Table of Content

    20 May 2019
    Volume 54 Issue 5
    Malicious Office document detection technology based on entropy time series
    An-min ZHOU,Lei HU,Lu-ping LIU,Peng JIA,Liang LIU
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  1-7.  doi:10.6040/j.issn.1671-9352.2.2018.072
    Abstract ( 551 )   HTML ( 9 )   PDF (5465KB) ( 131 )   Save
    Figures and Tables | References | Related Articles | Metrics

    In order to detect malicious Office (*.docx, *.rtf) documents more accurately, a method based on document entropy time sequence to detect malicious Office documents is proposed. This method converts the difference between the malware and the non malicious document binary to the difference between the power spectrum of the time sequence of the file entropy, and then uses three kinds of machine learning methods, IBK, Random Committe (RC) and Random Forest (RF), to learn and detect the data respectively. The experimental results show that the accuracy of the docx format document for XML compression technology can reach 92.14%, while the accuracy of the rich text format (RTF) file can reach 98.20%.

    Trajectory model of area crowd based on WiFi positioning
    Yang XU,Jian-zhong SUN,Lei HUANG,Xiao-yao XIE
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  8-20.  doi:10.6040/j.issn.1671-9352.2.2018.200
    Abstract ( 674 )   HTML ( 14 )   PDF (8697KB) ( 195 )   Save
    Figures and Tables | References | Related Articles | Metrics

    The existing indoor WiFi positioning methods are difficult to resolve the need of crowd trajectory analysis in the large-scale activities and inter-regional. Aiming at this problem, a new crowd location method based on trilateration measurement and signal strength indication (RSSI) for large-scale venues and complex environments is proposed. Crowd positioning in the region, crowd division inside and outside the region, and crowd flow analysis in the region can be achieved. A prediction algorithm based on probability and statistics is used to predict crowd trajectories. A crowd trajectory model in WiFi area is established. A cross regional crowd mobility trajectory model is further established to analyse the flow of crowd in large area inter regional. A proving system of WiFi regional crowd trajectory model is established. Using the data of 2016 Guiyang International Big Data Expo, data visualization analysis is carried out. In this way, the validity of the model is proved.

    A deployment strategy for fault recovery of SDN control nodes
    Zhen-peng LIU,Wen-sheng WANG,Yu-peng HE,Jing-wei SUN,Bin ZHANG
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  21-27.  doi:10.6040/j.issn.1671-9352.2.2018.153
    Abstract ( 386 )   HTML ( 6 )   PDF (1115KB) ( 67 )   Save
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the situation that the controller has an unrecoverable fault during the operation of the software defined network (SDN) in the WAN, a deployment method considering the fault of the controller node is proposed. Firstly, the network is divided into multiple sub-networks, and then an improved particle swarm optimization algorithm is proposed to deploy the SDN controller in order to achieve higher reliability, lower delay and more balanced load. In the process of network operation, when the controller has an unrecoverable fault, the entropy weight multi-objective decision method is used to determine the target slave controller in the faulty area and upgrade it to the master controller to ensure the normal operation of the network. The experimental results show that compared with the K-means or greedy algorithm, the controller deployment using this method improves the network key indicators such as load balancing rate and link delay of the SDN network, and can reduce decrease the impact of controller failure points on the normal operation of the network at a relatively low costs.

    Research on microblog data collection based on multiple hybrid strategy
    Pei-ming WANG,Xing-shu CHEN,Hai-zhou WANG,Wen-xian WANG
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  28-36, 43.  doi:10.6040/j.issn.1671-9352.2.2018.058
    Abstract ( 459 )   HTML ( 12 )   PDF (1140KB) ( 193 )   Save
    Figures and Tables | References | Related Articles | Metrics

    Microblog is becoming the main social media to spread public information, efficient acquisition of microblog data is important to the analysis of online public opinion. Taking Microblog as the research object, there are three data collection strategies through microblog API, simulated login technology and visitor cookie are studied. A data collection method for microblog based on fusion strategy is proposed. An adaptive concurrent data acquisition algorithm is designed and implemented for the web crawler based on simulated login technology. A high available IP proxy pool is designed to accelerate data acquisition for the web crawler based on visitor Cookie. Experimental results show that the fusion strategy is more effective, complete and stable in microblog data collection.

    Unknown protocol message clustering algorithm based on continuous features
    Zheng-yu LU,Guang-song LI,Ying-zhu SHEN,Bin ZHANG
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  37-43.  doi:10.6040/j.issn.1671-9352.2.2018.136
    Abstract ( 390 )   HTML ( 4 )   PDF (2089KB) ( 127 )   Save
    Figures and Tables | References | Related Articles | Metrics

    Clustering of unknown protocol message sequences is the basis for analyzing the protocol format. Based on the traditional K-means algorithm, this paper proposed a continuous-features-based unknown feature message clustering algorithm, which combines the continuity of protocol format field with string matching method. Firstly, coarsely cluster the measured data sets based on the continuity of the protocol format field, extract the initial clustering center of the K-means algorithm, and then iteratively process the data using the message distance and the iterative algorithm with improved convergence function to further cluster the message. Experiments show that compared with the traditional K-means algorithm, the proposed new method improves the accuracy of clustering by 17.58% and reduces the number of iterations by about 58.27%. Compared with EM algorithm and DBSCAN algorithm, the clustering accuracy and time are significantly improved.

    An anonymous and provably remote user authentication protocol using extended chaotic maps for multi-server system
    Juan QU,Yu-ming FENG,Yan-ping LI,Li LI
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  44-51.  doi:10.6040/j.issn.1671-9352.2.2018.207
    Abstract ( 352 )   HTML ( 4 )   PDF (456KB) ( 112 )   Save
    Figures and Tables | References | Related Articles | Metrics

    The existing remote user authentication schemes for multi-server environment are not resilient to defend against various security attacks and does not provide user anonymity. Therefore, a remote user authentication scheme for multi-server environment based on biometric and chaotic maps is proposed to realize authentication between the user and multi-server. The user and multi-server can authenticate each other and share a session key for subsequent secure communication. The proposed scheme is proved to be secure using the BAN logic. Additionally, analysis results show that the proposed protocol can resist masquerade attack, offline password guessing attack, stolen smart card attack, etc. Finally, comparing the scheme with other relevant schemes and the comparative results show that our scheme is efficient in terms of computation cost, communication cost, it can be more suitable for practical application.

    A lightweight anti-desynchronization RFID mutual authentication protocol
    Xin-min DAI,Xiao-yao XIE
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  52-76.  doi:10.6040/j.issn.1671-9352.2.2018.079
    Abstract ( 358 )   HTML ( 4 )   PDF (698KB) ( 76 )   Save
    Figures and Tables | References | Related Articles | Metrics

    Lightweight radio frequency identification (RFID) protocols usually adopt a synchronous update mechanism to avoid leakage of location privacy, but it brings the problem of desynchronization attack. Desynchronization attack can cause inconsistent updates of the secret data between the tag and the database. As a result, the tag does not work properly. After the analysis of an existing protocol, it is found that it is vulnerable to the attack of desynchronization. In view of the defects of the existing protocol, a new lightweight mutual authentication protocol against desynchronization attack is proposed. The formal analysis of the new protocol is carried out by using the ideal honest theory of the strand space, which proves the correctness of the new protocol.

    Key sectors in input-output network
    Jin-qiu GONG,Jin XU,Fa-sheng HU
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  61-67,76.  doi:10.6040/j.issn.1671-9352.0.2018.531
    Abstract ( 493 )   HTML ( 14 )   PDF (900KB) ( 93 )   Save
    Figures and Tables | References | Related Articles | Metrics

    As economic cooperation becomes closer and industrial network becomes more connected, changes in sector production will affect the output of its upstream and downstream sectors, directly or indirectly affecting other sectors, and thereby affecting the overall economy. From the perspective of intersectoral input-output network, the influence of each sector on the aggregate volatility is measured. The input-output network is constructed by direct consumption coefficient matrix to study the role of sectoral shocks in the aggregate volatility. On the basis of the established input-output network, the key sectors are depicted from the perspective of the impact on the aggregate volatility, whose productivity shock has the greatest impact on the output volatility of the entire network. The empirical analysis of China's 2012 input and output data shows that the wholesale and retail, agricultural product sectors have the greatest impact on the aggregate volatility through network linkages, which can be regarded as key sectors.

    Supply chain coordination strategy of joint contract under the disruption increased demand
    Xin-hua HE,Cai-yun YOU,Wen-fa HU
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  68-76.  doi:10.6040/j.issn.1671-9352.0.2018.295
    Abstract ( 363 )   HTML ( 3 )   PDF (1043KB) ( 90 )   Save
    Figures and Tables | References | Related Articles | Metrics

    Considering the impact of disruption increased demand on the revenue of emergency service supply chain, and using joint contracts to coordinate emergency logistics service supply chain. Firstly, the coordination of the joint contract under the premise of stable market demand is analyzed. It is pointed out that the service supply chain under the joint contract is more coordinated. Then optimizing the profits of logistics service supply chain under emergencies through reasonable contract parameters, the joint contract can continue to coordinate the supply chain in response to emergencies, and get the optimal ordering strategy of the integrator. Finally, through the analysis of the example, the validity of the joint contract coordination emergency is further verified, and more accurate information is provided for the accurate decision of the supply chain.

    Domestic carbon price fluctuation and regional characteristics based on H-P filtering method
    Shao-hui ZOU,Tian ZHANG,Xiao-xia YAN
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  77-87.  doi:10.6040/j.issn.1671-9352.0.2018.453
    Abstract ( 395 )   HTML ( 14 )   PDF (3494KB) ( 184 )   Save
    Figures and Tables | References | Related Articles | Metrics

    The price of carbon emission trading in China has obvious volatility and regional differences. Scientifically describing the volatility of carbon emission trading price and analyzing the differences of different regions are conducive to avoiding investment risks, developing carbon market smoothly and improving the pricing ability of domestic carbon market in the international market. It is also particularly important to speed up the establishment of a unified national carbon market. H-P filtering is a commonly used trend decomposition method for economic variables, which can effectively analyze the seasonal variation law in time series data. Based on monthly data of carbon emission trading prices in seven major regions of China from December 2013 to June 2018, H-P filtering method is used to empirically study the fluctuation law and regional characteristics of domestic carbon prices. The results show that the domestic carbon price has a significant characteristic of "falling in fluctuation", showing 3 complete cycles, the time range of each cycle is 10~22 months. Peak and valley values show a downward trend in varying degrees, and all of them change from positive to negative, the cycle types show a steep downward trend. From the regional perspective, the volatility of carbon emission trading price in Tianjin and Beijing is more obvious, while the fluctuation of carbon emission trading price in Hubei and Chongqing has less impact on Tianjin.

    Bipolar fuzzy ideals in negative non-involutive residuated lattices
    LIU Chun-hui, LI Yu-mao, ZHANG Hai-yan
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  88-98.  doi:10.6040/j.issn.1671-9352.0.2018.386
    Abstract ( 315 )   PDF (508KB) ( 72 )   Save
    References | Related Articles | Metrics
    Based on the theory of bipolar fuzzy sets, the problem of ideals in negative non-involutive residuated lattices is studied. Firstly, the concept of bipolar fuzzy ideals in negative non-involutive residuated lattices is introduced, and some their basic properties and equivalent characterizations are discussed. Secondly, the relationships between bipolar fuzzy ideals and ideals are investigated by using the concepts of positive t-cut and negative s-cut set of bipolar valued fuzzy sets. Finally, some equivalence relations are constructed on the set of all bipolar fuzzy ideals in a negative non-involutive residuated lattice, and the properties of corresponding quotient sets are obtained. It further expands the way for revealing the structural characteristics of negative non-involutive residuated lattices.
    (O,N)-implication and its characterizations
    LIU Xiao, ZHOU Hong-jun
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  99-111.  doi:10.6040/j.issn.1671-9352.0.2018.381
    Abstract ( 343 )   PDF (10604KB) ( 73 )   Save
    References | Related Articles | Metrics
    Fuzzy implications paly an important role in both theoretic and applied communities of fuzzy set theory. The well-known fuzzy implications are usually constructed in appropriate ways from t-norms, t-conorms and fuzzy negations, and according to construction methods, they can be roughly classified into five classes, namely (S,N)-implications, R-implications, QL-implications, Yagers implications and ordinal sum implications. We introduce a new class of implications, called (O,N)-implications, generated from overlap functions O and fuzzy negations N inspired by the classical tautology p→q≡(p∧q). We discuss the properties of (O,N)-implications and give some characterizations of them. Finally, grouping functions and overlap functions generated by (O,N)-implications and fuzzy negations are investigated.
    Pushdown automata and content-free grammars based on complete residuated lattice-valued logic
    PENG Jia-yin
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2019, 54(5):  112-126.  doi:10.6040/j.issn.1671-9352.0.2018.060
    Abstract ( 323 )   PDF (591KB) ( 97 )   Save
    References | Related Articles | Metrics
    The concept of L-valued pushdown automation is introduced. The equivalence that an L-valued language can be accepted by L-valued pushdown automata in two different ways. It is pointed out that the L-valued regular language can be recognized by L-valued pushdown automata. Using the method of general subset-construction, we prove the fact that an L-valued pushdown automation can accept the same L-valued language by final states and by another L-valued pushdown automation, with crisp transition relation and L-valued final states at the same time. According to this equivalence, some algebraic level charac-terizations of L-valued context-free languages are established, and the closed properties of these L-valued languages are also proved in details under standard operative conditions. In addition, the concept of L-valued context free-grammar is proposed. An L-valued context free grammar with a classical start symbol is given, which is equivalent to the general L-valued context free grammar. Using this equivalence relation, we discuss that an arbitrary L-valued context free grammar are mutually equivalently constructed with an L-valued pushdown automation, respectively, and present that in the sense of complete residuated lattice-valued logic. We can use any of the leftmost derivation, rightmost derivation, Chomsky paradigm, and Greibach paradigm to generate an L-valued context free language.