Loading...

Table of Content

      
    20 June 2017
    Volume 52 Issue 6
    Research on totally sequential decision-model of two firms location and pricing based on Hotelling model
    XU Bing, ZHANG Yang
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  1-9.  doi:10.6040/j.issn.1671-9352.0.2017.045
    Abstract ( 1541 )   PDF (1064KB) ( 1072 )   Save
    References | Related Articles | Metrics
    It widely exists that firms enter the modern market sequentially. Based on Hotelling model, one decision-model of totally sequential entry with quadratic transportation cost was built to characterize the horizontal competition of two firms in a linear market that the leader makes price-decision after location-decision, and then the follower makes price-decision after location-decision. The analysis of two firms game shows that the follower has the advantage and gains more profits as a late-mover. The leader will locate at the end of market and chooses low-price strategy, while the follower will locate at the center of market and choose high-price strategy. The comparison of the decision-model of totally sequential entry, the game model of two firms making simultaneous decisions of location and price one after another, the game model that two firms simultaneously make location-decisions before they make price-decisions one after another, the game model that two firms make simultaneously price-decisions after their location-decisions were made simultaneously. It shows that the decisions of the first model and the second model are same, in which the prices and profits of two firms are lower than the following models. All four models cant realize the welfare-maximization of society. It needs “the visible hand” of government to regulate the behavior of firms.
    Research on fault tolerance strategies of quality improvement in supply chains with market pricing constraints
    ZHONG Yuan, XIONG Shuang, ZHANG Cui-hua, CHEN Hui-jie
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  10-15.  doi:10.6040/j.issn.1671-9352.0.2017.129
    Abstract ( 1223 )   PDF (1685KB) ( 527 )   Save
    References | Related Articles | Metrics
    This paper concerns on the strategies of quality improvementin supply chains with risk attitude when customers demand is uncertain. To achieve this goal, the functions of the enterprise risk attitude and value loss were introduced and the utility functions of quality improvement in supply chains were established. Through this analysis, the activities of quality improvement in integrated and decentralized supply chains with market pricingconstraints can be used as the bases of establishing the utility-quality models for manufacturers and suppliers respectively. These models can help people obtainthe fault tolerance strategies of quality improvement at risk in different situations and maximize the utility. At the last stage of this research, a software named Mathematica 5.0 will be used to test the availability of these models.
    Regional differences and influencing factors of carbon emissions in China: empirical evidence from provincial panel data
    YANG Ming-guo, WANG Gui-xin
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  16-23.  doi:10.6040/j.issn.1671-9352.0.2017.217
    Abstract ( 1420 )   PDF (836KB) ( 788 )   Save
    References | Related Articles | Metrics
    According to the reality of China, the paper modified carbon emission factors and estimate the carbon emissions of each province from 1995 to 2014. We constructs a econometric model based on panel data, and examines the regional differences and their influencing factors of long-term and short-term dynamic evolution of carbon emissions in the eastern, central, western and northeastern. We find that economic, social, political and technical factors have a significant impact(over 98%)on the dynamic evolution of carbon emissions across the country, particularly as a result of economic and technological factors. We also find that the technical factors have a significant positive effect on the long and short trends in the dynamic evolution of carbon emissions in all regions. The results show that during the period of rapid economic growth in China, there is a serious excessive energy consumption,excessive carbon emissions problem. To achieve the goal of carbon reduction in 2020,it is necessary to formulate differentiated carbon reduction strategies in line with regional characteristics as soon as possible; speed up industrial restructuring and technological innovation, and strive to build a regional low-carbon economic development model.
    Model selection with likelihood ratio for sequence transfer learning
    SUN Shi-chang, LIN Hong-fei, MENG Jia-na, LIU Hong-bo
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  24-31.  doi:10.6040/j.issn.1671-9352.5.2016.023
    Abstract ( 1045 )   PDF (920KB) ( 797 )   Save
    References | Related Articles | Metrics
    To solve the under-adaptation problem of transfer learning,in this paper the granular model is used as a set of candidate models, and labeling rules contained in minor for target domain models is introduced by a model selection method. We propose a Likelihood Ratio based Model Selection method(LRMS)for the inference of granular model, which implements the fusion of minor models with the granular model. LRMS keeps the single-path calculating of Viterbi-based sequence labeling model, which avoid the violation of contextual connections. In empirical experiments on part-of-speech tagging, LRMS improves the accuracy in every transfer learning task, therefore, the effectiveness of LRMS in solving the under-adaptation problem is verified.
    Identification of temporal relations based on temporal segments and topic segments
    ZHAO Hong-hong, TAN Hong-ye, XUN Li-na, WANG Rong
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  32-39.  doi:10.6040/j.issn.1671-9352.0.2016.484
    Abstract ( 779 )   PDF (1099KB) ( 580 )   Save
    Related Articles | Metrics
    Temporal relation recognition is a research focus in NLP(nature language processing). This paper identifies temporal relations based on temporal segment and topic segment, which semantic granularities were coarser. First, temporal segments were recognized according to temporal discourse characters. Then, topic segments were recognized through computing similarity between paragraphs and the SVM model. Final, within each topic segment, temporal relations between the adjacent temporal segments were identified by maximum entropy classifier. Experiments were made on TempEval-2010 corpus of Chinese, the macro-average precision of temporal relation recognition was 60.09%. The experimental results show that introduction of temporal segments can reduce the redundant recognition of the temporal relations between events. And with the scope constraint of topic segments, the results of temporal relations become more concise and understandable.
    Music retrieval model based on semantic descriptions
    QIN Jing, LIN Hong-fei, XU Bo
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  40-48.  doi:10.6040/j.issn.1671-9352.0.2017.059
    Abstract ( 1051 )   PDF (1361KB) ( 586 )   Save
    References | Related Articles | Metrics
    Query by semantic description(QBSD)is a natural way to retrieve and discovery relevant music based on semantic contents and users’ subjective feelings. A QBSD system can be defined as a supervised multi-class labeling(SML)model for bridging the semantic gaps, by which a song could be tagged using semantic labels and mapped into semantic spaces. In this paper, we propose a method for querying by semantic description based on the SML model, in which a song represented as a semantic vector could be used as a query, and retrieved within the tagged music dataset. The resulted song list contains most similar songs in the semantic space. A convolutional neural network is also integrated into the SML model. The experiments show that the proposed method could obtain relevant pieces of music in the same semantic space effectively and efficiently.
    The RESTful web services and knowledge base collaborative driven real-time tracking of emergency network opinion
    TANG Ming-wei, SU Xin-ning, JIANG Xun
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  49-55.  doi:10.6040/j.issn.1671-9352.5.2016.085
    Abstract ( 1127 )   PDF (2090KB) ( 414 )   Save
    References | Related Articles | Metrics
    The emergency network opinion could reflect the evolution process of emergency at first time, could provide development for emergency management. The paper analyzed the sorts and structure of the common sources of emergency network opinion, studied the heterogeneous between opinion sources, discussed and the methods of collecting network opinion by opinion sources API and Web crawler. On the basis, it built the real-time tracking platform of emergency network opinion by collaborating with RESTful Web services and knowledge, and then studied its’ three key problems which are the construction and access of opinion base, the real-time collection of opinion data and opinion recognition. Finally, it realized the target of automatic recognition and real-time tracking of emergency from Internet.
    Multidimensional data visualization in cloud platform security monitoring
    WU Di, WANG Li-na, YU Rong-wei, ZHANG Xin, XU Lai
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  56-63.  doi:10.6040/j.issn.1671-9352.2.2016.216
    Abstract ( 1204 )   PDF (2545KB) ( 663 )   Save
    References | Related Articles | Metrics
    Discussed application method of visualization technology by summarized visualization technology of cloud platform security monitoring and combined with the specific multidimensional monitoring data. Started from the three dimensions of time, node number and performance index type, a visualization method of performance data set based on dimension compression and dimension slice is proposed. Based on this, node self-identification of outliers achieved by used the dynamic time planning and convolution neural network, which extends and riches semantics of the alarm system. It was proved that the method was feasible and could show the effective information more intuitively and improve the decision efficiency of the cloud administrator.
    Identity-based encryption in multiple PKG environment based on ring signature
    LUO Peng, YANG Xiao-yuan
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  64-68.  doi:10.6040/j.issn.1671-9352.2.2016.215
    Abstract ( 1164 )   PDF (897KB) ( 858 )   Save
    References | Related Articles | Metrics
    Combining ring signatures with identity-based encryption, a new identity-based encryption with multiple private key generators was constructed, that is, scheme of multiple private key generators identity-based encryption based on ring signatures. Then a multiple private key generator identity-based encryption scheme on lattice based on ring signatures in the standard model was constructed, the security of the scheme was based on the difficulty of small integer solution problems and learning with errors on lattice. Compared with the existing scheme of identity-based encryption and its variation, the new scheme decreased the burdens of private key generator which more applicable to huge system and had higher application flexibility.
    A vTPM-VM live migration scheme based on KVM
    HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  69-75.  doi:10.6040/j.issn.1671-9352.2.2016.231
    Abstract ( 1592 )   PDF (1919KB) ( 1458 )   Save
    References | Related Articles | Metrics
    The virtual machine equipped with virtual Trusted Platform Module(vTPM)could not live migrate in KVM platform. To solve this problem, a live migration scheme of virtual machine equipped vTPM based on KVM is proposed. It is analyzed that the KVM architecture and virtualization features of vTPM and integrated the live migration of virtual machines equipped vTPM with those native normal virtual machines in KVM, thus to ensure the consistency of security state in system before and after the migration and the safety of vTPM instance data during the migration process. Finally, the scheme and did the experiment is realized. The results showed that compared with the live migration of normal virtual machine, our method make the user be unaware of the migration process. Meanwhile, the average downtime of virtual machine equipped with vTPM during the migration process is no more than 50 ms and the performance loss is 15% and after the migration, the user could use the vTPM functions properly.
    Reconfigurable design of Galois field multiplication in symmetric cryptography
    SU Yang
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  76-83.  doi:10.6040/j.issn.1671-9352.2.2016.194
    Abstract ( 1087 )   PDF (3355KB) ( 512 )   Save
    References | Related Articles | Metrics
    The Galois field X multiplication is a basic and important module in symmetric cryptography, but the processing speed is restricted by the realization performance for the complex operation and long calculation time. Combined with the operation characteristics of Galois field X multiplication in symmetric cryptography, the reconfigurable architecture of X multiplication of RISC and VLIW processor structure was designed, and proposed the corresponding dedicated instructions and expanding instructions, at last, the function verification and performance evaluation was given. The result shows that the reconfigurable structure and dedicated instructions of Galois field X multiplication can provide high processing speed with high flexibility and practicality.
    A real-time monitoring and forensics method under the IaaS model
    YANG Shu-mian, WANG Lian-hai, ZHANG Shu-hui, XU Shu-jiang, LIU Guang-qi
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  84-91.  doi:10.6040/j.issn.1671-9352.3.2016.003
    Abstract ( 1098 )   PDF (2482KB) ( 782 )   Save
    References | Related Articles | Metrics
    To ensure the security of virtual machines in the cloud and look for complete and reliable evidence of a crime from the cloud, the paper presented a real-time cloud monitoring forensics method and developed a cloud monitoring forensic system based on physical memory analysis. The specific design and implementation were given. The agent system only needs to run on a physical host. By acquiring and analyzing the host's physical memory, the agent can effectively acquire the important information of virtual machines of the IaaS infrastructure layer. Finally, the paper gives analysis extraction of information and anomaly detection in the KVM/Xen virtualized environment. Results show that the monitoring forensic method can obtain the important information and prevent the virtual hosts running malicious software, illegal crime and other issues.
    A key management mechanism basedon TrustZone architecture
    CUI Xiao-yu, ZHAO Bo, FAN Pei-ru, XIAO Yu
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  92-98.  doi:10.6040/j.issn.1671-9352.2.2016.219
    Abstract ( 1394 )   PDF (1664KB) ( 1029 )   Save
    References | Related Articles | Metrics
    Aiming at the lack of encryption protection for user privacy data on embedded devices, a key management mechanism is proposed in TrustZone architecture. Combined with Physical Unclonable Function(PUF)technology and the users PIN to generate the user key related to both device and user, the confidentiality and integrity of privacy data is protected. Meanwhile, a relatively thorough key management mechanism is designed formutli-user data protection scene in public embedded device to realize key generation, storage, update and destroy. Finally, this multi-user key management moduleisgiven and realizedin TrustZone. And its security and efficiencyis analyzed by experiments. The experiment result show that the mechanism is reliable secure and has high key management efficiency.
    Rumor spreading on dynamic complex networks with curious psychological mechanism
    WANG Ya-qi, WANG Jing
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  99-104.  doi:10.6040/j.issn.1671-9352.2.2016.165
    Abstract ( 1228 )   PDF (2607KB) ( 973 )   Save
    References | Related Articles | Metrics
    Considering the influence of curious psychological mechanism,this paper proposes a dynamic complex network evolution model. Based on this model, the dynamical behaviors of rumor spreading are investigated by using the numerical simulations. The research shows that the existence of the curious psychological mechanism reduces the propagation critical thresholds of the networks, increases the spreading velocity and the final propagation extent of rumors. It is also found that the dynamic connection probability has a great influence on the propagation mechanism of rumors, but the effect of the additional infection rate is negligible. In addition, under the influence of the curious psychological mechanism, the rumor spreading time on the networks is obviously shortened, and the reasonable suggestions for effective prevention and control of rumor spreading are given.
    A quantum multi-proxy blind signature scheme based on cluster state
    XIE Shu-cui, SHAO Ai-xia, ZHANG Jian-zhong
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(6):  105-110.  doi:10.6040/j.issn.1671-9352.0.2016.318
    Abstract ( 1113 )   PDF (860KB) ( 487 )   Save
    References | Related Articles | Metrics
    Based on the controlled quantum teleportation, this paper proposed a quantum multi-proxy blind signature scheme in which four-particle cluster state functions as quantum channel. First, the proxy signer Uj performs Bell-measurement on his particles generate proxy application. Second, the original signer Charlie performs Bell-measurement on his particles to authorize Uj to complete the signature. Finally, the verifier Bob can verify the signature by performing one unitary transformation. Compared with the existing schemes, this scheme only needs a four-particle cluster state as quantum channel to complete the quantum multi-proxy blind signature with less resources and greater security. Security analysis shows that the scheme can meet the requirements of undeniability, unforgeability, blindness and unconditional security.