Jingfeng Xue

Learn More
To solve routing jitter problem in PROPHET in delay tolerant network, advanced PROPHET routing is proposed in this paper. Average delivery predictabilities are used in advanced PROPHET to avoid routing jitter. Furthermore, we evaluate it through simulations versus PROPHET routing protocol. The experimental results show there has higher average delivery(More)
To avoid random and blindfold forwarding decision in Spray and Wait routing in delay tolerant network, Binary Spray and Wait routing based on average delivery probability is proposed in this paper. Based on delivery predictability of PROPHET, average delivery predictability is proposed and used in Binary Spray and Wait routing to make forwarding decision.(More)
In the present study, a rat model of type 2 diabetes mellitus was established by continuous peritoneal injection of streptozotocin. Following intragastric perfusion of sericin for 35 days, blood glucose levels significantly reduced, neuronal apoptosis in the hippocampal CA1 region decreased, hippocampal phosphorylated Akt and nuclear factor kappa B(More)
The rapid development of mobile Internet has offered the opportunity for WiFi indoor positioning to come under the spotlight due to its low cost. However, nowadays the accuracy of WiFi indoor positioning cannot meet the demands of practical applications. To solve this problem, this paper proposes an improved WiFi indoor positioning algorithm by weighted(More)
Software defect prediction strives to improve software security by helping testers locate the software defects accurately. The data redundancy caused by the overmuch attributes in defects data set will make the prediction accuracy decrease. A model based on locally linear embedding and support vector machine (LLE-SVM) is proposed to solve this problem in(More)
The increase in neurotrophic factors after craniocerebral injury has been shown to promote fracture healing. Moreover, neurotrophic factors play a key role in the regeneration and repair of peripheral nerve. However, whether craniocerebral injury alters the repair of peripheral nerve injuries remains poorly understood. Rat injury models were established by(More)
Software structure is very important for software security. But it is very difficult to obtain software structure by software execution trace. In this paper, by researching system call sequences in the process of software execution, similar call graph is proposed. We present how to generate similar call graph by observed system call sequences. Based on(More)
In order to reflect the dynamic feature of situations and of peers' behavior more accurately, context information, which contains different attributes of situations, should be considered explicitly when evaluating trust. A context-aware trust establishment framework based on Bayesian networks is proposed. In our proposal, the contextual factors are inferred(More)
Obfuscating technology is used widely in metamorphic malware and most of current detection methods fail to completely identify such ever-increasingly covert metamorphic malware. In this paper, system call sequences in the process of software execution are researched and metamorphic malware detection method based on aggregating emerging patterns is proposed.(More)