Different applications have different security sensitivities, which are determined by subjective judgment in the process of security research on Internet of Things(IOT). This paper presents a Security Model of IOT Based on Hierarchy(BHSM-IOT), which can be used to analyze the topology structure, predict the attack source and attack type and determine the application level of security domain, so that appropriate safety technical configuration can be made. The model is applied in a wisdom campus system of a university, and result proves that it is helpful for the managers to construct a more safe and stability system for the students and teachers with the model.
For the requirement of reliable communication and efficiency of Computer Numerical Control(CNC) system to field-bus, this paper analyzes the efficiency of traditional field-bus and its causation, and designs a high efficiency and reliable communication mechanism based on hardware link layer retry. Mechanism is successfully used into CNC system, it eliminates layer protocol transform and interrupt delay of operating system. Experimental results show that the mechanism has high efficiency and real-time, it can meet the requirement of CNC system application.
To solve the problems that exitst in computational model of space-based visual attention, a computational model for object-based visual attention using spatial visual saliency is proposed in this paper. Edges are extracted from the input image and salient edges are obtained according to the edge saliency. Then these salient edges are organized to get the boundary of the perceptual objects. Attention value of each perceptual object is computed according to the area, location and saliency. Focus of attention is shifted among these perceptual objects in terms of the attention value. The proposed model is tested on many natural images. Experimental results show that the proposed model is valid and the attention results are consistent with human visual system.
Aiming at that the boundaries of time series exists uncertainty when clustering, this paper presents a method of soften boundaries. In order to form sub-series, the values of multivariate time series are put into recordset’s attributes and windows of given width are slided through the attributes. The sub-series are normalized with a simple method and then clustered with fuzzy logic so as to obtain its delegates with soften boundaries. Rule’s support and confidence are calculated with membership so as to make the two important measures more exact. Good rules are selected with J-measure which is based on membership. Empirical results show that the patterns and rules are meaningful and resultful.
This paper studies on the dangerous edge that presents in the Mod-dejavoo algorithm. It points out that the location and the role of the dangerous edge, by comparing the control-flow graphs around the program changed, analysing the characteristics of Java. It also points out the dangerous edge does not occur uniquely. It proposes a method to find the location and quantity based on the Mod-dejavoo algorithm, which generates regression test set effectively. The research provides test set screening with a new method.
The paper introduces the pre-processing procedure, which includes data cleaning, Website topology identification, user identification, session identification, page filtering and path completion. With respect to logs without reference record, a path completion algorithm based on Website topology is put forward and implemented. A multi-factor user similarity computing method is introduced and applies on Web user clustering. Davies-Bouldin index is used to evaluate to effectiveness of the experiment results.
Collaborative filtering is one of the most widely used algorithms in the personalized recommendation system. With the increase in the number of users and items, the data sparsity becomes the important factor which affects the quality of the personalized recommendation. To address this issue, a new collaborative filtering algorithm based on the similarity propagation is introduced. The similarity between users can propagate in a limited path length as long as the similarity greater than the threshold. So the number of the nearest neighbors which is used to prediction increases and the quality of the recommendation improved because of the relief of the data sparsity.
Aiming at traditional LT code has the drawbacks of coding efficiency is not high, decoding time is long and decoding probability is low, this paper designs a system of Variable Frame Length(VFL) LT code in Wireless Sensor Network(WSN), takes the measure of frame length design, splits the source data and encodes them separately to meet requirement of accuracy and efficiency of data in networks and unequal protection requirements. Experimental results show that VFLLT system can effectively improve the coding efficiency, the decoding and recovery probability in WSN, and enhance the feasibility of LT code in actual system.
From the angle whether maintaining flow state information, this paper presents an improved Active Queue Management(AQM)——Single Flow-AQM(SF-AQM). SF-AQM only maintenances data flow state information which has high transmission rate in order to reduce the router overhead identifies the non-adaptive flow by comparing packet the arrival intervals of different flow, improves the fairness of the algorithm, and controls the queue length under the target value to ensure the stability of the algorithm. Simulation results show SF-AQM algorithm has good performance in fairness and stability, and it is an effective algorithm in high performance communication networks congestion control.
In view of the irrelativeness between virtual channel scheduling and buffer management of current satellite networks, a new scheduling algorithm of Buffer Utilization rate Detection(BUD) is proposed. The algorithm analyzes the buffer utilization rate and the urgent degree thoroughly and then schedules the Virtual Channel(VC) which is corresponded to the scheduling function. It uses the OPNET to simulate and contrast the new scheduling algorithm, and results indicate that it is effective to decline the loss of data and delay, and the “starvation” phenomena caused by the unfairness of low priority service can be avoided under the premise of guaranteeing the throughput.
This paper presents a network flow inspection method which combines Deep Packet Inspection(DPI) with Deep Flow Inspection(DFI). DPI fulfills the target of fine-grained at the use of Pattern Match Engine(PME) of the network processor MPC8572. DFI is to notify the underlying false detection that can be caused by DPI and to request for re-detecting. Experimental results show that joint method has the ability of inspection wrong and error correction, and it can improve the accuracy of inspection.
The secret information is embedded in one of elements of every 8×8 Discrete Cosine Transform(DCT) coefficient matrixes of cover image, and based on DCT characteristic the stego-image is correspondingly changed according to different embedded locations, which can improve imperceptibility of Spread Spectrum(SS) algorithm. Simulation results indicate that the SS algorithm based on DCT characteristic can improve Peak Signal to Noise Ratio(PSNR) of stego-image not by reduction of embedment strength, thus avoids the problem that reduction of embedment strength enlarges retrieval errors. In order to effectively overcome the adverse effect of round error and raise accuracy rating, a fault-tolerant retrieval algorithm is proposed according to the probability density function of retrieval errors. Simulation results verify the feasibility and validity of the algorithm.
According to the possibility that an attacker can be detected during a network attack, an attack graph is transferred into a Petri Net, which is then expanded into an Expanded Petri Net(EPN). Attack costs of places are used to solve the optimum attach path and the total attack cost of an network attack; the concept of maximum flow is used defined the maximum burdening ability, and the concept of attack feasibility is put forward from the angle of two-dimensional analysis of network attack. The attack graph-based expanded Petri net attack net is represented, the ergodicity of the model’s related algorithms is assured by the EPN inference rules. When there are many arcs in an original attack graph, the complexity of the algorithm is lower than that of the Dijkstra algorithm. More is the paths among attack launching points and attack goals in an attack graph, more is efficient the algorithms. Results of a testing case show that the model can make a comprehensive analysis to network attack.
Aiming at the privacy protection problem and message reliability problem in Vehicular Ad Hoc NETwork(VANET), a scheme for reliable message authentication and signature based on bilinear pair and pseudonym is proposed. The scheme uses self-generated pseudonym to sign each message, which can protect the user’s privacy and be verified efficiently at the same time. A priori counter measure for improving message reliability is given. The security and efficient analysis is also proposed.
To improve 3D facial expression feature regions segmentation, an automatic feature regions segmentation method is presented. The facial feature points are detected by conducting projection and curvature calculation, and are used as the basis of facial expression feature regions automatic segmentation. To obtain more abundant facial expression information, the Facial Action Coding System(FACS) coding rules is introduced to extend the extracted characteristic matrix. And facial expressions can be recognized by combining classifiers. Experimental results of 3D facial expression samples show that the method is effective with high recognition rate.
On different distribution of multi-class imbalanced data, different base classifiers have different adaptability. To aim at the classifier selection problem, based on the analysis and comparison of the evaluation criteria of Accuracy(ACC) and Area Under the ROC(AUC), it chooses AUC to evaluate a classifier and draws the conclusion that Bayesian classifier is the best one and SVM classifier has greater room for improvement, through the experiments on dealing with many different distribution unbalanced data from standard database.
In the process of building manual system relying on multi-Agent, the factors such as the difference of Agent’s interests, the limited resources and so on will inevitably lead to conflict. While effective consultation and competition between multi-Agent helps to reduce conflict and improve overall performance. It proposes a new multi-Agent negotiation competition model, which relies on negotiation information to improve the forecast accuracy of opponent’s competing strategies, depends on probability to selection strategies to maximize the interest and shortens negotiation time effectively.
The traditional clustering method is prone to fall into local extremum. It is bad to classify when the data is linear inseparable. This paper proposes a fuzzy kernel clustering image segmentation method based on maximum entropy. It applies maximum entropy algorithm to obtain the initial centers and maps the sample from the input space to the feature space by introducing Mercer kernel function into the method. It completes image segmentation in the feature space. Experimental result shows that the method can reduce the iteration time and steady the class result, and effectively segment the target from its background.
The processing of smooth region and edge region is identity using Markov Random Fields(MRF), which leads to a lot of redundancy program and too long operation time. Aiming at this problem, this paper presents MRF image restoration method based on fuzzy classification. Image subblock can be fuzzy classified according to its statistical characteristics obeying different distribution, the image can be restored by MRF. The blurred binary image is restored by this method and the experimental results show that comparing with the MRF method, the method based on fuzzy classification can reduce operation time and improve denoising effect.
Aiming at the problems of characteristic extraction and description in image recognition, retrieval and registration, by using eigenvalue decomposition approach for weighted graph, this paper constructs boundary shape descriptor and spatial relation descriptor based on metric matrix eigenvalue, which is invariant under translation, scaling and rotation. Analysis and experiments prove that the spatial relation descriptor is robust under translation, scaling, rotation and small noise, and it has good similarity discriminating ability. Compared with traditional algorithms, it can describe image better with less computation.
An adaptive Fuzzy C-Means(FCM) method for image segmentation based on fuzziness rate is proposed. It automatically determines the proper number of fuzzy clustering by utilizing the gradient detection method of wave trough and peak. Accurate original cluster centers are acquired by utilizing fuzzy threshold method. A novel objective function is established which contains feature information and spatial information. Experimental results show that the method has fast segmentation speed and high segmentation accuracy, and has stronger robustness.
In embedded systems, this paper proposes a Dynamic Power Management(DPM) scheme based on Linux Dynamic Frequency Scaling(DFS). The scheme can achieve more than 2 levels of the frequency of adjustments, and provide users with the interface which is used to setting system frequency level, thus add the function to help the user select automatically, so that it solves the numerical restrictions problem, that is relying solely on the system to automatically adjust the frequency level. And it separates the application layer, the kernel layer, and the driver layer from each other, thus enhances the portability of code. The realization result of S3C2440A platform proves the validation of this scheme.
A new reciprocal algorithm is provided to realize the traditional reciprocal division on Field Programmable Gate Array(FPGA) with high precision and fast speed. In order to solve the reciprocal of the divisor, the Taylor series expansion is used combining with searching approximation to get a fitting binomial of degree 1 with one variable in every separated section, and the Newton-Raphson iteration is used one time to improve precision. The result of timing simulation proved that the divider based on this new division algorithm can be easily realized on FPGA. The divider can get the answer of 2-34 available accuracy only six clock pulses after input variables being given, and the highest operating frequency is 86.95 MHz.
This paper proposes a design and implementation of intelligent model car based on Renesas H8/3048-one Single Chip Microcomputer(SCM). The model car uses infrared sensors to obtain lane image information, and employs the H8/3048-one as its control micro-processor. Through the open-loop proportional control on servo to change the direction and the closed-loop Pelvic Inflammatory Disease(PID) control on motors to implement the control the speed, it can realize to track the lane automatically. Practice proves that the scheme is reasonable and effective to make the model car pass the crank, lane change and other special lane smoothly, it has the characteristics of optimal tracing line, fast adjustable speed, strong anti-interference performance, little steady-state error, and it also has good dynamic and steering performance.
The envelope area of the body barycenter swaying trajectory is one of sensitive indicators that discriminates the balanced capacity of dizziness patient. Traditional computing method firstly determines the shape of convex hull enveloping all points and then calculates the area of convex hull, it need sort all points, time complexity of algorithm close to O(nlbn) on the best cases. This paper introduces a kind of algorithm of approximate convex hull, calculates coordinates of different rotation angle, looks up the point set of maximum and minimum along X-axis and Y-axis, quickly marks the points and make sure the shape of convex hull. Time complexity of algorithm close to O(n). It is proved that the algorithm can meet accuracy requirement of balance test system, and increase calculation speed.
According to the feature of computer forensic, a method is proposed to reassemble JPEG fragment files and the reassemble progress is described. By analyzing JPEG file structure, an algorithm called JFDDM(JPEG Fragment Degree of Difference Matching) for reassembling JPEG fragmented files is proposed and discussed, by which the MCU’ degree of difference in the image and the similarity between adjacent pixels are exploited to decide whether current fragments fall within the same image. Experimental results show that this is an effective method for JPEG fragment reassembling.
The bus topology of 1553B is analyzed. A new topology of composite bus topology based on parallel bus topology and hierarchical bus topology is designed, and the communication protocol stack is put forward. The transport layer based on transmit vector word is given. The process of message transfer and the structure of vector word and message are also introduced, as well as the data clustering of network layer. It realizes the testing software based on LabVIEW.
This paper puts forward a real 3D visualizing entity modeling method based on Multi-Scale Spatial Voxel Volume(M-S SVV), discusses the method of modeling and visualization of geological entity and field, develops the software. The structure and physicality data of Dongying depression and Huagou area is used for 3D modeling and visualization. The application results show this method has good adaptability for the geologic data, and is able to meet the demands of the M-S expression and analysis in geologic space. It supplies an effective way for the displaying and analyzing of the geologic data, provides the basic services for the professional analysis and modeling of geology, geophysics and other disciplines.
This paper proposes the thought of getting the edges of exact solution to access the approximate solution of the whole Traveling Salesman Problem(TSP). On the basic of the thought, a new algorithm called collision algorithm is designed. Experiments with the test data from internationally accepted TSPLIB in different cities and size show that the results got through the algorithm is the same or similar with current optimal solution. The algorithm can apply the TSP on a large scale as well as small scale ones.