Shandong University of Political Science and Law
Jinan, China
Time filter
Source Type

Du N.,Shandong University of Political Science and Law
Agro Food Industry Hi-Tech | Year: 2017

With rapid development of scientific technology, digital technology has appeared frequently in the public, while digital literacy wins more attention for being the necessary skills in the new age. It is the trend that digital literacy based teaching resources from advanced schools will enter into English teaching classes. MOOC and Flipped Classroom are important methods of English teaching mode reform in advanced schools. Under the background of new age, the requirement for talents will be stricter, which will cause most students cultivated from current foreign language teaching mode in advanced schools cannot meet the standards of social development. In order to improve comprehensive capacity of students from advanced schools, through elaborating digital literacy, the paper proposes the research on advanced schools foreign language teaching method reform under digital literacy perspective to ensure advanced school students can adapt sustainable and healthy social demands in new age.

Liu N.,Shandong University of Political Science and Law | Ding F.,University of Jinan
Computers and Fluids | Year: 2014

By virtue of the binary Bell polynomials, the bilinear form and the Bäcklund transformation of the (2. +. 1)-dimensional extended shallow water wave equation are obtained. Based on the Bäcklund transformation in bilinear form, a new Bäcklund transformation is constructed. Furthermore, Lax pair and infinite conservation laws are derived. © 2013 Elsevier Ltd.

Jian W.,Shandong University of Political Science and Law
Lecture Notes in Electrical Engineering | Year: 2012

The intrusion detection data is high dimensional, but the attack behavior happens frequently on a part of attribute features, there is no linear relation between the feature number and the performance of detection. If all the attributes are used for the intrusion detection, the accuracy rate of data clustering will be affected, the calculating amount for the training and detecting are large, so the detection speed is highly decreased. So the feature selection is introduced into the intrusion detection. On the basis of keeping the information integrity for the initial network data, it can help remove the redundant attribute, reduce the data dimension number, and then the detecting efficiency and detecting speed will be highly improved. Hence, it has become a focus of research. © 2012 Springer-Verlag London Limited.

In this paper, the binary Bell polynomials are employed to find the bilinear form, bilinear Bäcklund transformation and Lax pair for the (3+1)-dimensional BKP equation. Based on Hirota’s bilinear form and three-wave method, multi-soliton solutions are presented. Furthermore, a new bilinear Bäcklund transformation is constructed via applying a gauge transformation to the Bäcklund transformation in bilinear form. © 2015 Springer Science+Business Media Dordrecht

Yang R.-X.,Shandong University of Political Science and Law
Proceedings - 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2015 | Year: 2015

In this paper, we analysis the security problem in mobile payment system. Based on Identity-Based Cryptography (IBC) which has simpler framework and lower cost, we present a secure mobile payment system to ensure the security and privacy of the transferred data. The algorithms of IBC are implemented in WIS08SD548E which can provide many national arithmetic functions to ensure data security in mobile terminal. Also, we discuss the trading process and analyze the security of the solution in payment transaction. © 2015 IEEE.

Xuan C.,Shandong University of Political Science and Law
Proceedings - 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2015 | Year: 2015

In many situations, the data are often encountered in mixed attributes. The k-prototypes algorithm is one of the principals for clustering this type of data objects. In view of the shortcomings of this algorithm, an improved algorithm is proposed to determine the initial points based on grouping and averaging method. Then we use the actual data set to test the improved algorithm. Detailed data prove that the improved algorithm has good stability and validity. © 2015 IEEE.

Ma B.,Shandong University of Political Science and Law
Proceedings of the International Conference on Uncertainty Reasoning and Knowledge Engineering, URKE 2011 | Year: 2011

In view of the safety and genuineness protection of the image while traveling over the internet, a novel digital watermarking scheme based on discrete wavelet transform (DWT) is proposed. The theory of digital watermark based on DWT for electronic seal is discussed. The digital watermark is scrambled with logistic chaotic sequences to improve the security of the system. Then the watermark signals are converted into a binary sequence embedded to the high (HL and HH) frequency band of the document in DWT domain. The algorithm of how to embed and extract the watermark is shown in the paper. Image quality is checked with a number of widely used parameters such as PSNR, Normalized correlation and JPEG compression. The experimental results demonstrate the efficiency of the proposed scheme, which is practicality perfect by means of good balance between transparency and robustness. © 2011 IEEE.

Feng G.,Shandong University of Political Science and Law
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS | Year: 2015

Traditional FCM algorithm has the problems of sensitivity to initialization, local optimal and the Euclidean distance is only applied to handle the dataset of spatial data structure for the super-ball. Hence a semi-supervised Fuzzy C-Means algorithm based on pairwise constraints for the intrusion detection is proposed. The pairwise constraints can be used to improve the learning ability of the algorithm and the detection rate. The KDDCUP99 data sets were selected as the experimental object. The experiment result proves that the detection rate and the false rate can be more efficiently improved by the semi-supervised FCM clustering algorithm than the traditional FCM algorithm. © 2015 IEEE.

Lei S.,Shandong University of Political Science and Law
Proceedings - 2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012 | Year: 2012

with the rapid development of the Computer Science and Technology, It has become a major problem for the users that how to quickly find useful or needed information. Text categorization can help people to solve this question. The feature selection method has become one of the most critical techniques in the field of the text automatic categorization. A new method of the text feature selection based on Information Gain and Genetic Algorithm is proposed in this paper. This method chooses the feature based on information gain with the frequency of items. Meanwhile, for the information filtering systems, this method has been improved fitness function to fully consider the characteristics of weight, text and vector similarity dimension, etc. The experiment has proved that the method can reduce the dimension of text vector and improve the precision of text classification. © 2012 IEEE.

Wu J.,Shandong University of Political Science and Law
Chinese Control Conference, CCC | Year: 2014

The fuzzy energy management strategy for a plug-in hybrid electric vehicle (PHEV) is proposed by modeling of driving cycle and optimization of fuzzy controller. Firstly, the driving cycle model is constructed with BP neural network based on the driving data of Shandong university school bus. Then the membership functions and rules of fuzzy torque distribution controller are optimized by using particle swarm optimization in accordance with the driving cycle model. The test results from the ADVISOR platform show that compared with the un-optimized strategies, the fuzzy energy management strategy based on the driving cycle modeling can lower the cost of driving effectively. © 2014 TCCT, CAA.

Loading Shandong University of Political Science and Law collaborators
Loading Shandong University of Political Science and Law collaborators