Volume 11 Issue 6 December 2013


Bibliometrical Analysis on the Big Data Research in China

Yang Ruixian

https://doi.org/

Abstract The author investigated the big data papers included China Academic Journal Network Publishing Database of CNKI from 2002 to 2012, with the help of multivariate statistical analysis tools SPSS17.0 of cluster analysis, multidimensional scaling analysis and visualization tools Ucinet6 from posting growth law, distribution of authors, research institutes distribution, periodical distribution, and high-frequency words such as multiple perspectives bibliometrical analysis... Read More


The Modeling of Genetic and Tabu Search Algorithm Based BP Neural Network in the Risk Analysis of Investment

Liu Yang, Ding Yunlong

https://doi.org/

Abstract There are many parameters which affect the economic benefit indicators for evaluation and they are all uncertain. Because of the parameters uncertainty, evaluation indicators values of economic benefit in project investment are also uncertain. In these years, more and more BP Neural network based models are established to evaluate the risk of investment for its characters of wide information distribution... Read More


Segmentation Strategies for Passage Retrieval from Internet Video using Speech Transcripts

Christian Wartena

https://doi.org/

Abstract We compare the effect of different segmentation strategies for passage retrieval of user generated internet video. We consider retrieval of passages for rather abstract and complex queries that go beyond finding a certain object or constellation of objects in the visual channel. Hence the retrieval methods have to rely heavily on the recognized speech. Passage retrieval has mainly been studied... Read More


Study on Computer Audit Based on OLAP Technology

Tong Yanjun

https://doi.org/

Abstract It has become increasingly difficult for the traditional audit information system to find out the necessary audit information from the mass data generated in the large scale application of accounting computerization and ERP software, etc. For the current massive financial and operation information data of enterprises, a new audit model is necessarily explored to satisfy the requirements on massive information... Read More


Research on Digital Library Personalized Information Service Model Based on Agent Model

Xu Yan

https://doi.org/

Abstract Taking the personalized information needs of users as the research object, this article introduced the individualized service process of digital library, established the Agent model, built multivariate function by combining with the user preference model, and expounded the process of personalized information acquisition, analysis and push. We could conclude that digital library personalized information service system operated coordinately between each... Read More


Secure Digital Certificate Design Based on the RSA Algorithm

Yunsheng Zhong

https://doi.org/

Abstract With the popularity of the Internet, people can purchase and sell goods and services online just staying at home, and this trend is becoming increasingly apparent. The Internet, as a global computer network, has to provide the following five services: security, data integrity, authentication, usability, and reliable information. In case of lack of safety measures, Internet trading risk is very... Read More


Research on the Service Modeling Method of Information Management Software based on the Petri Net Model

Han Tianfeng

https://doi.org/

Abstract With the continuous development of science and technology, the development of the enterprise also requires the agility of enterprises. At present,SOA is one of the most popular means of achieving enterprises agility.This article embarks on the Petri net model to study the service modeling method of information management software. Firstly, it introduces service-oriented architecture SOA and the methodology of service... Read More


Differential Evolution for Rule Extraction and Its application in Recognizing Oil Reservoir

Jin-ling Li, Hai-xiang Guo, Ke-jun Zhu, De-yun Wang, Jing-lu Hu

https://doi.org/

Abstract The method of rule extraction based on differential evolution (DE-Rule) is proposed in this paper. The style of rule is IF-THEN. Connection word is AND in the antecedent of rule. The consequence of rule is class label. The above rule is encoded and expressed to individual in population of differential evolution. Then the population is iterated through differential mutation and... Read More


Research on Transmission Based on Collaboration Coding in WSNs

LV Xiao-xing, ZHANG Bai-hai

https://doi.org/

Abstract In order to reduce the increase of network delay and excessive energy consumption, which are caused by network code in WSNs, a fast random linear mechanism of network coding based on nodes collaboration is introduced. Energy consumption of nodes is reduced by transmitting the initial code of the node, and transmitting linear independent packets received merely. After gathering node coding,... Read More


Security Analysis and Evaluation of Random Linear Network coding under Wiretapping Attack

LV Xiaoxing, ZHANG Baihai

https://doi.org/

Abstract This paper discussed the weak security of random linear network coding in wireless network in view of network coding weak security theory where the wiretapper can successfully obtain initial data and conditions threatening transmission security by decoding. The experiment results displayed, in wireless network, the relationship between decodes success probability of multi-node co-wiretapping, the decodes time of destination node and... Read More


Robustness Analysis of Social Network based on a Dynamic Model

Haitao Wu, Shi Ying, Xiangyang Jia, Liqiang Zhang, Xu Chen

https://doi.org/

Abstract Due to the high vulnerability of today's social systems against disruptions, it has become critical to measure and manage the robustness of social networks. In this study the relationship between social network's topology and its robustness in the presence of cascading failures is examined. In the attempt to help practice in increasing the robustness of social systems, the concept of... Read More


A Leakage Monitoring System of Pipeline in Heating Network

Yang Xianliang, Jia Lianlian, Wang Songling

https://doi.org/

Abstract Supervisory control and data acquisition system (SCADA) is used to monitor the operating data of heating network. But it can do data acquisition and some simple operations only. So in this paper with the data collected by SCADA a leakage monitoring system of pipeline in heating network is designed by the Matble graphical user interface program (GUI). The theoretical basis... Read More


Rotation Invariant Texture Image Retrieval Based on Log-Polar and NSCT

Bing Xu, Zhende Li, Shiyi Xie

https://doi.org/

Abstract In order to solve the problem of rotation invariant texture image retrieval, an image retrieval algorithm based on Log-Polar and nonsubsampled contourlet transform (NSCT) is proposed. Log-Polar transform was first applied to texture image to convert the rotation to translation. Then, translation invariant NSCT was employed to decompose the transformed images. Standard deviations, energies and entropies of the different directional... Read More


A Novel RFID Authentication Protocol with Ownership Transfer

Dong Sun, Dan Liu

https://doi.org/

Abstract During recent years,RFID technology has a wide applications in many fields.Since singnal transmit by the radio frequency, it raises many security and privacy concerns. Ownership transfer of RFID tags is another requriement for RFID systems. During the life of tag, it may pass from manufacutrer to commercial agent, the ownership of tag need change correspondingly.Taking into account the natural security... Read More


Research on an Adaptive Algorithm of Service Selection in Pervasive Computing

Liu Wei, Zhao Lanfei, Deng Jianqiang

https://doi.org/

Abstract An adaptive genetic algorithm of service selection in pervasive computing is presented in this paper. By means of matrix encoding, this algorithm carries out selection, crossover and mutation operations of genetic algorithm, with matrix as individual chromosome and matrix array as gene. Based on the elitism selection strategy and adaptive strategy, this algorithm replicates the optimal individual of every generation... Read More