In order to overcome the limitation of literal matching and lacking semantic concept of the traditional keyword extraction algorithm, this paper presents a Semantic-based Keyword Extraction(SKE) algorithm for Chinese text. It uses semantic feature in the keyword extraction process and constructs word semantic similarity network and uses betweenness centrality density. Experimental results show that compared with the statistic based keyword extraction algorithm, the keywords SKE algorithm extracted are more reasonable and can represent more information of the document’s topic, and the SKE algorithm has a better performance.
According to the problems that data exchange between servers of different types, load balance and schedule, serial processing of user data, and performance of server in relatively complex situations of user number and data type, this paper proposes a method for server performance evaluation and optimization based on multi-tier cache structure. This method starts from the functional structure of network server system, divides the server into multi-layer structure according to the function, then optimizes the corresponding part of server by different caching strategy of nodes. Experimental results show that the optimized server can make good use of system resources and improve server performance.
Trust degrees of Certificate Authority(CA) are ignored in present Public Key Infrastructure(PKI). In modularized trust management model, complete subjective logic trust evaluation model is proposed, with direct trust, recommendation and consensus operators to establish, transfer and calculate trust, and degeneration operator to simulate trust attenuation. The dependent series-parallel graphs are analyzed. The methods of subjective logic are testified to compute the trust value precisely and to improve the creditability of PKI system.
In order to execute Java bytecode of CISC structure in hardware, instruction set for 32-bit embedded real-time Java platform JPOR-32 (Java Processor Optimized for RTSJ) is designed. By analyzing the function and implementation principle of Java bytecode in the JVM specification, variation of signals and data of Java processor data path is set up. Complex instructions are executed using micro-instructions and simple instructions are executed directly, so that JPOR-32 set of instructions has a RISC feature. The results of Java code execution verify the correctness and Worst Case Execution Time(WCET) predictability of the instruction set.
Aiming at the fairness problem of cognitive radio spectrum allocation, this paper presents a modified color sensitive graph coloring algorithm. According to user spectrum efficiency, the algorithm generates weight about spectrum allocation, corrects color sensitive graph coloring algorithm through the weight, and makes a certain improvement in spectrum allocation. Simulations are conducted to compare this method with color sensitive graph coloring algorithm. Results show that the modified graph coloring algorithm decreases total network efficiency, but it has higher performance in the fairness of using spectrum.
This paper presents an epidemic propagation model based on Agent dynamical network to study the dynamical behaviors of epidemic transmission. The model extends traditional epidemic spread SIR model, describes the post-infection process of epidemic by different individual states. In order to adapt to the social network of epidemic transmission, this paper constructs the dynamical social network based on two-dimensional regular network by adding individual autonomy of mobility, considers the effects of heterogeneity and protection measures on the dynamics of transmission. Simulation results show the model fairly reflects the effects of dynamic social network and individual adaptive behaviors on the spread of the epidemic, and it is almost consistent with the reality condition.
This paper presents a data exchange model of Electronic Flight Bag System(EFBS). This model uses star-type logic structure to implement data transfer, and exchanges the message through data exchange components and central content management elements, then implements EFBS message exchange through a data exchange procedure designed with XML. A data integrity exchange procedure and an integrity check mechanism of EFBS are presented. In this mechanism, the sender generates digital signatures with DSA algorithm and the text summary is calculated by SHA-1 algorithm. At the receiver, the data integrity checking operation is conducted through digital signature verification consequently. Experimental results demonstrate the effectiveness and feasibility of this EFBS data integrity checking mechanism.
The existed trusted remote attestation method lacks description of dynamic of remote attestation, and it is not enough theoretical research on how attestation subject/guest interactions influence the trustworthiness. This paper presents a double integrity trusted attestation model. The model introduces the concept of trustworthiness, defines trustworthiness attributes and the rules for establishing trust states. According to this model, a trusted attestation system is designed. It analyzes the different methods about attesting the integrity of attestation subjects/objects.
In Long Term Evaluation(LTE) system, Mobility Load Balancing(MLB) and Mobility Robustness Optimization(MRO) may conflict with each other when they both adjust handover parameters to optimize their respective objects, and consequently system performance degrades. A coordination mechanism embedded in the MLB is proposed to alleviate the impact of conflict problem between MLB and MRO by mobility robustness supervision, handover edge labeling and parameter rollback. Simulation results show that this mechanism can immediately prevent negative handover parameters adjustments by MLB, and decrease the number of mobility problems caused by MLB.