Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Real-time data analysis system based on Spark Streaming and its application
HAN Dezhi, CHEN Xuguang, LEI Yuxin, DAI Yongtao, ZHANG Xiao
Journal of Computer Applications    2017, 37 (5): 1263-1269.   DOI: 10.11772/j.issn.1001-9081.2017.05.1263
Abstract1050)      PDF (1159KB)(800)       Save
In order to realize the rapid analysis of massive real-time data, a Distributed Real-time Data Analysis System (DRDAS) was designed, which resolved the collection, storage and real-time analysis for mass concurrent data. And according to the operation principle of Spark Streaming, a dynamic sampling K-means parallel algorithm was proposed, which could quickly and efficiently detect all kinds of DDoS (Distributed Denial of Service) attacks. The experimental results show that the DRDAS has good scalability, fault tolerance and real-time processing ability, and along with new K-means parallel algorithm, the DRDAS can real-time detect various DDoS attacks, and shorten the detecting time of attacks.
Reference | Related Articles | Metrics
Key technologies of distributed data stream processing based on big data
CHEN Fumei, HAN Dezhi, BI Kun, DAI Yongtao
Journal of Computer Applications    2017, 37 (3): 620-627.   DOI: 10.11772/j.issn.1001-9081.2017.03.620
Abstract614)      PDF (1326KB)(741)       Save
In the big data environment, the real-time processing requirement of data stream is high, and data calculations require persistence and high reliability. Distributed Data Stream Processing System (DDSPS) can solve the problem of data stream processing in big data environment. Besides, it has the advantages of scalability and fault-tolerance of distributed system, and also has high real-time processing capability. Four subsystems and their key technologies of the DDSPS based on big data were introduced in detail. The different technical schemes of each subsystem were discussed and compared. At the same time, an example of data stream processing system structure to detect Distributed Denial of Service (DDoS) attacks was introduced, which can provide the technical reference for data stream processing theory research and application technology development under big data environment.
Reference | Related Articles | Metrics
Password multimodality method in financial transactions
DAI Yong ZHANG Weijing SUN Guangwu
Journal of Computer Applications    2013, 33 (01): 135-137.   DOI: 10.3724/SP.J.1087.2013.00135
Abstract959)      PDF (516KB)(538)       Save
In financial transactions, some safety and reliability problems exist in the client authentication system with single keyboard password mode. To solve these problems, the password multimodality method was proposed. Modal sensors accessed the password codeword information and transmitted its normalized result. The formatted code information was pre-processed in property and then classified by its attributes. After that, the multimode passwords were fused through sharing public units. For a certain M bits password, if each bit had N kinds of possible modals, the password theft rate was 1/(10MCN×MM). In this multimode input system, the keyboard password and black box handwriting are the two default modals, and the application results demonstrate that the proposed method realizes the disordered blending input of multimodal password codeword. At M=6, the password theft rate is 1/(106C2×66), and the method types and difficulty of cracking those passwords increase with the number of modals. The password input system's safety, reliability and other performances are significantly better than those with only one modal.
Reference | Related Articles | Metrics
Project of an E-Bank system based on the technology of the iris recognition
CHEN Si-jie,ZHENG Jian-sheng,DAI Yong-hong
Journal of Computer Applications    2005, 25 (12): 2935-2937.  
Abstract1334)      PDF (584KB)(1146)       Save
A method to locate iris was introduced,in which Integro-Differential Operators were combined with Gradient-Decomposed Hough Transform.In the Daugman algorithms,a non-scattered man-made light could arouse the bright point effect,which could be effectively reduced by the method.A new E-Bank solution was designed useing it.And the solutin can enhance the lever of security,and satisfy the customer,bank and CA.
Related Articles | Metrics