)更强的可扩展性和比GRE更高效的优点。我们的原型实现表明,这种架构是可行的,并且比单独的集中式和分布式解决方案在灵活性和性能之间提供了更好的折衷。
{"title":"Programmable virtual network instantiation in IaaS cloud based on SDN","authors":"Yong-juan WU ,&nbsp;Jun-xue LIANG ,&nbsp;Hua ZHANG ,&nbsp;Zhao-wen LIN ,&nbsp;Yan MA ,&nbsp;Zhong TIAN","doi":"10.1016/S1005-8885(13)60234-4","DOIUrl":"10.1016/S1005-8885(13)60234-4","url":null,"abstract":"<div><p>A possible approach to cope with the diversity of future networks is to set up multiple isolated virtual networks on top of a single shared physical substrate, and each virtual network is customized to some specific purposes. However, in the current realization of virtualized infrastructure, the OpenStack infrastructure as a service (IaaS) cloud, whose isolation and programmability are limited in terms of scalability and performance. To overcome these limitations, we propose a solution based on software defined networking (SDN) which is composed of a centralized server and distributed agents. The server has complete view of the whole network substrate, and is responsible for the installation and management of virtual network through the distributed agents. Each agent has the local view of the substrate node. They can manage the local resources, dispatch and filter the inner- programmable virtual network (PVN) traffic based on MAC isolation which is more scalable than virtual local area network (VLAN) and more efficient than GRE. Our prototype implementation shows that this architecture is feasible and provides a better compromise between flexibility and performance than the solo centralized and distributed solutions.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 121-125"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60234-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87292212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on search engine techniques of Surakarta game 苏拉卡塔游戏的搜索引擎技术研究
Q4 Computer Science Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60235-6
Hong-kun QIU , Ya-jie WANG , Fu-xiang GAO , Quan QIU

Computer game (CG) is one of the most challenging research directions in the fields of computer science and artificial intelligence (AI). Relational techniques of computer game are discussed in this article. The main work is listed below as three aspects: First of all, we analyzed the characteristics of Surakarta and modeled the game process of Surakarta. Next then, we discussed the techniques of search engine, which include game state evaluation and game tree search. Lastly, a series of experiments for the search engine were done. And then, combined with the experiments we get the empirical equation. These techniques made the evaluation of the game state more accurate, and the performance of the search engine was more effective and intelligent. The results and conclusions of these experiments have some reference values to other computer game procedures. And they have been proved by a series of experiments and competitions.

计算机游戏(CG)是计算机科学和人工智能(AI)领域最具挑战性的研究方向之一。本文讨论了电脑游戏的相关技术。主要工作分为三个方面:首先,分析了《雅加达》的特点,对《雅加达》的游戏过程进行了建模。然后,我们讨论了搜索引擎技术,包括游戏状态评估和游戏树搜索。最后,对搜索引擎进行了一系列实验。然后,结合实验,我们得到经验方程。这些技术使得博弈状态的评估更加准确,搜索引擎的性能更加高效和智能。实验结果和结论对其他计算机游戏程序具有一定的参考价值。并通过一系列的实验和竞赛得到了验证。
{"title":"Research on search engine techniques of Surakarta game","authors":"Hong-kun QIU ,&nbsp;Ya-jie WANG ,&nbsp;Fu-xiang GAO ,&nbsp;Quan QIU","doi":"10.1016/S1005-8885(13)60235-6","DOIUrl":"10.1016/S1005-8885(13)60235-6","url":null,"abstract":"<div><p>Computer game (CG) is one of the most challenging research directions in the fields of computer science and artificial intelligence (AI). Relational techniques of computer game are discussed in this article. The main work is listed below as three aspects: First of all, we analyzed the characteristics of Surakarta and modeled the game process of Surakarta. Next then, we discussed the techniques of search engine, which include game state evaluation and game tree search. Lastly, a series of experiments for the search engine were done. And then, combined with the experiments we get the empirical equation. These techniques made the evaluation of the game state more accurate, and the performance of the search engine was more effective and intelligent. The results and conclusions of these experiments have some reference values to other computer game procedures. And they have been proved by a series of experiments and competitions.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 117-120"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60235-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75594097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human machine interactive system on smart home of IoT 物联网智能家居的人机交互系统
Q4 Computer Science Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60240-X
Kun-kun DU , Zhi-liang WANG , Mi HONG

Along with the development of human-computer interaction technology and improvement of people's living standards, study of Internet of things (IoT) has become the focus for years. Meanwhile, smart home system has drawn more and more attention in IoT. In correlative research, artificial psychology theory and the harmony of human-computer interaction play an important role in smart home of IoT. In this study, software platform of the management system in smart home is designed, and users are Chinese. So the language in the system is Chinese. To analyze the basic interaction between users and computer, calendar, weather forecast, internet browsing, several electrical models are designed. To deal with the humanized interaction between human and computers, some features are implemented such as: analysis of emotional models, creation of the emotional models, text emotion recognition, and other basic functions in human-computer interaction.

随着人机交互技术的发展和人们生活水平的提高,物联网(IoT)的研究成为近年来人们关注的焦点。与此同时,智能家居系统在物联网领域也受到越来越多的关注。在相关研究中,人工心理学理论和人机交互的和谐在物联网智能家居中发挥着重要作用。本研究设计了智能家居管理系统的软件平台,用户为中国人。所以系统中的语言是中文。为了分析用户与计算机、日历、天气预报、互联网浏览之间的基本交互,设计了几个电子模型。为解决人机交互的人性化问题,实现了情感模型分析、情感模型创建、文本情感识别等人机交互的基本功能。
{"title":"Human machine interactive system on smart home of IoT","authors":"Kun-kun DU ,&nbsp;Zhi-liang WANG ,&nbsp;Mi HONG","doi":"10.1016/S1005-8885(13)60240-X","DOIUrl":"10.1016/S1005-8885(13)60240-X","url":null,"abstract":"<div><p>Along with the development of human-computer interaction technology and improvement of people's living standards, study of Internet of things (IoT) has become the focus for years. Meanwhile, smart home system has drawn more and more attention in IoT. In correlative research, artificial psychology theory and the harmony of human-computer interaction play an important role in smart home of IoT. In this study, software platform of the management system in smart home is designed, and users are Chinese. So the language in the system is Chinese. To analyze the basic interaction between users and computer, calendar, weather forecast, internet browsing, several electrical models are designed. To deal with the humanized interaction between human and computers, some features are implemented such as: analysis of emotional models, creation of the emotional models, text emotion recognition, and other basic functions in human-computer interaction.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 96-99"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60240-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74443617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Distributed joint spectrum detection and power allocation in multi-band cognitive radio networks 多频带认知无线电网络中的分布式联合频谱检测与功率分配
Q4 Computer Science Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60247-2
Xiao-yu WANG , yuan-an LIU , Gang XIE

This article proposes a novel dynamic spectrum sharing scheme in distributed multi-band cognitive radio networks. A non-cooperative game has been utilized to model the spectrum sharing among secondary base stations (SBSs). A distributed joint spectrum detection and power allocation algorithm is designed for maximizing the downlink throughput of secondary networks. Simulation results demonstrate that the proposed algorithm converges fast and achieves a better throughput performance than uniform threshold case. Meanwhile, the convergence of algorithm is proved by Nikaido-Isoda (N-I) function method.

提出了一种新的分布式多频带认知无线电网络动态频谱共享方案。利用一种非合作博弈模型来模拟二级基站间的频谱共享。为了最大限度地提高二级网络的下行吞吐量,设计了分布式联合频谱检测和功率分配算法。仿真结果表明,该算法收敛速度快,具有比统一阈值情况更好的吞吐量性能。同时,利用Nikaido-Isoda (N-I)函数法证明了算法的收敛性。
{"title":"Distributed joint spectrum detection and power allocation in multi-band cognitive radio networks","authors":"Xiao-yu WANG ,&nbsp;yuan-an LIU ,&nbsp;Gang XIE","doi":"10.1016/S1005-8885(13)60247-2","DOIUrl":"10.1016/S1005-8885(13)60247-2","url":null,"abstract":"<div><p>This article proposes a novel dynamic spectrum sharing scheme in distributed multi-band cognitive radio networks. A non-cooperative game has been utilized to model the spectrum sharing among secondary base stations (SBSs). A distributed joint spectrum detection and power allocation algorithm is designed for maximizing the downlink throughput of secondary networks. Simulation results demonstrate that the proposed algorithm converges fast and achieves a better throughput performance than uniform threshold case. Meanwhile, the convergence of algorithm is proved by Nikaido-Isoda (N-I) function method.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 59-63"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60247-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80497913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security threats and measures for the cyber-physical systems 网络物理系统的安全威胁与对策
Q4 Computer Science Pub Date : 2013-08-01 DOI: 10.1016/S1005-8885(13)60254-X
Li ZHANG, Qing WANG, Bin TIAN

Governments, companies and research institutions are pressuring research and development of the cyber-physical systems. However, the development of cyber-physical systems is constrained by security and privacy threats. This paper summarizes security threats to cyber-physical systems to provide a theoretical reference for study of cyber-physical systems as well as useful security measures. The architecture of cyber-physical systems is used to classify threats for the perception-execution layer, transport layer and application-control layer. The perception-execution layer threats include security threats for the nodes such as sensors and actuators. Transport layer threats include data leakage or damage and security issues during massive data integration. Application-control layer threats include the loss of user privacy, incorrect access control policies and inadequate security standards. Finally, this paper gives security measures and recommendations for all types of security threats.

政府、公司和研究机构正在对网络物理系统的研究和开发施加压力。然而,网络物理系统的发展受到安全和隐私威胁的制约。本文总结了网络物理系统面临的安全威胁,为网络物理系统的研究提供理论参考和有效的安全措施。利用网络物理系统的体系结构对感知执行层、传输层和应用控制层的威胁进行分类。感知-执行层威胁包括对传感器和执行器等节点的安全威胁。传输层威胁包括大数据集成过程中的数据泄漏或损坏以及安全问题。应用控制层的威胁包括用户隐私的丢失、不正确的访问控制策略和不充分的安全标准。最后,针对各种类型的安全威胁给出了安全措施和建议。
{"title":"Security threats and measures for the cyber-physical systems","authors":"Li ZHANG,&nbsp;Qing WANG,&nbsp;Bin TIAN","doi":"10.1016/S1005-8885(13)60254-X","DOIUrl":"10.1016/S1005-8885(13)60254-X","url":null,"abstract":"<div><p>Governments, companies and research institutions are pressuring research and development of the cyber-physical systems. However, the development of cyber-physical systems is constrained by security and privacy threats. This paper summarizes security threats to cyber-physical systems to provide a theoretical reference for study of cyber-physical systems as well as useful security measures. The architecture of cyber-physical systems is used to classify threats for the perception-execution layer, transport layer and application-control layer. The perception-execution layer threats include security threats for the nodes such as sensors and actuators. Transport layer threats include data leakage or damage and security issues during massive data integration. Application-control layer threats include the loss of user privacy, incorrect access control policies and inadequate security standards. Finally, this paper gives security measures and recommendations for all types of security threats.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 25-29"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60254-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88129761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
Journal of China Universities of Posts and Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1