Please wait a minute...

Current Issue

    25 December 2013, Volume 34 Issue Z2
    Image spam identification method based on gray-gradient co-occurrence matrix
    2013, 34(Z2):  1-4. 
    Asbtract ( 339 )   Knowledge map   
    Related Articles | Metrics
    In order to avoid the detection of the spam system based on text, more and more spammers have embedded text information into the image. An image spam identification method based on gray-gradient co-occurrence matrix (GGCM) was proposed to detect image spam effectively. The feature of image was extracted through GGCM firstly, and then LS-SVM was used to do classification. The test results show that this method has higher classification accuracy and better real-time performance.
    Network Engineering
    Image spam identification method based on gray-gradient co-occurrence matrix
    Bing FENG,Zhi-tang LI,Gang-lu HUA
    2013, 34(Z2):  1-3.  doi:10.3969/j.issn.1000-436x.2013.Z2.001
    Asbtract ( 255 )   HTML ( 4)   PDF (541KB) ( 709 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to avoid the detection of the spam system based on text,more and more spammers have embedded text information into the image.An image spam identification method based on gray-gradient co-occurrence matrix (GGCM) was proposed to detect image spam effectively.The feature of image was extracted through GGCM firstly,and then LS-SVM was used to do classification.The test results show that this method has higher classification accuracy and better real-time performance

    Network traffic analysis system based on IPFIX
    2013, 34(Z2):  2-8. 
    Asbtract ( 292 )   Knowledge map   
    Related Articles | Metrics
    To deal with the large-scale traffic capture and management in high speed network, the performance of IPFIX system was studied. An optimized architecture was proposed and implemented based on improved binary information integration to collect data and improved multi-layer hash algorithm to storage data. This system was deployed in Tsinghua university campus network and can scale to the 10 GB network traffic collection and accurate pricing.
    Research and implementation of the GPU-based LCS algorithm acceleration mechanism
    2013, 34(Z2):  3-13. 
    Asbtract ( 391 )   Knowledge map   
    Related Articles | Metrics
    The LCS algorithm used in protocol feature recognition is a string matching algorithm to extract the longest string of continuous public substring. However, through theoretical analysis and some experimental situation, it can be seen that this process is a time complexity of higher computing process. If the input data packet is relatively large, the running time will be very long. To this end, the size and number of input packets have to be controled, which severely limits the size of the sample set. A GPU based method for accelerating the LCS algorithm was proposed. The CUDA platform was built and dedoyed and the parallel of LCS algorithm was researched on this platform. By the parallel study of LCS algorithm on the CUDA, the operation speed of the LCS is effectively enhanced. Highly competitive experimental results show that the LCS algorithm in the GPU is more effective and efficient than that in the CPU.
    User demanded policy routing for multi-homing campus network
    2013, 34(Z2):  4-16. 
    Asbtract ( 333 )   Knowledge map   
    Related Articles | Metrics
    Edge router must use policy routing for multi-homing campus network. The flexibility of source address based policy routing defined by network administrator is not sufficient to meet the changing needs of diverse users. One scheme using Linux system was proposed to do user demanded policy routing, which was more flexible and convince than the traditional administrator defined source address based policy routing. Through 10 years of actual use in campus network, It proves that this method can meet the various needs of users, operating stabely and reliablely.
    Analysis of AS path looping
    2013, 34(Z2):  5-22. 
    Asbtract ( 390 )   Knowledge map   
    Related Articles | Metrics
    AS (autonomous system) path looping occurs when there are two or more same AS numbers in a AS path vector and these numbers are not adjacent to each other. After processing and analyzing the global route data from RouteViews, statistics of the total number and the ratio of AS path looping conflicts were kept every day from June 1, 2011 to May 31, 2013. What’s more, distribution of the duration of AS path looping conflicts and the length of prefixes where AS path looping occurs were also analyzed. On the basis of these statistics, some possible causes of AS path looping were discussed, including routing information inconsistency, multi-national companies and faulty or malicious misconfiguration. What’s more, some advices were also provided for the configuration of BGP protocol.
    Network Engineering
    Network traffic analysis system based on IPFIX
    Yun-long MA,Qian-li ZHANG,Ji-long WANG
    2013, 34(Z2):  5-8.  doi:10.3969/j.issn.1000-436x.2013.Z2.002
    Asbtract ( 324 )   HTML ( 3)   PDF (857KB) ( 961 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To deal with the large-scale traffic capture and management in high speed network,the performance of IPFIX system was studied.An optimized architecture was proposed and implemented based on improved binary information integration to collect data and improved multi-layer hash algorithm to storage data.This system was deployed in Tsinghua university campus network and can scale to the 10 GB network traffic collection and accurate pricing.

    Analysis of packet loss rate based on the measured traffic
    2013, 34(Z2):  6-26. 
    Asbtract ( 364 )   Knowledge map   
    Related Articles | Metrics
    The packet loss rate is one of key indicators to evaluate the performance of network. A method for calculating packet loss rate in the measured data based on the intact TCP flows was presented. Based on the measured data, the packet loss rate of Jiangsu Province in CERNET network and different partitions outside was analysed. The algorithm gives the packet loss rate including first packet loss rate pfl, overall packet loss rate psl and retransmission rate prp. Through statistical analysis, pfl is smaller than psl in the vast majority of cases, and prp is significantly higher than pfl and psl, which proves the impact of packet loss on the performance of network, and retransmission rate is obviously higher than packet loss rate.
    Design and implementation of user-customizing oriented multipath inter-domain routing system
    2013, 34(Z2):  7-35. 
    Asbtract ( 320 )   Knowledge map   
    Related Articles | Metrics
    With the rapid growth of Internet applications, the routing flexibility and quality of the inter-domain routing system face some significant challenges. Multipath routing is an important method of improving the reliability and robustness of the Internet. Based on previous researches, orienting user customizing routing service, a multi-path inter-domain routing system named UMIR was developed. The routing system includes three service functions of controlling and management center, route discovery and computing protocol and routing incentive, and it is made of control and management subsystem, routing protocol subsystem and routing incentive subsystems. Based on the Emulab network test platform of University of Utah, the UMIR routing system was deployed and tested. The experimental results show that the routing system is running correctly to achieve our design goals.
    Performance evaluation and improvement strategy for FTP servers in campus network
    2013, 34(Z2):  8-39. 
    Asbtract ( 336 )   Knowledge map   
    Related Articles | Metrics
    FTP is one of the important application systems in campus network. But most FTP servers have bottleneck in their performances, which causes low utilization to the resource. Therefore, according to the actual demand of the network in high schools, the working principle of existing FTP softwares was analyzed. The node number and processing rate of servers were further studied. Then based on multithreading principle, the queue theory models of FTP servers were put forward. By the analysis of bandwidth utilization, response time and processing rate of the nodes, corresponding improved schemes were also proposed.
    Implementation of P2P nodes detection based on decision tree
    2013, 34(Z2):  9-46. 
    Asbtract ( 305 )   Knowledge map   
    Related Articles | Metrics
    A P2P nodes detection method based on decision model was proposed by a long time of observation. As this method is a statistical analysis of the transport layer packet characteristics, identification of the network node for encrypted or unencrypted P2P applications is effective. Experiment shows that this method has higher accuracy and lower false positive rate and false negative rate.
    Network Engineering
    Research and implementation of the GPU-based LCS algorithm acceleration mechanism
    Chang-zhi ZHANG,Cheng MU,Xiao-hong HUANG,Yan MA
    2013, 34(Z2):  9-13.  doi:10.3969/j.issn.1000-436x.2013.Z2.003
    Asbtract ( 273 )   HTML ( 1)   PDF (377KB) ( 473 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The LCS algorithm used in protocol feature recognition is a string matching algorithm to extract the longest string of continuous public substring.However,through theoretical analysis and some experimental situation,it can be seen that this process is a time complexity of higher computing process.If the input data packet is relatively large,the running time will be very long.To this end,the size and number of input packets have to be controled,which severely limits the size of the sample set.A GPU based method for accelerating the LCS algorithm was proposed.The CUDA platform was built and dedoyed and the parallel of LCS algorithm was researched on this platform.By the parallel study of LCS algorithm on the CUDA,the operation speed of the LCS is effectively enhanced.Highly competitive experimental results show that the LCS algorithm in the GPU is more effective and efficient than that in the CPU.

    Low frequency steganography algorithm for H.264/AVC
    2013, 34(Z2):  10-50. 
    Asbtract ( 366 )   Knowledge map   
    Related Articles | Metrics
    On the basis of analyzing some existing video data hiding algorithms and combining it with the features of H.264/AVC video low frequency coefficients, a new data hiding algorithm based on H.264/AVC low frequency domain was proposed. After quantification of DCT blocks in the low frequency area, three maximum absolute value of the nonzero coefficients were selected and information was embedded with an improved matrix encoding method. Simulation results show that the proposed algorithm can realize real-time embedding and extracting information, great capacity of embedding information, embedded high efficiency and less influence on video quality etc.
    Abnormal network traffic detection approach based on alive entropy
    2013, 34(Z2):  11-57. 
    Asbtract ( 448 )   Knowledge map   
    Related Articles | Metrics
    A novel alive entropy-based detection approach was proposed, which detects the abnormal network traffic based on the values of alive entropies. The alive entropies calculated based on the NetFlow data coming from the network traffic of input and output of a whole system, which is essentially a monitored network. In order to decrease false positive rate of abnormal network traffic, different scales are selected to compute the values of alive entropies in different sizes of network traffic. With the low false positive rate of abnormal network traffic, the abnormal network traffic can be effectively detected. Experiments carried out on a real campus network were used to evaluate the effectiveness of the proposed approach. A comparative study illustrates that the proposed approach may easily detect the abnormal network traffic with random characteristics in comparison with some “conventional” approaches reported in the literatures.
    Design and implementation of OSPF vulnerability analysis and detection system
    2013, 34(Z2):  12-63. 
    Asbtract ( 348 )   Knowledge map   
    Related Articles | Metrics
    A universal and multi-mode OSPF vulnerability detection system was designed based on analysis and research of OSPF vulnerability. The system implements denial of service attack model with the method of forging entity router and man-in-middle attack model with zero-copy technology. The method combining SNMP and bypass monitoring was adopted to achieve real-time monitoring of test results. Finally, the system proves the vulnerability of different types of routing equipments in the test environment and the vulnerability hazards were analyzed quantitatively.
    PyFuzzer:automatic in-memory fuzz testing method
    2013, 34(Z2):  13-68. 
    Asbtract ( 441 )   Knowledge map   
    Related Articles | Metrics
    Fuzz Testing is an effective method to mine all kinds of vulnerabilities. But the main drawbacks to current fuzz testing tools are: firstly, it produces high volume testing data and it’s extraordinary time consumption; secondly, if the accessing needs authentication, the greatest part of test data will be abandoned. PyFuzzer, a novel automatic in-memory fuzz testing tool combining static analysis, dynamic analysis and in-memory fuzz testing, was presented. The tool is highly automatic and effective. Compared with 4n FTP Fuzzer in testing WarFTPD and Serv-U, PyFuzzer can discover all vulnerabilities and improve test efficiency greatly.
    Library resource sharing solution based on federated authentication and CALIS unified authentication
    2013, 34(Z2):  14-73. 
    Asbtract ( 427 )   Knowledge map   
    Related Articles | Metrics
    To address the problem of enforcing access control for library digital resources, federated authentication technologies were analyze which are widely used in the world, and CALIS unified authentication technologies that are widely deployed in China’s libraries were also analyzed. A solution integrating federated authentication and CALIS unified authentication technologies was proposed, which was developed, deployed and tested on the test-bed of CARSI federation. Test results show the proposed solution enforces effective and flexible access control for library resources.
    Network Engineering
    User demanded policy routing for multi-homing campus network
    Huan-jie ZHANG,Yu-liang XIA
    2013, 34(Z2):  14-16.  doi:10.3969/j.issn.1000-436x.2013.Z2.004
    Asbtract ( 176 )   HTML ( 2)   PDF (695KB) ( 617 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Edge router must use policy routing for multi-homing campus network.The flexibility of source address based policy routing defined by network administrator is not sufficient to meet the changing needs of diverse users.One scheme using Linux system was proposed to do user demanded policy routing,which was more flexible and convince than the traditional administrator defined source address based policy routing.Through 10 years of actual use in campus network,It proves that this method can meet the various needs of users,operating stabely and reliablely.

    Novel topic detection method for microblog based on SVM filtration
    2013, 34(Z2):  15-78. 
    Asbtract ( 384 )   Knowledge map   
    Related Articles | Metrics
    A detection method based on SVM filtration was proposed. The method uses text feature as imported vectors to filtrate microblog news, reducing the amount of calculation greatly. A single-pass clustering algorithm based on the improvement of high-frequency words sorting was proposed, which can detect isolated points commendably. Experimental results show that the method can detect news topics from massive microblog data efficiently.
    Cable and wireless integrated flat campus network design
    2013, 34(Z2):  16-83. 
    Asbtract ( 376 )   Knowledge map   
    Related Articles | Metrics
    The campus network topology of the existing problems was analyzed, and according to a large flat layer 2 network design ideas, a device for the network core BARS wired and wireless integrated network topology was proposed. The topology can maximize the protection of existing investments, simply increasing the core layer BRAS device, and all of the original switches can be linked to the BRAS as a layer 2 device. BRAS equipment performance and characteristics were used to finish tunnel network users inside and outside the establishment, isolation, flow control, fault location and other fine management; large two-story structure features were used to achieve net IPv4/IPv6 dual and multicast services, various brands the unified management of wired and wireless devices. The topology used in the actual network environment BRAS equipment must be hot standby, wireless AC needs to support local forwarding.
    Virtualization based network measurement platform
    2013, 34(Z2):  17-89. 
    Asbtract ( 318 )   Knowledge map   
    Related Articles | Metrics
    With the expansion of network measurement research, the network measurement infrastructures must support the extensible to different network environment and services while improving performance at the same time. A network measurement platform based on virtualization technology was presented, by discussing the key issues of the platform, design of the virtual platform and its operation mechanism. The instance of a multicast measurement shows that compared with the existing measurement platforms, the virtualization platform has concurrency, scalability, customization and reconfigurability characteristics.
    Network Engineering
    Analysis of AS path looping
    Sheng-lin ZHANG,Ying LIU
    2013, 34(Z2):  17-22.  doi:10.3969/j.issn.1000-436x.2013.Z2.005
    Asbtract ( 243 )   HTML ( 3)   PDF (909KB) ( 348 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    AS (autonomous system) path looping occurs when there are two or more same AS numbers in a AS path vector and these numbers are not adjacent to each other.After processing and analyzing the global route data from RouteViews,statistics of the total number and the ratio of AS path looping conflicts were kept every day from June 1,2011 to May 31,2013.What’s more,distribution of the duration of AS path looping conflicts and the length of prefixes where AS path looping occurs were also analyzed.On the basis of these statistics,some possible causes of AS path looping were discussed,including routing information inconsistency,multi-national companies and faulty or malicious misconfiguration.What’s more,some advices were also provided for the configuration of BGP protocol.

    CoAP conformance testing based on TTCN-3
    2013, 34(Z2):  18-93. 
    Asbtract ( 365 )   Knowledge map   
    Related Articles | Metrics
    Protocol conformance test is of great importance in making sure that the protocol implementations conform to the protocol specification, thus helps protocol implementer to improve the implementations. CoAP (constrained application protocol) is a generic Web application specified for constrained nodes and constrained network which is currently an Internet draft. A CoAP conformance test suite based on TTCN-3, a standardized testing language, was designed, implemented and used after analyzing the protocol.
    Application research on distributed Zabbix network monitoring system
    2013, 34(Z2):  19-98. 
    Asbtract ( 430 )   Knowledge map   
    Related Articles | Metrics
    With the increasing number of server, to ensure the normal operation of the server and application services becomes more and more complex. The importance of server monitoring system in modern server management was explained. With Zabbix, a distributed monitoring and control system was deployed, realizing some important application services monitoring in Windows and Linux environment with distributed network monitor and control system. The principle and configuration of the monitoring of Web Server, Database and DNS Server were introduced. Finally, the use cases using in the network center were shown.
    Analysis of user interactive social behavior between microblog and BBS in a university
    2013, 34(Z2):  20-106. 
    Asbtract ( 431 )   Knowledge map   
    Related Articles | Metrics
    Microblog was used to publish important information on BBS in many universities in order to spread positive energy in campus. Studying on an actual university microblog, a system of gathering and editing information from microblog was proposed. On this basis, user interactive social behavior between microblog and BBS was analyzed, and tightness and intimacy to discover the potential friendship and the degree of attention between users on microblog were also proposed. The experiments show that it is useful to extract topic from a single microblog using special punctuation mark. At last, different methods based on emoticon and different dictionary in sentiment analysis were compared, coming to the conclusion that the method based on emoticon and cyber word dictionary performs well.
    Structure of campus network based on reconfigurable architecture
    2013, 34(Z2):  21-110. 
    Asbtract ( 283 )   Knowledge map   
    Related Articles | Metrics
    Because of the petrifaction of the existing network, it is difficult to achieve the controllability, adaptability and expansibility in current structure. Simultaneously, in order to have better campus network services in teaching, researching and studying, a new structure based on reconfigurable architecture for campus network was designed based on service set handling capacity of various kinds of business in reconfigurable network as the central idea. After the evolution from tradition to flat structure, a more condensed structure was proposed by adopting virtualization technology on switches and routers. It has the advantages of high performance, high reliability, manageability and augmentability.
    Modularity analysisof users’mobile behavior in campus wireless network
    2013, 34(Z2):  22-116. 
    Asbtract ( 364 )   Knowledge map   
    Related Articles | Metrics
    Choosing a better and easily computed similarity metric is a challenge task, and the problem how the formedmodularity can help network operation attracts less attention. By introducing sparse linked interval(SLI) to represent wireless nodes' mobile trajectory, mobile nodes' modularity relations via social network analysis methods were effectively revealed. Using real operational datasets of Peking University campus wireless network and public dataset as validation, three common motifs in modularity level, and their formation reasonsand relations to network managements were demonstrated.
    Partial-state translation method between asymmetric IPv6 address spaces
    2013, 34(Z2):  23-120. 
    Asbtract ( 410 )   Knowledge map   
    Related Articles | Metrics
    A Partial-state IPv6 NAT method was proposed, which could be used to support the address transition from shorter prefix address to longer one. Meanwhile, this method is able to reduce the recording of the translation information as much as possible in order to decrease the load of translation equipment. The experiments show that the proposed method is able to realize the partial-state translation for the IPv6 addresses with arbitrary length. Moreover, it is able to keep the checksum-neutral at the transport layer and avoid port translation, with which it is able to provide transparency for transport layer and application layer protocols. This method, which is more universal, is complementary solution for IPv6 prefix stateless translation.
    Network Engineering
    Analysis of packet loss rate based on the measured traffic
    Ting MI,Wei DING
    2013, 34(Z2):  23-26.  doi:10.3969/j.issn.1000-436x.2013.Z2.006
    Asbtract ( 160 )   HTML ( 0)   PDF (373KB) ( 210 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The packet loss rate is one of key indicators to evaluate the performance of network.A method for calculating packet loss rate in the measured data based on the intact TCP flows was presented.Based on the measured data,the packet loss rate of Jiangsu Province in CERNET network and different partitions outside was analysed.The algorithm gives the packet loss rate including first packet loss rate pfl,overall packet loss rate psland retransmission rate prp.Through statistical analysis,pflis smaller than pslin the vast majority of cases,and prpis significantly higher than pfland psl,which proves the impact of packet loss on the performance of network,and retransmission rate is obviously higher than packet loss rate.

    Effect of cold-rolling cladding on microstructure and properties of composite aluminum alloy foil
    2013, 34(Z2):  24-132. 
    Asbtract ( 337 )   Knowledge map   
    Related Articles | Metrics
    The misjudgement of spam has always been the difficulty in the anti-spam area. Experiments based on Tsinghua university E-mail systems and anti-spam gateway system(Sep,2011–Oct,2012) were deployed and made, analyzing the history of recalling spam behavior of mail users, and using spam text similarity calculation and intelligent key parameters prediction method to predict the user's interest in the current pending spam, which can help users automatically recall their potential interested spams which were misjudged, based on the users' subjective choices and experience, solving the problem that cannot be eliminated by traditional filtering methods.
    Research of cloud disk system construction in campus network
    2013, 34(Z2):  25-137. 
    Asbtract ( 323 )   Knowledge map   
    Related Articles | Metrics
    According to the significance and demand of cloud disk system in campus network, a solution of combining the miniyun open source project, LVS(Linux virtual server) load balancing, Moosefs distribute file system and MySQL master-slaver replication read/write splitting was proposed to construct high availability cloud disk system. A cloud disk system was built and put into practice based on this solution in China agricultural vnirersity. The application results shows that it meets the demand for cloud disk in campus network with characteristics of low cost, dynamic scalable and high availability.
    Design of video recommender system based on cloud computing
    2013, 34(Z2):  26-140. 
    Asbtract ( 364 )   Knowledge map   
    Related Articles | Metrics
    Through the survey and research of the existing video sites,some video sites face the problem of information overload. So it is necessary for the video sites to have a recommender system. Through the study of the existing video recommender system, using open source cloud computing technologies—Hadoop, and some of its related components such as Hive and Hbase, a personalized video recommendation system based on cloud platform was designed. The system is only applicable to professional video-based website.
    Design of campus comprehensive access management platform
    2013, 34(Z2):  27-147. 
    Asbtract ( 325 )   Knowledge map   
    Related Articles | Metrics
    Considering access control with more card, scattered access flow data and poor scalabiliby in current unirersity building multi-system, the campus integrated access management platform triple frame design with the core of perception layer, transport layer and application layer was proposed. Campus card access control applications based on a unified data processing were realized, by method of Media and unified campus card authorization, implementing hierarchical mana-gementand access networking, comprehensively regulate access standards and centralized storage of data water.The design not only facilitates the management of school access control applications, but also carries out data mining based access control and lay the foundation for leadership decision-making support.
    Network Engineering
    Design and implementation of user-customizing oriented multipath inter-domain routing system
    Dong-hong QIN,Jia-hai YANG,Yang YANG,Hui ZHANG
    2013, 34(Z2):  27-35.  doi:10.3969/j.issn.1000-436x.2013.Z2.007
    Asbtract ( 181 )   HTML ( 0)   PDF (770KB) ( 272 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid growth of Internet applications,the routing flexibility and quality of the inter-domain routing system face some significant challenges.Multipath routing is an important method of improving the reliability and robustness of the Internet.Based on previous researches,orienting user customizing routing service,a multi-path inter-domain routing system named UMIR was developed.The routing system includes three service functions of controlling and management center,route discovery and computing protocol and routing incentive,and it is made of control and management subsystem,routing protocol subsystem and routing incentive subsystems.Based on the Emulab network test platform of University of Utah,the UMIR routing system was deployed and tested.The experimental results show that the routing system is running correctly to achieve our design goals.

    Design and implementation of trans-department graduation management system in digital campus
    2013, 34(Z2):  28-152. 
    Asbtract ( 320 )   Knowledge map   
    Related Articles | Metrics
    Graduation management system is the typical case of trans-department applications in digital campus, having very high requirements of information integration, data exchange and real-time. An easily-extensible, adaptive system architecture and triple permission mechanism was designed and developed, not only to meet the school's graduation business processes, but also to provide a rich and efficient business management, security flexible access control and humanized service.
    DDNS + gateway separation method for interconnect of distributed data center
    2013, 34(Z2):  29-156. 
    Asbtract ( 388 )   Knowledge map   
    Related Articles | Metrics
    The multi-campus university distributed data centers interconnected problems existing in the traditional gateway were analyzed and based on RHI + gateway unilateral separation methods on the Internet, a DDNS + gateway interconnection separation idea to front-end technology was proposed to achieve business traffic sites DDNS selection, using the device with the VMware SLB to achieve uninterrupted user access. In a lab environment, online or new on-line users drifting around in a virtual machine can fast access to the data center to the same kind of business, suitable for the business flow, IP planning complex continuous demanding scenarios. The interconnection method must increase DDNS equipments in the data center edge, hanging the SLB device next to the switch side of data centers in both places.
    Similar text positioning method based on slope-density cluster
    2013, 34(Z2):  30-162. 
    Asbtract ( 294 )   Knowledge map   
    Related Articles | Metrics
    Similar text positioning is an important part of plagiarism detection. The existing positioning method directly merges text or fingerprint to obtain similar text. Due to the disturb information in the similar text, the positioning accuracy is poor. The semantic features of the match fingerprints were analyzed, and a cluster method based on slope density for similar text positioning was proposed, which converts the text merge problem into dense sample points clustering problem, and improves the efficiency and accuracy of the positioning. Through the experiment on the PAN public corpus, the result shows it performs better than the PAN10 top three. This method has been used in the South China University of Technology 's feature professional teaching platform to detect the plagiarism of homework.
    Research of university data statistical platform based on data warehouse
    2013, 34(Z2):  31-169. 
    Asbtract ( 317 )   Knowledge map   
    Related Articles | Metrics
    In order to adapt to the demand of statisting and analyzing huge-data in universities under current situation, an overall programme was designed and implemented to construct data statistical service platform based on data warehouse. The overall framework of university data warehouse and the modeling method of data warehouse were researched, and a statistical data model based on data star-schema model was designed. Furthermore, the key technology in the process of implementing statistical service platform like ETL(Extraction-Transformation-Loading) and UI interface design were ex-plored. It provides practical basis and theoretical support for the next step to build the management and decision support platform of universities.
    Design and application research on data service platform for big data
    2013, 34(Z2):  32-174. 
    Asbtract ( 410 )   Knowledge map   
    Related Articles | Metrics
    Big data management gives challenges to data manage and service platform based on traditional relational database management system, and research on big data management and service platform supporting both structured and unstructured data has become a very urgent and important task. 4 key technologies for big data management service platform was summarized, and the configurable generalization table model was adopt. The data service center system prototype BIG-DMS based on Hadoop platform and the application scheme of data integration services platform based on BIG-DMS were also designed to support both structured and unstructured data storage, management and access services.
    Design and implementation of a video recommendation system in campus network
    2013, 34(Z2):  33-179. 
    Asbtract ( 361 )   Knowledge map   
    Related Articles | Metrics
    According to the feature of video-sharing with P2P in campus network, a video recommendation system in campus network called FP-CNVR system was designed and implemented; a novel data cleaning method based on customer segmentation was proposed; the structure of FP-tree in the process of frequent pattern mining with FP-growth algorithm was improved. Experimental results show that the novel recommendation system can provide more reliable recommended results, and also the novel data cleaning method can improve the accuracy of the recommendation results. The research may have some inspiration to related subjects in campus network.
    Design and implementation of AMQP-based campus message bus system
    2013, 34(Z2):  34-183. 
    Asbtract ( 341 )   Knowledge map   
    Related Articles | Metrics
    For the strong coupling complex dependencies between applications in the traditional digital campus system, a digital campus message bus system was designs and implemented based on AMQP. In this system, the message bus is the digital messaging middleware between digital campus applications which simplifies application development logic and reduces the coupling dependencies between applications. Practical application of this system shows that the structure is suitable for the construction of digital campus, so that each application of digital campus will be easier to be managed and expanded.
    Quality of service guarantee mechanism for enterprise video conference
    2013, 34(Z2):  35-190. 
    Asbtract ( 278 )   Knowledge map   
    Related Articles | Metrics
    The QoS problem under the controlled enterprise network environment was addressed, and a novel QoS management mechanism for video conference at the enterprise level was proposed. This novel mechanism analyses the conference organization mode and transferring mode, and transforms the guarantee of video conference to the guarantee of a flow group with temporal information. This mechanism provides the bandwidth reservation through the management of network priority bandwidth. It authenticates labels and shapes the data flow at the edge of the network, and uses DiffServ to priority forward the media flow in the core network, and therefore guarantees the reservation of bandwidth for authorized users. Experimental results and analysis show that the proposed mechanism can provide the necessary bandwidth for the media flow when network congestion happens, and then can efficiently and effectively guarantee QoS for enterprise video conference.
    Digital Campus Application
    Performance evaluation and improvement strategy for FTP servers in campus network
    Wei LIU,Gang LI,Feng YU
    2013, 34(Z2):  36-39.  doi:10.3969/j.issn.1000-436x.2013.Z2.008
    Asbtract ( 227 )   HTML ( 2)   PDF (349KB) ( 254 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    FTP is one of the important application systems in campus network.But most FTP servers have bottleneck in their performances,which causes low utilization to the resource.Therefore,according to the actual demand of the network in high schools,the working principle of existing FTP softwares was analyzed.The node number and processing rate of servers were further studied.Then based on multithreading principle,the queue theory models of FTP servers were put forward.By the analysis of bandwidth utilization,response time and processing rate of the nodes,corresponding improved schemes were also proposed.

    Network Engineering
    Implementation of P2P nodes detection based on decision tree
    Yong-ping DONG,Xiang-zhan YU,Gang WU
    2013, 34(Z2):  40-46.  doi:10.3969/j.issn.1000-436x.2013.Z2.009
    Asbtract ( 286 )   HTML ( 0)   PDF (714KB) ( 263 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A P2P nodes detection method based on decision model was proposed by a long time of observation.As this method is a statistical analysis of the transport layer packet characteristics,identification of the network node for encrypted or unencrypted P2P applications is effective.Experiment shows that this method has higher accuracy and lower false positive rate and false negative rate.

    Network and Information Security
    Low frequency steganography algorithm for H.264/AVC
    Guang-lu HUA,Zhi-tang LI,Bing FENG
    2013, 34(Z2):  47-50.  doi:10.3969/j.issn.1000-436x.2013.Z2.010
    Asbtract ( 268 )   HTML ( 1)   PDF (665KB) ( 570 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    On the basis of analyzing some existing video data hiding algorithms and combining it with the features of H.264/AVC video low frequency coefficients,a new data hiding algorithm based on H.264/AVC low frequency domain was proposed.After quantification of DCT blocks in the low frequency area,three maximum absolute value of the nonzero coefficients were selected and information was embedded with an improved matrix encoding method.Simulation results show that the proposed algorithm can realize real-time embedding and extracting information,great capacity of embedding information,embedded high efficiency and less influence on video quality etc.

    Abnormal network traffic detection approach based on alive entropy
    Xiang-kun MU,Jin-song WANG,Yu-feng XUE,Wei HUANG
    2013, 34(Z2):  51-57.  doi:10.3969/j.issn.1000-436x.2013.Z2.011
    Asbtract ( 431 )   HTML ( 7)   PDF (1672KB) ( 1167 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel alive entropy-based detection approach was proposed,which detects the abnormal network traffic based on the values of alive entropies.The alive entropies calculated based on the NetFlow data coming from the network traffic of input and output of a whole system,which is essentially a monitored network.In order to decrease false positive rate of abnormal network traffic,different scales are selected to compute the values of alive entropies in different sizes of network traffic.With the low false positive rate of abnormal network traffic,the abnormal network traffic can be effectively detected.Experiments carried out on a real campus network were used to evaluate the effectiveness of the proposed approach.A comparative study illustrates that the proposed approach may easily detect the abnormal network traffic with random characteristics in comparison with some “conventional” approaches reported in the literatures.

    Design and implementation of OSPF vulnerability analysis and detection system
    Zun-ying QIN,Guo-dong LI,Wei LI,Xu-chang HUANG
    2013, 34(Z2):  58-63.  doi:10.3969/j.issn.1000-436x.2013.Z2.012
    Asbtract ( 299 )   HTML ( 6)   PDF (830KB) ( 827 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A universal and multi-mode OSPF vulnerability detection system was designed based on analysis and research of OSPF vulnerability.The system implements denial of service attack model with the method of forging entity router and man-in-middle attack model with zero-copy technology.The method combining SNMP and bypass monitoring was adopted to achieve real-time monitoring of test results.Finally,the system proves the vulnerability of different types of routing equipments in the test environment and the vulnerability hazards were analyzed quantitatively.

    PyFuzzer:automatic in-memory fuzz testing method
    Wei-ming LI,Jun-qing YU,Shao-bo AI
    2013, 34(Z2):  64-68.  doi:10.3969/j.issn.1000-436x.2013.Z2.013
    Asbtract ( 362 )   HTML ( 5)   PDF (346KB) ( 842 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Fuzz Testing is an effective method to mine all kinds of vulnerabilities.But the main drawbacks to current fuzz testing tools are:firstly,it produces high volume testing data and it’s extraordinary time consumption; secondly,if the accessing needs authentication,the greatest part of test data will be abandoned.PyFuzzer,a novel automatic in-memory fuzz testing tool combining static analysis,dynamic analysis and in-memory fuzz testing,was presented.The tool is highly automatic and effective.Compared with 4n FTP Fuzzer in testing WarFTPD and Serv-U,PyFuzzer can discover all vulnerabilities and improve test efficiency greatly.

    Library resource sharing solution based on federated authentication and CALIS unified authentication
    Jie LV,Ping CHEN,Wen-qing WANG,Yang ZHANG,Bei ZHANG
    2013, 34(Z2):  69-73.  doi:10.3969/j.issn.1000-436x.2013.Z2.014
    Asbtract ( 271 )   HTML ( 1)   PDF (575KB) ( 356 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To address the problem of enforcing access control for library digital resources,federated authentication technologies were analyze which are widely used in the world,and CALIS unified authentication technologies that are widely deployed in China’s libraries were also analyzed.A solution integrating federated authentication and CALIS unified authentication technologies was proposed,which was developed,deployed and tested on the test-bed of CARSI federation.Test results show the proposed solution enforces effective and flexible access control for library resources.

    Next Generation Campus Network
    Novel topic detection method for microblog based on SVM filtration
    Jun-xia CHENG,Zhi-tang LI,Ming-guang ZOU,Jin XIAO
    2013, 34(Z2):  74-78.  doi:10.3969/j.issn.1000-436x.2013.Z2.015
    Asbtract ( 197 )   HTML ( 0)   PDF (373KB) ( 398 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A detection method based on SVM filtration was proposed.The method uses text feature as imported vectors to filtrate microblog news,reducing the amount of calculation greatly.A single-pass clustering algorithm based on the improvement of high-frequency words sorting was proposed,which can detect isolated points commendably.Experimental results show that the method can detect news topics from massive microblog data efficiently.

    Digital Campus Application
    Cable and wireless integrated flat campus network design
    Sheng-jun XIE,Feng YIN,Xu-chuan ZHOU
    2013, 34(Z2):  79-83.  doi:10.3969/j.issn.1000-436x.2013.Z2.016
    Asbtract ( 323 )   HTML ( 5)   PDF (1273KB) ( 594 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The campus network topology of the existing problems was analyzed,and according to a large flat layer 2 network design ideas,a device for the network core BARS wired and wireless integrated network topology was proposed.The topology can maximize the protection of existing investments,simply increasing the core layer BRAS device,and all of the original switches can be linked to the BRAS as a layer 2 device.BRAS equipment performance and characteristics were used to finish tunnel network users inside and outside the establishment,isolation,flow control,fault location and other fine management; large two-story structure features were used to achieve net IPv4/IPv6 dual and multicast services,various brands the unified management of wired and wireless devices.The topology used in the actual network environment BRAS equipment must be hot standby,wireless AC needs to support local forwarding.

    Next Generation Campus Network
    Virtualization based network measurement platform
    Zheng CAO,Jian-bin HE
    2013, 34(Z2):  84-89.  doi:10.3969/j.issn.1000-436x.2013.Z2.017
    Asbtract ( 358 )   HTML ( 5)   PDF (528KB) ( 366 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the expansion of network measurement research,the network measurement infrastructures must support the extensible to different network environment and services while improving performance at the same time.A network measurement platform based on virtualization technology was presented,by discussing the key issues of the platform,design of the virtual platform and its operation mechanism.The instance of a multicast measurement shows that compared with the existing measurement platforms,the virtualization platform has concurrency,scalability,customization and reconfigurability characteristics.

    Digital Campus Application
    CoAP conformance testing based on TTCN-3
    Hong-qing DU,Xiao-hong HUANG,Jia-jie He
    2013, 34(Z2):  90-93.  doi:10.3969/j.issn.1000-436x.2013.Z2.018
    Asbtract ( 252 )   HTML ( 0)   PDF (375KB) ( 314 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Protocol conformance test is of great importance in making sure that the protocol implementations conform to the protocol specification,thus helps protocol implementer to improve the implementations.CoAP (constrained application protocol) is a generic Web application specified for constrained nodes and constrained network which is currently an Internet draft.A CoAP conformance test suite based on TTCN-3,a standardized testing language,was designed,implemented and used after analyzing the protocol.

    Next Generation Campus Network
    Application research on distributed Zabbix network monitoring system
    Xiao-hui GUO,Run-zhi LI,Qian ZHANG,Zong-ming WANG
    2013, 34(Z2):  94-98.  doi:10.3969/j.issn.1000-436x.2013.Z2.019
    Asbtract ( 419 )   HTML ( 27)   PDF (1120KB) ( 1784 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the increasing number of server,to ensure the normal operation of the server and application services becomes more and more complex.The importance of server monitoring system in modern server management was explained.With Zabbix,a distributed monitoring and control system was deployed,realizing some important application services monitoring in Windows and Linux environment with distributed network monitor and control system.The principle and configuration of the monitoring of Web Server,Database and DNS Server were introduced.Finally,the use cases using in the network center were shown.

    Analysis of user interactive social behavior between microblog and BBS in a university
    Qing-nan LAI,Hao MA,Wei-jia SONG,Ting-ting LI,Guang-xue JIANG,Bei ZHANG
    2013, 34(Z2):  99-106.  doi:10.3969/j.issn.1000-436x.2013.Z2.020
    Asbtract ( 302 )   HTML ( 6)   PDF (1131KB) ( 426 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Microblog was used to publish important information on BBS in many universities in order to spread positive energy in campus.Studying on an actual university microblog,a system of gathering and editing information from microblog was proposed.On this basis,user interactive social behavior between microblog and BBS was analyzed,and tightness and intimacy to discover the potential friendship and the degree of attention between users on microblog were also proposed.The experiments show that it is useful to extract topic from a single microblog using special punctuation mark.At last,different methods based on emoticon and different dictionary in sentiment analysis were compared,coming to the conclusion that the method based on emoticon and cyber word dictionary performs well.

    Structure of campus network based on reconfigurable architecture
    Hu-sheng YUAN,Hua FENG,Hui LI,Zhi-bin ZHONG,Kai PAN
    2013, 34(Z2):  107-110.  doi:10.3969/j.issn.1000-436x.2013.Z2.021
    Asbtract ( 221 )   HTML ( 3)   PDF (405KB) ( 366 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Because of the petrifaction of the existing network,it is difficult to achieve the controllability,adaptability and expansibility in current structure.Simultaneously,in order to have better campus network services in teaching,researching and studying,a new structure based on reconfigurable architecture for campus network was designed based on service set handling capacity of various kinds of business in reconfigurable network as the central idea.After the evolution from tradition to flat structure,a more condensed structure was proposed by adopting virtualization technology on switches and routers.It has the advantages of high performance,high reliability,manageability and augmentability.

    Modularity analysisof users’mobile behavior in campus wireless network
    Chang-ling ZHOU,Qun QIAN,Yi-qiu ZHAO,Qun SHANG
    2013, 34(Z2):  111-116.  doi:10.3969/j.issn.1000-436x.2013.Z2.022
    Asbtract ( 231 )   HTML ( 1)   PDF (1027KB) ( 592 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Choosing a better and easily computed similarity metric is a challenge task,and the problem how the formedmodularity can help network operation attracts less attention.By introducing sparse linked interval(SLI) to represent wireless nodes' mobile trajectory,mobile nodes' modularity relations via social network analysis methods were effectively revealed.Using real operational datasets of Peking University campus wireless network and public dataset as validation,three common motifs in modularity level,and their formation reasonsand relations to network managements were demonstrated.

    Partial-state translation method between asymmetric IPv6 address spaces
    Shen YAN,Yan MA,Qin ZHAO
    2013, 34(Z2):  117-120.  doi:10.3969/j.issn.1000-436x.2013.Z2.023
    Asbtract ( 240 )   HTML ( 1)   PDF (370KB) ( 462 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A Partial-state IPv6 NAT method was proposed,which could be used to support the address transition from shorter prefix address to longer one.Meanwhile,this method is able to reduce the recording of the translation information as much as possible in order to decrease the load of translation equipment.The experiments show that the proposed method is able to realize the partial-state translation for the IPv6 addresses with arbitrary length.Moreover,it is able to keep the checksum-neutral at the transport layer and avoid port translation,with which it is able to provide transparency for transport layer and application layer protocols.This method,which is more universal,is complementary solution for IPv6 prefix stateless translation.

    Digital Campus Application
    Effect of cold-rolling cladding on microstructure and properties of composite aluminum alloy foil
    Hai-zhuo LIN,Ji-long WANG,Jian-ping WU,Jia-hai YANG,Cong XU
    2013, 34(Z2):  121-132.  doi:10.3969/j.issn.1000-436x.2013.Z2.024
    Asbtract ( 341 )   HTML ( 0)   PDF (2365KB) ( 424 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The misjudgement of spam has always been the difficulty in the anti-spam area.Experiments based on Tsinghua university E-mail systems and anti-spam gateway system(Sep,2011–Oct,2012) were deployed and made,analyzing the history of recalling spam behavior of mail users,and using spam text similarity calculation and intelligent key parameters prediction method to predict the user's interest in the current pending spam,which can help users automatically recall their potential interested spams which were misjudged,based on the users' subjective choices and experience,solving the problem that cannot be eliminated by traditional filtering methods.

    Research of cloud disk system construction in campus network
    Jun LI,Feng-dan LAO,Ren-ming ZOU
    2013, 34(Z2):  133-137.  doi:10.3969/j.issn.1000-436x.2013.Z2.025
    Asbtract ( 326 )   HTML ( 17)   PDF (722KB) ( 890 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the significance and demand of cloud disk system in campus network,a solution of combining the miniyun open source project,LVS(Linux virtual server) load balancing,Moosefs distribute file system and MySQL master-slaver replication read/write splitting was proposed to construct high availability cloud disk system.A cloud disk system was built and put into practice based on this solution in China agricultural vnirersity.The application results shows that it meets the demand for cloud disk in campus network with characteristics of low cost,dynamic scalable and high availability.

    Design of video recommender system based on cloud computing
    Ying-zhuang LI,Tuo GAO,Xian-yi LI
    2013, 34(Z2):  138-140.  doi:10.3969/j.issn.1000-436x.2013.Z2.026
    Asbtract ( 357 )   HTML ( 1)   PDF (428KB) ( 873 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Through the survey and research of the existing video sites,some video sites face the problem of information overload.So it is necessary for the video sites to have a recommender system.Through the study of the existing video recommender system,using open source cloud computing technologies—Hadoop,and some of its related components such as Hive and Hbase,a personalized video recommendation system based on cloud platform was designed.The system is only applicable to professional video-based website.

    Design of campus comprehensive access management platform
    Cai-e XU,Feng XU,Xiao-hua LI,Dong-ming LU,Yan-qi CHENG
    2013, 34(Z2):  141-147.  doi:10.3969/j.issn.1000-436x.2013.Z2.027
    Asbtract ( 324 )   HTML ( 9)   PDF (602KB) ( 619 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering access control with more card,scattered access flow data and poor scalabiliby in current unirersity building multi-system,the campus integrated access management platform triple frame design with the core of perception layer,transport layer and application layer was proposed.Campus card access control applications based on a unified data processing were realized,by method of Media and unified campus card authorization,implementing hierarchical managementand access networking,comprehensively regulate access standards and centralized storage of data water.The design not only facilitates the management of school access control applications,but also carries out data mining based access control and lay the foundation for leadership decision-making support.

    Design and implementation of trans-department graduation management system in digital campus
    Su-mei WANG,Qian-yi WANG,Tian-ping LAI,Xiao-nan LI,Chun FAN,Yi-ming PENG,Guo-ping FAN
    2013, 34(Z2):  148-152.  doi:10.3969/j.issn.1000-436x.2013.Z2.028
    Asbtract ( 203 )   HTML ( 6)   PDF (400KB) ( 492 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Graduation management system is the typical case of trans-department applications in digital campus,having very high requirements of information integration,data exchange and real-time.An easily-extensible,adaptive system architecture and triple permission mechanism was designed and developed,not only to meet the school's graduation business processes,but also to provide a rich and efficient business management,security flexible access control and humanized service.

    DDNS + gateway separation method for interconnect of distributed data center
    Sheng-jun XIE,Li-ping CAI,Feng YIN
    2013, 34(Z2):  153-156.  doi:10.3969/j.issn.1000-436x.2013.Z2.029
    Asbtract ( 230 )   HTML ( 0)   PDF (830KB) ( 308 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The multi-campus university distributed data centers interconnected problems existing in the traditional gateway were analyzed and based on RHI + gateway unilateral separation methods on the Internet,a DDNS + gateway interconnection separation idea to front-end technology was proposed to achieve business traffic sites DDNS selection,using the device with the VMware SLB to achieve uninterrupted user access.In a lab environment,online or new on-line users drifting around in a virtual machine can fast access to the data center to the same kind of business,suitable for the business flow,IP planning complex continuous demanding scenarios.The interconnection method must increase DDNS equipments in the data center edge,hanging the SLB device next to the switch side of data centers in both places.

    Similar text positioning method based on slope-density cluster
    Du ZOU,Wen-jun TANG,Wei-jiang LONG,Ling ZHANG
    2013, 34(Z2):  157-162.  doi:10.3969/j.issn.1000-436x.2013.Z2.030
    Asbtract ( 217 )   HTML ( 0)   PDF (1168KB) ( 468 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Similar text positioning is an important part of plagiarism detection.The existing positioning method directly merges text or fingerprint to obtain similar text.Due to the disturb information in the similar text,the positioning accuracy is poor.The semantic features of the match fingerprints were analyzed,and a cluster method based on slope density for similar text positioning was proposed,which converts the text merge problem into dense sample points clustering problem,and improves the efficiency and accuracy of the positioning.Through the experiment on the PAN public corpus,the result shows it performs better than the PAN10 top three.This method has been used in the South China University of Technology 's feature professional teaching platform to detect the plagiarism of homework.

    Research of university data statistical platform based on data warehouse
    Xin-zheng LONG,Li LI,Yi-ming PENG,Qian-yi WANG,Rong-bin OUYANG,Yun-feng LIU
    2013, 34(Z2):  163-169.  doi:10.3969/j.issn.1000-436x.2013.Z2.031
    Asbtract ( 269 )   HTML ( 1)   PDF (1034KB) ( 502 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to adapt to the demand of statisting and analyzing huge-data in universities under current situation,an overall programme was designed and implemented to construct data statistical service platform based on data warehouse.The overall framework of university data warehouse and the modeling method of data warehouse were researched,and a statistical data model based on data star-schema model was designed.Furthermore,the key technology in the process of implementing statistical service platform like ETL(Extraction-Transformation-Loading) and UI interface design were explored.It provides practical basis and theoretical support for the next step to build the management and decision support platform of universities.

    Design and application research on data service platform for big data
    Yun-feng LIU,Li LI,Su-mei WANG,Qian-yi WANG,Xu YANG,Rong-bin OUYANG,Xin-zheng LONG
    2013, 34(Z2):  170-174.  doi:10.3969/j.issn.1000-436x.2013.Z2.032
    Asbtract ( 341 )   HTML ( 4)   PDF (535KB) ( 565 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Big data management gives challenges to data manage and service platform based on traditional relational database management system,and research on big data management and service platform supporting both structured and unstructured data has become a very urgent and important task.4 key technologies for big data management service platform was summarized,and the configurable generalization table model was adopt.The data service center system prototype BIG-DMS based on Hadoop platform and the application scheme of data integration services platform based on BIG-DMS were also designed to support both structured and unstructured data storage,management and access services.

    Design and implementation of a video recommendation system in campus network
    Xin DING,Yan MA,Jun WU
    2013, 34(Z2):  175-179.  doi:10.3969/j.issn.1000-436x.2013.Z2.033
    Asbtract ( 254 )   HTML ( 4)   PDF (378KB) ( 311 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the feature of video-sharing with P2P in campus network,a video recommendation system in campus network called FP-CNVR system was designed and implemented; a novel data cleaning method based on customer segmentation was proposed; the structure of FP-tree in the process of frequent pattern mining with FP-growth algorithm was improved.Experimental results show that the novel recommendation system can provide more reliable recommended results,and also the novel data cleaning method can improve the accuracy of the recommendation results.The research may have some inspiration to related subjects in campus network.

    Design and implementation of AMQP-based campus message bus system
    Wei-xin WU,Yu WANG,Xing-wei WANG
    2013, 34(Z2):  180-183.  doi:10.3969/j.issn.1000-436x.2013.Z2.034
    Asbtract ( 235 )   HTML ( 4)   PDF (432KB) ( 340 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the strong coupling complex dependencies between applications in the traditional digital campus system,a digital campus message bus system was designs and implemented based on AMQP.In this system,the message bus is the digital messaging middleware between digital campus applications which simplifies application development logic and reduces the coupling dependencies between applications.Practical application of this system shows that the structure is suitable for the construction of digital campus,so that each application of digital campus will be easier to be managed and expanded.

    Quality of service guarantee mechanism for enterprise video conference
    Jian-feng DENG,Ling ZHANG,Jie ZHOU
    2013, 34(Z2):  184-190.  doi:10.3969/j.issn.1000-436x.2013.Z2.035
    Asbtract ( 172 )   HTML ( 3)   PDF (1704KB) ( 145 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The QoS problem under the controlled enterprise network environment was addressed,and a novel QoS management mechanism for video conference at the enterprise level was proposed.This novel mechanism analyses the conference organization mode and transferring mode,and transforms the guarantee of video conference to the guarantee of a flow group with temporal information.This mechanism provides the bandwidth reservation through the management of network priority bandwidth.It authenticates labels and shapes the data flow at the edge of the network,and uses DiffServ to priority forward the media flow in the core network,and therefore guarantees the reservation of bandwidth for authorized users.Experimental results and analysis show that the proposed mechanism can provide the necessary bandwidth for the media flow when network congestion happens,and then can efficiently and effectively guarantee QoS for enterprise video conference.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: