A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single po...A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively.展开更多
The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalizat...The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools.展开更多
With the universal test machine and temperature test chamber, the effect of pressure and temperature on the behavior of 1-3 and 1-3-2 piezocomposites prepared with PZT/epoxy in our lab has been investigated through el...With the universal test machine and temperature test chamber, the effect of pressure and temperature on the behavior of 1-3 and 1-3-2 piezocomposites prepared with PZT/epoxy in our lab has been investigated through electrical impedance and dielectric analysis. The permittivity, resonant frequency and dielectric loss of the composites have been measured under vertical stress and temperature, and the variety of the material properties under pressure and temperature could also be obtained. The pressure and temperature stability of the composites have been assessed through experiments. The data of these two types of composites indicated that the stability of 1-342 composite with pressure was better than that of 1-3 composite, and two composites have almost the same dielectric stability with temperature. However, 1-3-2 composite showed slower frequency variation than 1-3 composite.展开更多
In recent years, the development of wireless sensor networks(WSNs) has risen to a great interest in the Wireless Sensor and Actor Networks(WSANs), which consist of sensors and actors. Because actors have to collaborat...In recent years, the development of wireless sensor networks(WSNs) has risen to a great interest in the Wireless Sensor and Actor Networks(WSANs), which consist of sensors and actors. Because actors have to collaborate with each other to perform tasks, it is vital to maintain the connectivity of actor network in WSANs. This paper proposes a 1-hop based cut-vertex independent connectivity maintaining approach(CIMA) to restore the broken connectivity caused by single actor failure. A balance is achieved in restoration overheads between all actors and individuals by bounding the maximum moveable distance of actor and determining a local optimal repair plan. The effectiveness of CIMA has been validated through simulation experiments.展开更多
According to the basic problem of industrial production, the paper presents a monocular camera and automatic annotation ranging scheme with a ruler. The scheme eliminates a series of complex operation steps frequently...According to the basic problem of industrial production, the paper presents a monocular camera and automatic annotation ranging scheme with a ruler. The scheme eliminates a series of complex operation steps frequently used for image location of the calibration, image correction, it has simple implementation and has successfully realized precise ranging by using digital image processing technology. From the beginning of the analysis of image edge detection, edge detection principle and some common edge detection operators, and proposes an improved multi-scale edge detection algorithm, then according to the particularity of the edge proposed new edge thinning algorithm, finally mark the target point through the feature extraction, calculate the final results of fault location.展开更多
In this paper, we propose an analogy based immune recognition method that focuses on the implement of the clone selection process and the negative selection process by means of analogy similarity. This method is appli...In this paper, we propose an analogy based immune recognition method that focuses on the implement of the clone selection process and the negative selection process by means of analogy similarity. This method is applied in an IDS (Intrusion Detection System) following several steps. Firstly, the initial abnormal behaviours sample set is optimized through the combining of the AIS (Artificial Immune System) and the genetic algorithm. Then, the abnormity probability algorithm is raised considering the two sides of abnormality and normality. Finally, an intrusion detection system model is established based on the above algorithms and models.展开更多
Oil spills pose a major threat to ocean ecosystems and their health. Synthetic aperture radar(SAR) sensors can detect oil spills on the sea surface. These oil spills appear as dark spots in SAR images. However, dark...Oil spills pose a major threat to ocean ecosystems and their health. Synthetic aperture radar(SAR) sensors can detect oil spills on the sea surface. These oil spills appear as dark spots in SAR images. However, dark formations can be caused by a number of phenomena. It is aimed to distinguishing oil spills or look-alike objects. A novel method based on a bidimensional empirical mode decomposition is proposed. The selected dark formations are first decomposed into several bidimensional intrinsic mode functions and the residue. Subsequently, 64 dimension feature sets are calculated using the Hilbert spectral analysis and five new features are extracted with a relief algorithm. Mahalanobis distances are then used for classification. Three data sets containing oil spills or look-alikes are used to test the accuracy rate of the method. The accuracy rate is more than 90%. The experimental results demonstrate that the novel method can detect oil spills validly and accurately.展开更多
The emergence of the MOOC leads to the revolution of education.All people can be taught by excellent teachers.But the interest of most of the MOOC learners only last less than two weeks.The main reasons may be the cou...The emergence of the MOOC leads to the revolution of education.All people can be taught by excellent teachers.But the interest of most of the MOOC learners only last less than two weeks.The main reasons may be the courses too difficult to study and without the restraint mechanism.This paper tries to solve the problem that learners cannot last in a MOOC.We put forward that it is feasible to bring the MOOC of elite courses to general university classroom after the localization of high quality teaching resources.We imported Information and Entropy of MIT to the curriculum of Heilongjiang Institute of Technology.First,we combine with own school characteristics in Information and Entropy.Second,we brought part of Information and Entropy in our class and edit of the original video in some part.Third,we have a test in the end of the course.At last all of students of class finished the instructional video and got good grades in test.The method of bringing the MOOC of elite courses to the curriculum of general university outperforms that of traditional teaching meth.展开更多
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hel...Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hellman (DDH) assumption. In this paper, we present a democratic group signature scheme based on any gap Diffie-Hellman (GDH) group where DDH problem is easily but computational Diffe-Hellman (CDH) problem is hard to be solved. Besides the properties of ordinary DGSs, our scheme also provides the property of linkability, i.e., any public verifier can tell whether two group signatures are generated using the same private key. Security properties of our scheme employ a new and independently interesting decisional product Diffie-Hellman (DPDH) assumption which is weaker than DDH one.展开更多
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a...This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t - 1 group members.展开更多
This paper presents a fuzzy C- means clustering image segmentation algorithm based on particle swarm optimization, the method utilizes the strong search ability of particle swarm clustering search center. Because the ...This paper presents a fuzzy C- means clustering image segmentation algorithm based on particle swarm optimization, the method utilizes the strong search ability of particle swarm clustering search center. Because the search clustering center has small amount of calculation according to density, so it can greatly improve the calculation speed of fuzzy C- means algorithm. The experimental results show that, this method can make the fuzzy clustering to obviously improve the speed, so it can achieve fast image segmentation.展开更多
The number of IoT(internet of things)connected devices increases rapidly.These devices have different operation systems and therefore cannot communicate with each other.As a result,the data they collected is limited w...The number of IoT(internet of things)connected devices increases rapidly.These devices have different operation systems and therefore cannot communicate with each other.As a result,the data they collected is limited within their own platform.Besides,IoT devices have very constrained resources like weak MCU(micro control unit)and limited storage.Therefore,they need direct communication method to cooperate with each other,or with the help of nearby devices with rich resources.In this paper,we propose a secure method to exchange resources(SMER)between heterogeneous IoT devices.In order to exchange resources among devices,SMER adopts a compensable mechanism for resource exchange and a series of security mechanisms to ensure the security of resource exchanges.Besides,SMER uses a smart contract based scheme to supervise resource exchange,which guarantees the safety and benefits of IoT devices.We also introduce a prototype system and make a comprehensive discussion.展开更多
Suzhou is one of China's most developed regions, located in the eastern part of the Yangtze Delta. Due to its location and river features, it may at a high risk of flood under the climate change background in the fut...Suzhou is one of China's most developed regions, located in the eastern part of the Yangtze Delta. Due to its location and river features, it may at a high risk of flood under the climate change background in the future. In order to investigate the flood response to the extreme scenario in this region, 1-D hydrodynamic model with real-time operations of sluices and pumps is established. The rain-runoff processes of the urban and rural areas are simulated by two lumped hydrologic models, respectively. Indicators for a quantitative assessment of the flood severity in this region are proposed. The results indicate that the existing flood control system could prevent the Suzhou Downtown from inundation in the future. The difficulty of draining the Taihu Lake floods should be given attention to avoid the flood hazard. The modelling approach based on the in-bank model and the evaluation parameters could be effective for the flood severity estimation in the plain river network catchment. The insights from this study of the possible future extreme flood events may assist the policy making and the flood control planning.展开更多
基金Supported by the National Natural Science Foundation of China(61370212)the Research Fund for the Doctoral Program of Higher Education of China(20122304130002)+1 种基金the Natural Science Foundation of Heilongjiang Province(ZD 201102)the Fundamental Research Fund for the Central Universities(HEUCFZ1213,HEUCF100601)
文摘A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively.
基金Supported by the National Natural Science Foun-dation of China (60403027)
文摘The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools.
基金supported by the National Natural Science Foundation of China (No.60871038)the Beijing Natural Science Foundation (No.4092014)Foundation of PHR(IHLB)
文摘With the universal test machine and temperature test chamber, the effect of pressure and temperature on the behavior of 1-3 and 1-3-2 piezocomposites prepared with PZT/epoxy in our lab has been investigated through electrical impedance and dielectric analysis. The permittivity, resonant frequency and dielectric loss of the composites have been measured under vertical stress and temperature, and the variety of the material properties under pressure and temperature could also be obtained. The pressure and temperature stability of the composites have been assessed through experiments. The data of these two types of composites indicated that the stability of 1-342 composite with pressure was better than that of 1-3 composite, and two composites have almost the same dielectric stability with temperature. However, 1-3-2 composite showed slower frequency variation than 1-3 composite.
基金supported by the National Science Foundation, China, contract #61163064
文摘In recent years, the development of wireless sensor networks(WSNs) has risen to a great interest in the Wireless Sensor and Actor Networks(WSANs), which consist of sensors and actors. Because actors have to collaborate with each other to perform tasks, it is vital to maintain the connectivity of actor network in WSANs. This paper proposes a 1-hop based cut-vertex independent connectivity maintaining approach(CIMA) to restore the broken connectivity caused by single actor failure. A balance is achieved in restoration overheads between all actors and individuals by bounding the maximum moveable distance of actor and determining a local optimal repair plan. The effectiveness of CIMA has been validated through simulation experiments.
文摘According to the basic problem of industrial production, the paper presents a monocular camera and automatic annotation ranging scheme with a ruler. The scheme eliminates a series of complex operation steps frequently used for image location of the calibration, image correction, it has simple implementation and has successfully realized precise ranging by using digital image processing technology. From the beginning of the analysis of image edge detection, edge detection principle and some common edge detection operators, and proposes an improved multi-scale edge detection algorithm, then according to the particularity of the edge proposed new edge thinning algorithm, finally mark the target point through the feature extraction, calculate the final results of fault location.
基金Supported by the National Natural Science Foundation ofChina (60563002) Scientific Research Programof the Higher EducationInstitution of Xinjiang (XJEDU2004I03)
文摘In this paper, we propose an analogy based immune recognition method that focuses on the implement of the clone selection process and the negative selection process by means of analogy similarity. This method is applied in an IDS (Intrusion Detection System) following several steps. Firstly, the initial abnormal behaviours sample set is optimized through the combining of the AIS (Artificial Immune System) and the genetic algorithm. Then, the abnormity probability algorithm is raised considering the two sides of abnormality and normality. Finally, an intrusion detection system model is established based on the above algorithms and models.
基金The National Science and Technology Support Project under contract No.2014BAB12B02the Natural Science Foundation of Liaoning Province under contract No.201602042
文摘Oil spills pose a major threat to ocean ecosystems and their health. Synthetic aperture radar(SAR) sensors can detect oil spills on the sea surface. These oil spills appear as dark spots in SAR images. However, dark formations can be caused by a number of phenomena. It is aimed to distinguishing oil spills or look-alike objects. A novel method based on a bidimensional empirical mode decomposition is proposed. The selected dark formations are first decomposed into several bidimensional intrinsic mode functions and the residue. Subsequently, 64 dimension feature sets are calculated using the Hilbert spectral analysis and five new features are extracted with a relief algorithm. Mahalanobis distances are then used for classification. Three data sets containing oil spills or look-alikes are used to test the accuracy rate of the method. The accuracy rate is more than 90%. The experimental results demonstrate that the novel method can detect oil spills validly and accurately.
文摘The emergence of the MOOC leads to the revolution of education.All people can be taught by excellent teachers.But the interest of most of the MOOC learners only last less than two weeks.The main reasons may be the courses too difficult to study and without the restraint mechanism.This paper tries to solve the problem that learners cannot last in a MOOC.We put forward that it is feasible to bring the MOOC of elite courses to general university classroom after the localization of high quality teaching resources.We imported Information and Entropy of MIT to the curriculum of Heilongjiang Institute of Technology.First,we combine with own school characteristics in Information and Entropy.Second,we brought part of Information and Entropy in our class and edit of the original video in some part.Third,we have a test in the end of the course.At last all of students of class finished the instructional video and got good grades in test.The method of bringing the MOOC of elite courses to the curriculum of general university outperforms that of traditional teaching meth.
基金the National Natural Science Foundation of China (Nos. 60703031, 60703004, 60673076)
文摘Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hellman (DDH) assumption. In this paper, we present a democratic group signature scheme based on any gap Diffie-Hellman (GDH) group where DDH problem is easily but computational Diffe-Hellman (CDH) problem is hard to be solved. Besides the properties of ordinary DGSs, our scheme also provides the property of linkability, i.e., any public verifier can tell whether two group signatures are generated using the same private key. Security properties of our scheme employ a new and independently interesting decisional product Diffie-Hellman (DPDH) assumption which is weaker than DDH one.
基金the National Natural Science Foundation of China(Nos.60703031,60703004,60673076,60672068)
文摘This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t - 1 group members.
文摘This paper presents a fuzzy C- means clustering image segmentation algorithm based on particle swarm optimization, the method utilizes the strong search ability of particle swarm clustering search center. Because the search clustering center has small amount of calculation according to density, so it can greatly improve the calculation speed of fuzzy C- means algorithm. The experimental results show that, this method can make the fuzzy clustering to obviously improve the speed, so it can achieve fast image segmentation.
文摘The number of IoT(internet of things)connected devices increases rapidly.These devices have different operation systems and therefore cannot communicate with each other.As a result,the data they collected is limited within their own platform.Besides,IoT devices have very constrained resources like weak MCU(micro control unit)and limited storage.Therefore,they need direct communication method to cooperate with each other,or with the help of nearby devices with rich resources.In this paper,we propose a secure method to exchange resources(SMER)between heterogeneous IoT devices.In order to exchange resources among devices,SMER adopts a compensable mechanism for resource exchange and a series of security mechanisms to ensure the security of resource exchanges.Besides,SMER uses a smart contract based scheme to supervise resource exchange,which guarantees the safety and benefits of IoT devices.We also introduce a prototype system and make a comprehensive discussion.
基金Project supported by the National Key Research and Development Program of China(Grant No.2017YFC0405600,2016YFC0401503)the Special Fund for Public Welfare of Water Resources Ministry(Grant No.201501007,201201017)the State Key Pro-gram of National Natural Science of China(Grant No.51239003)
文摘Suzhou is one of China's most developed regions, located in the eastern part of the Yangtze Delta. Due to its location and river features, it may at a high risk of flood under the climate change background in the future. In order to investigate the flood response to the extreme scenario in this region, 1-D hydrodynamic model with real-time operations of sluices and pumps is established. The rain-runoff processes of the urban and rural areas are simulated by two lumped hydrologic models, respectively. Indicators for a quantitative assessment of the flood severity in this region are proposed. The results indicate that the existing flood control system could prevent the Suzhou Downtown from inundation in the future. The difficulty of draining the Taihu Lake floods should be given attention to avoid the flood hazard. The modelling approach based on the in-bank model and the evaluation parameters could be effective for the flood severity estimation in the plain river network catchment. The insights from this study of the possible future extreme flood events may assist the policy making and the flood control planning.