Time filter

Source Type

Shi R.,Jilin Business and Technology College
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao | Year: 2016

In this paper, the present situation of current college English listening course and the existing problems are analyzed, and the feasibility of using mobile technology to support the English listening course is obtained through questionnaire survey. Based on the actual situation of English listening teaching, the overall design, database design, interface design and detailed design of Android platform-based software are provided, and the realizing method and effectiveness of the main functional modules are also offered. © AISTI 2016.


Lu M.,Jilin Business and Technology College
Journal of Networks | Year: 2012

In order to solve the symmetrical encryption method of key management project for Wireless Sensor Network (WSN) existing the deficiencies problem, the problem as follows: the WSN is not secure enough; there is no authentication mechanism among nodes. According to this circumstance, firstly elliptic curve cryptosystem (ECC) is used in this paper, and then it makes analysis of the principle of TinyOS. The calculation speed of elliptic curve has been improved based on optimal extended field by selecting suitable big prime number and other ways. We proposed a key management scheme for WSN based on ECC and clustering. At last, we make simulation with TinyOS. The simulation shows that proposed scheme is more secure, including forth security and back security, stronger Anti-DDos capacity and supporting dynamic structure of WSN comparing other traditional schemes. Furthermore, the computational complexity and energy cost of proposed scheme are feasible. © 2012 ACADEMY PUBLISHER.


Wang Y.,Jilin Business and Technology College
Advances in Intelligent and Soft Computing | Year: 2012

In order to find community structure that exists in complex network structure, this paper introduced K-means approach to the complex network community structure of the research. This paper studies the complex network of community structure detection algorithm, through the existing algorithm learn and study, proposed an improved algorithm based on K-means. Not know the premise of community structure for the complex networks division, the algorithm is simple and easy to understand, and the algorithm was used in karate network, through experimental verification, experimental results show that the algorithm is effective. © 2012 Springer-Verlag GmbH.


Wang S.,Jilin Business and Technology College
Journal of Networks | Year: 2013

The paper focuses on the cascading failure phenomenon of infrastructure networks. A new cascading model is proposed to analyze the cascading failure characteristics of the systems. Based on the model, we present a good evaluation method of node importance to identify the key nodes which may cause cascading failures of infrastructure networks. Finally, the damage degree of infrastructure networks considering cascading failures is investigated through our cascading model. The simulation results indicate the validity and practicality of the proposed model. The research is helpful to protect the key components of infrastructure networks and decrease the network vulnerability. Meanwhile, the proposed method provides valuable reference to many actual networks in nature. © 2013 ACADEMY PUBLISHER.


Li W.,Jilin Business and Technology College
International Journal of Advancements in Computing Technology | Year: 2012

In this paper, we investigate the 2-tuple linguistic multiple attribute decision making problems for evaluating emergency logistics risk with incomplete information. We extended the TOPSIS model to solve the evaluation problems of emergency logistics risk with 2-tuple linguistic information. According to the traditional ideas of TOPSIS, the optimal alternative(s) is determined by calculating the shortest distance from the 2-tuple linguistic positive ideal solution (TLPIS) and on the other side the farthest distance of the 2-tuple linguistic negative ideal solution (TLNIS). It is based on the concept that the optimal alternative should have the shortest distance from the positive ideal solution and on the other side the farthest distance of the negative ideal solution. Finally, a numerical example for evaluating emergency logistics risk with incomplete information is used to illustrate the applicability and effectiveness of the proposed model.


Yang W.-H.,Jilin Business and Technology College
Journal of Computational and Theoretical Nanoscience | Year: 2014

In this paper, a hybrid optimization algorithm for the Multiple Sequence Alignment is presented. Our method is presented Artificial Fish Swarm Algorithm by employing some improvements. The goal of our method is to reduce the required computing time and get better solution. In our simulations we use the instances of TSPLIB to show that the speed of convergence of the improved algorithm can be enhanced greatly compared with the traditional algorithm, we also present the comparison of the improved algorithm and the traditional algorithm on different sequences Copyright © 2014 American Scientific Publishers.


Wang K.,Jilin Business and Technology College
Applied Mechanics and Materials | Year: 2011

The classical Sobel edge detection operator has the shortcomings of low edge positioning accuracy and coarse edge, image edge detection based on improved Sobel operator and clustering algorithm was proposed. Four Sobel-like edge operators are used to improve the edge positioning accuracy and clustering algorithm are used to edge thinning. The experimental result demonstrates that the effect of the edge detection is greatly improved comparing with the traditional edge detection methods.© (2011) Trans Tech Publications.


Teng D.,Jilin Business and Technology College
Advances in Information Sciences and Service Sciences | Year: 2011

In this paper, we investigate the dynamic evaluation of hi-tech enterprise's strategic performance in which the attribute weights take the form of real numbers, and the preference values take the form of intuitionistic fuzzy information. By utilizing some operational laws of intuitionistic fuzzy numbers, we propose a DIFWG operator and TOPSIS-based approach to dynamic evaluation of hi-tech enterprise's strategic performance in intuitionistic fuzzy setting. Finally, an illustrative example demonstrates the practicality and effectiveness of the proposed method.


Meng X.,Jilin Business and Technology College
Lecture Notes in Electrical Engineering | Year: 2013

The neural network has slow convergence speed and is easy to fall into the local minimum, while the genetic algorithm is suitable for global search. The genetic algorithm late is easy near optimal solutions shocks problem and puts forward the method of fitness value of calibration, and so optimizes the purpose of the genetic algorithm. This paper will present both together. Using the improved genetic algorithm to optimize the BP neural network of weights and threshold value, and a combination of the two algorithms is applied to the weather forecast, the experiments show that the improved genetic neural network compared with the standard genetic neural network has certain advantages for improved neural network prediction ability. © Springer-Verlag 2013.


Tang X.,Jilin Business and Technology College
Journal of Multimedia | Year: 2013

IP multimedia subsystems bring huge security threats to the IMS-based next-generation networks although they bring IMS-based network integration and business ability enhancement. Therefore, the research on the vulnerability of IP multimedia subsystems attracts widespread attention recently. In this article, the security threats of next-generation core networks are discussed first. And then we analyze the vulnerability characteristics of IP multimedia subsystems. In order to evaluate the vulnerability of IP multimedia subsystems effectively, this paper further applies the complex network theory to construct the network model of IP multimedia subsystem and propose the vulnerability assessment indicator by adopting entropy model. Finally, some simulation experiments and result analysis are provided to our evaluation model. Both theoretical analysis and numerical simulations indicate that the proposed vulnerability measurement is a simple and effective new method to evaluate the overall vulnerability of this kind of IP multimedia subsystems. In addition, the proposed method provides a new idea and scientific basis for the vulnerability assessment of IP multimedia subsystems. © 2013 ACADEMY PUBLISHER.

Loading Jilin Business and Technology College collaborators
Loading Jilin Business and Technology College collaborators