In order to guarantee the integrity,confidentiality and accessibility of outsourcing data,a secure data outsourcing and sharing scheme is proposed based on the vector commitment primitive and the proxy re-encryption technology.By introducing a digital signature of the commitment value,any third party can verify the integrity of the outsourcing data without the data owner and service provider being fully trusted,and the data owner can perform efficient execution of the outsourcing data adding,deleting,modifing,and accessing authorization actions.Performance and safety analysis results show the feasibility of the scheme.
Mimic defense techniques can effectively solve the security problems in real-time systems,but its heterogeneous redundancy will increase the system delay.To solve this problem,based on the architecture of the mimic processor,a hard time and aperiodic tasks fault tolerant scheduling algorithm is proposed in the dynamic heterogeneous multi-mode redundancy scenario,combining the specific voting strategy and implementing the cleaning handover tasks.Simulation results show that compared with the static-heterogeneous-model-based DRFTS algorithm,this algorithm can improve the guarantee ratio under the condition of hard real-time.
With the exhaustion of IPv4 addresses,the domestic network has gradually shifts to IPv6 from IPv4,which leads to the rapid expansion of large-scale network traffic based on IPv6.The security risks and attack threats faced by IPv6 networks becomes an urgent problem to be solved in network development.Therefore,in the actual IPv6 network environment,the real-time acquisition of large-scale IPv6 data traffic based on IPv6 dual protocol stack is studied,and traffic classification and anofmaly traffic routine detection are carried out.The k_means network anomaly detection algorithm based on sliding time window is proposed.It designs a network abnormal traffic detection system based on IPv6 protocol,analyzes system performance and gives test results.Experimental results show that the algorithm can effectively detect anomaly traffic in the network and provide a good experimental platform for subsequent research and anomaly detection based on IPv6 network traffic.
In the era of big data,traditional hidden hyperlink detection technology cannot quickly and accurately identify websites that encounter “hidden hyperlink attacks” on massive Web pages.To solve this problem,this paper introduces machine learning to the detection method for hidden hyperlink,which combines the characteristics of hidden hyperlink related texts,hidden hyperlink domains and the hidden structure of hidden hyperlink.The three models are constructed and compared using Classification and Regression Tree (CART),Gradient Boosted Decision Tree (GBDT) and Random Forest (RF).based on the proposed method.Experimental results show that the proposed method has high accuracy and reliability,and the classification accuracy of the detection model constructed by RF can reach 0.984.
In order to solve the problem of high delay,low efficiency and indistinguishes communication service types in the existing address mutation technology,a service awareness based address mutation method is proposed in the SDN environment.With the feature of subsection IP continuous segmentation,an efficient random address generation algorithm is adopted to make the address mutation technology more efficient.At the same time,a communication authentication algorithm is used to provide different mutation modes according to the architecture and reliability requirements of both sides.Experimental results show that,compared with the OF-RHM and PPAH-SPD method,this method can effectively guarantee the communication parties from the sniffer attack,provide more efficient and flexible address random mutation effect and address mutation mode,reduce the time delay of 30%~60% and reduce the jitter.
Aiming at the problem of the failure rate and low detection efficiency in the XSS dynamic detection method,a new XSS vulnerability detection model is proposed.The model is divided into five parts:load cell generation,bypassing rule selection,exploratory load test,load unit combination test and load unit separate test.According to the location and function type of the load unit,the attack load is cut into different types of units,and the rules of combined attack load are formulated.The probe load is used to determine whether there is any vulnerabilities to be detected,it puts the payload unit and the bypassing rules into the detection point with combination test and separate test,and generates attack loads based on the test results.Experimental results show that this model uses fewer test requests to complete the test of more attack loads,and maintains a high detection efficiency while effectively reducing the failure rate.
At present,depression is treated with antidepressant drugs and assisted with psychotherapy and physical therapy,and these expensive and time-consuming treatment methods often end prematurely and result in a prolonged course without effective symptom relief.Therefore,based on the neurofeedback therapy,a novel depression rehabilitation method using a Virtual-Reality(VR) game framework is proposed.In this VR game framework,an innovative three-electrode Electroencephalography (EEG) collector is used to record patients’ EEG data.The data are processed and converted into feedback features,and the feedback will be displayed to patients in real time through a VR headset.Patients can adjust their psychological activity based on the feedback,and relieve their physiological dysfunction effectively.The framework also provides a data storage module,which may offer therapists ways to assess patients’ rehabilitation results in a long term,as well as provide possibility to continue towards better algorithm of feedback features with data-mining.The prototype system is tested in the framework,and the experimental results prove the effectiveness of the framework in depression rehabilitation.
In speech cognition,a substantial amount of data is required for acoustic model training,so the performance of the Deep Neural Network(DNN) acoustic model trained on a scarce amount of data is limited.Aiming at this problem,this paper proposes a transfer learning method to improve the Uyghur speech recognition starting from models trained by other resource-rich speech databases,so as to get a better acoustic model for Uyghur speech recognition.Experimental result shows that the above method can significantly improve the Uyghur speech recognition performance compared with the baseline models trained only on Uyghur speech database.
AVS-P10 is a national standard for low bit rate bandwidth extension schemes,but since the standard only uses the high frequency envelope information and the high frequency gain to adjust the high frequency portion of the restored signal,the restored sound quality is poorer.Aiming at this problem,after analyzing the corresponding bandwidth extension principle of AVS-P10,a novel bandwidth extension scheme based on tonality adjustment is proposed.Tonality parameters are extracted from the encoder part in Fast Fourier Transform(FFT) domain,which are recovered to adjust the steep peaks and dips in decoder.Experimental results show that, compared with AVS-P10 standard,the proposed scheme can improve the ODG score by 9.4% with the objective judgement test,and the CMOS score by 1.14 with the subjective test part,which concludes that the reconstructed audio quality is improved.
Most of the existing text abstract methods stay in the shallow semantic relationship between words and words,and do not make good use of the complete semantic information between words.Therefore,an improved algorithm for semantic subgraph predictive summary is proposed.The algorithm transforms the original text into corresponding Abstract Meaning Representation(AMR) graphs,merges them into an AMR total graph,and filters the redundant information based on the WordNet semantic dictionary.On this basis,using the comprehensive statistical features assigns weights to the AMR graph nodes that do not have weights,and constructs the semantic summary subgraphs by filtering the parts with high importance,and comprehensively measures the quality of the abstracts based on the ROUGE index and the Smatch index.Experimental results show that compared with the text abstraction benchmark algorithm which only mines shallow semantic relations,the ROUGE value and Smatch value of the algorithm are significantly improved.
Due to linear fitting,the measurement error of laser triangulation ranging technique is large,and the linearity decreases in the case of large range ranging.To solve this problem,a high precision laser displacement sensor measurement method based on residual compensation is proposed.The distance measurement method based on laser displacement sensor is analyzed.The residual compensation and fitting method are optimized by traditional laser triangulation technology to reduce the theoretical error caused by direct fitting.Experimental results show that compared with the laser triangulation method,this method can solve the problem that the measurement error becomes larger due to direct linear fitting and realize high precision large displacement measurement.
In the economic society,the rumor involving individual interests is increasing gradually.Aimed at the existing bandwagon effect in the process of actual rumor spreading and combined with the node bandwagon effect as well,a new game revenue is defined while a rumors propagation model is established by leveraging the game theory.Considering the correlation between the spread of rumors and the interests of node,the selective safety coefficients are introduced to describe the non-uniform spread rates in different nodes,and decision-making conversion factors are utilized to describe the probability of the changes in the course of spreading rumors.By using a typical BA (Barabási-Albert) scale-free network and real network data in the Twitter,the experimental results show that,on the one hand,with the increase of autonomous selection factor,the spread of rumors in the network becomes smaller;on the other hand,with the increase of time conversion factor,the ratio of healthy nodes to infected nodes first increases,then decreases and finally converges to zero.