Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Improved instruction obfuscation framework based on obfuscator low level virtual machine
Yayi WANG, Chen LIU, Tianbo HUANG, Weiping WEN
Journal of Computer Applications    2023, 43 (2): 490-498.   DOI: 10.11772/j.issn.1001-9081.2021122234
Abstract435)   HTML22)    PDF (2140KB)(204)       Save

Focusing on the issue that only one instruction substitution with 5 operators and 13 substitution schemes is supported in Obfuscator Low Level Virtual Machine (OLLVM) at the instruction obfuscation level, an improved instruction obfuscation framework InsObf was proposed. InsObf, including junk code insertion and instruction substitution, was able to enhance the obfuscation effect at the instruction level based on OLLVM. For junk code insertion, firstly, the dependency of the instruction inside the basic block was analyzed, and then two kinds of junk code, multiple jump and bogus loop, were inserted to disrupt the structure of the basic block. For instruction substitution, based on OLLVM, it was expanded to 13 operators, with 52 instruction substitution schemes. The framework prototype was implemented on Low Level Virtual Machine (LLVM). Experimental results show that compared to OLLVM, InsObf has the cyclomatic complexity and resilience increased by almost four times, with a time cost of about 10 percentage points and a space cost of about 20 percentage points higher. Moreover, InsObf can provide higher code complexity compared to Armariris and Hikari, which are also improved on the basis of OLLVM, at the same order of magnitude of time and space costs. Therefore, InsObf can provide effective protection at the instruction level.

Table and Figures | Reference | Related Articles | Metrics
UAV path planning for persistent monitoring based on value function iteration
Chen LIU, Yang CHEN, Hao FU
Journal of Computer Applications    2023, 43 (10): 3290-3296.   DOI: 10.11772/j.issn.1001-9081.2022091464
Abstract197)   HTML3)    PDF (2422KB)(102)       Save

The use of Unmanned Aerial Vehicle (UAV) to continuously monitor designated areas can play a role in deterring invasion and damage as well as discovering abnormalities in time, but the fixed monitoring rules are easy to be discovered by the invaders. Therefore, it is necessary to design a random algorithm for UAV flight path. In view of the above problem, a UAV persistent monitoring path planning algorithm based on Value Function Iteration (VFI) was proposed. Firstly, the state of the monitoring target point was selected reasonably, and the remaining time of each monitoring node was analyzed. Secondly, the value function of the corresponding state of this monitoring target point was constructed by combining the reward/penalty benefit and the path security constraint. In the process of the VFI algorithm, the next node was selected randomly based on ε principle and roulette selection. Finally, with the goal that the growth of the value function of all states tends to be saturated, the UAV persistent monitoring path was solved. Simulation results show that the proposed algorithm has the obtained information entropy of 0.905 0, and the VFI running time of 0.363 7 s. Compared with the traditional Ant Colony Optimization (ACO), the proposed algorithm has the information entropy increased by 216%, and the running time decreased by 59%,both randomness and rapidity have been improved. It is verified that random UAV flight path is of great significance to improve the efficiency of persistent monitoring.

Table and Figures | Reference | Related Articles | Metrics
Service composition optimization based on improved krill herd algorithm
Shuicong LIAO, Peng SUN, Xingchen LIU, Yun ZHONG
Journal of Computer Applications    2021, 41 (12): 3652-3657.   DOI: 10.11772/j.issn.1001-9081.2021040699
Abstract288)   HTML6)    PDF (703KB)(63)       Save

In the Service Oriented Architecture (SOA), an improved Krill Herd algorithm PRKH with adaptive crossover and random perturbation operator was proposed to solve the problem of easily falling into local optimum and high time cost in the process of service composition optimization. Firstly, a service composition optimization model was established based on Quality of Service (QoS), and the QoS calculation formulas and normalization methods under different structures were given. Then, based on the Krill Herd (KH) algorithm, the adaptive crossover probability and the random disturbance based on the actual offset were added to achieve a good balance between the global search ability and the local search ability of krill herd. Finally, through simulation, the proposed algorithm was compared with KH algorithm, Particle Swarm Optimization (PSO) algorithm, Artificial Bee Colony (ABC) algorithm and Flower Pollination Algorithm (FPA). Experimental results show that the PRKH algorithm can find better QoS composite services faster.

Table and Figures | Reference | Related Articles | Metrics
Two-level confidence threshold setting method for positive and negative association rules
CHEN Liu, FENG Shan
Journal of Computer Applications    2018, 38 (5): 1315-1319.   DOI: 10.11772/j.issn.1001-9081.2017102469
Abstract630)      PDF (873KB)(329)       Save
Aiming at the problem that traditional confidence threshold setting methods for positive and negative association rules are difficult to limit the number of low-reliability rules and easy to miss some interesting association rules, a new two-level confidence threshold setting method combined with the rule's itemset correlation was proposed, called PNMC-TWO. Firstly, taking into account the consistency, validity and interestingness of rules, under the framework of correlation-support-confidence, on the basis of the computation relationship between rule confidence and itemset support of the rule, the law of confidence of rule changing with support of itemsets of the rule was analyzed systematically. And then, combined with the user's requirement of high confidence and interesting rules in actual mining, a new confidence threshold setting model was proposed to avoid the blindness and randomness of the traditional methods when setting the threshold. Finally, the proposed method was compared with the original two-threshold method in terms of the quantity and quality of the rule. The experimental results show that the new two-level threshold method not only can ensure that the extracted association rules are more effective and interesting, but also can reduce the number of low-reliability rules significantly.
Reference | Related Articles | Metrics
Multi-constraints deadline-aware task scheduling heuristic in virtual clouds
ZHANG Yi, CHENG Xiaohui, CHEN Liuhua
Journal of Computer Applications    2017, 37 (10): 2754-2759.   DOI: 10.11772/j.issn.1001-9081.2017.10.2754
Abstract565)      PDF (967KB)(422)       Save
Many existing scheduling approaches in cloud data centers try to consolidate Virtual Machines (VMs) by VM live migration technique to minimize the number of Physical Machines (PMs) and hence minimize the energy consumption, however, it introduces high migration overhead; furthermore, the cost factor that leads to high payment cost for cloud users is usually not taken into account. Aiming at energy reduction for cloud providers and payment saving for cloud users, as well as guaranteeing the deadline of user tasks, a heuristic task scheduling algorithm called Energy and Deadline-Aware with Non-Migration Scheduling (EDA-NMS) was proposed. The execution of the tasks that have loose deadlines was postponed to avoid waking up new PMs and migration overhead, thus reducing the energy consumption. The results of extensive experiments show that compared with Proactive and Reactive Scheduling (PRS) algorithm, by selecting a smart VM combination scheme, EDA-NMS can reduce the static energy consumption and ensure the lowest payment with meeting the deadline requirement for key user tasks.
Reference | Related Articles | Metrics
Byzantine fault tolerance schema for service-oriented computing and its correctness proof
CHEN Liu, ZHOU Wei
Journal of Computer Applications    2016, 36 (2): 505-510.   DOI: 10.11772/j.issn.1001-9081.2016.02.0505
Abstract534)      PDF (1007KB)(909)       Save
A Byzantine Fault Tolerance (BFT) schema was proposed to solve the problem that most Byzantine fault tolerance protocols were not suitable for service-oriented computing and other emerging computing models because of the assumption that the services were passive and independent. Service replicas were created on both sides of service requester and service provider. State machine replication algorithm was used to reach agreement on the ID and the content of the request after three rounds of communications among service replicas. After receiving a request, replicas submitted the request to upper application logic. After receiving the reply, replicas on service requester reached agreement on the ID and the content of the reply after three rounds of communications among services replicas and then accepted the reply. To deal with the problem of only having simple correctness reasoning and lacking of formal verification, an I/O automaton was used to model the protocol and simulation relation method was used as a tool to prove the correctness of the protocol more formally and rigorously. A highly abstract simple I/O automata S was constructed, which meeted safety and liveness. The parties of the protocol were broken down into several simple member I/O automata including front-end automaton, back-end automaton and multicast channel automaton. It is proved that the system composed of member I/O automata realizes the automata S. I/O automaton can accurately describe the protocol, which makes the correctness proof more standard than inductive reasoning.
Reference | Related Articles | Metrics
Outage probability of hybrid satellite terrestrial cooperative system with best selection
CHEN Liuwei, LIANG Jun, ZHU Wei, ZHANG Hengyang, WANG Yi
Journal of Computer Applications    2015, 35 (5): 1234-1237.   DOI: 10.11772/j.issn.1001-9081.2015.05.1234
Abstract505)      PDF (528KB)(518)       Save

Focusing on the fading and shadowing effect in satellite channel, a Hybrid Satellite-Terrestrial Cooperative System (HSTCS) was presented, and the closed-form expression of the outage probability was evaluated using the Land Mobile Satellite (LMS) channel. A selective Decode-and-Forward (DF) scheme was implemented between a source node (the satellite) and a destination node (a terrestrial station), and signals from the satellite and terrestrial relay were combined at destination. The analytical expression of the outage probability was verified with the Matlab simulation. The results show that the system can improve the outage performance through the diversity gain, compared with the direct transmission.

Reference | Related Articles | Metrics
Humanoid robot gait planning based on 3D linear inverted pendulum model
YU Guo-chen LIU Yong-xin LI Xiao-hong
Journal of Computer Applications    2012, 32 (09): 2643-2647.   DOI: 10.3724/SP.J.1087.2012.02643
Abstract1163)      PDF (816KB)(656)       Save
In order to real-time adjust the humanoid robot gait, a humanoid robot gait generation method was proposed. The robot motion was simplified to the inverted pendulum motion of the three-dimensional linear model, and passed the pre-planned Zero Moment Point (ZMP) trajectory. According to the Center of Mass (CoM) and ZMP relations, the CoM trajectory was obtained. The front side gait and lateral gait were simplified into seven-link and five-link structures, the triangle theorem was used to calculate the angle of each joint, and the ZMP equation was introduced to discuss the stability of the walking process. The system simulation was done according to given conditions and combined with the actual system and its operation conditions were analyzed to verify the validity of the proposed planning method.
Reference | Related Articles | Metrics
Services selection based on commodity-market in grid workflow
Wan-Cheng NI Lian-Chen LIU Cheng Wu
Journal of Computer Applications   
Abstract1973)            Save
Services selection is important in Grid workflow. To deal with the inefficient resources utilization brought by greedy competition for QoS in current Web services composition methods, an "on-demand" Grid services selection method based on commodity market was put forward. Based on global evaluation model for Grid workflow, services selection was modeled as a 0-1 multi-dimensional knapsack problem by transforming the service requester's requirements into constraints. Furthermore, the selection model was improved with economic "price-demand relationship". Finally, experiments show that the proposed services selection method can bring load balance, which is helpful to the utilization of Grid resources.
Related Articles | Metrics
Personalization recommendation based on customer's behavior under DMA-based sequential pattern
Chen-Chen LIU
Journal of Computer Applications   
Abstract1796)            Save
The E-commerce leads to the moreintensive competition among the entities, and personalization recommendation would be the breakthrough to increase the customer's loyalty and promote the profits. The dynamic mining algorithm was proposed and improved to realize the personalization recommendation based on customers purchase sequences. The definition of time contraint was put forward considering the impact of the length of the times compartmentalization and the selflearning function of the system was realized. The result of an imitating experiment indicates that the recommendation method proposed is feasible and effctive.
Related Articles | Metrics