Supervised and Sponsored by Chongqing Southwest Information Co., Ltd.
CODEN JKIEBK
-
Information Security in New Quantum Technology Age
张亮亮,张翌维,梁洁,孙瑞一,王新安. 新量子技术时代下的信息安全[J]. 计算机科学, 2017, 44(7): 1-7.
ZHANG Liang-liang, ZHANG Yi-wei, LIANG Jie, SUN Rui-yi and WANG Xin-an. Information Security in New Quantum Technology Age[J]. Computer Science, 2017, 44(7): 1-7. - ZHANG Liang-liang, ZHANG Yi-wei, LIANG Jie, SUN Rui-yi and WANG Xin-an
- Computer Science. 2017, 44 (7): 1-7. doi:10.11896/j.issn.1002-137X.2017.07.001
- Abstract PDF(676KB) ( 932 )
- References | Related Articles | Metrics
-
Quantum technologies should have a profound impact on cryptography and information security industry in the coming age.The general quantum computers,which can run quantum algorithms by thousands of qubits,posing a serious threat to the fundamental algorithms of information security.The famous RSA algorithm and other public key ciphers will be broken and the cryptographic strength of block ciphers will be halved.The implementation of the quantum key distribution in quantum communication must alter the physical construction of traditional secure communication.These important application values are also the driving factors for developing quantum technologies.Combining with the current hot news of quantum technologies,the effects to information security technology were reviewed from two perspectives,quantum computation and quantum communication,respectively.Meanwhile,the status of the new developments in these technologies was briefly introduced,including the advances of general and specific quantum compu-ters,the progress of quantum key distribution made in laboratory conditions and the state of development of the space-ground quantum communication network.In the end,the future form of information security technology was given with a summary.In future,the quantum technologies will deeply integrate and co-exist with various existing technologies.
-
Study on Testing Cloud Computing Elasticity
胡亚洲,邓波,林旺群,彭甫阳,王东霞. 云计算弹性测试研究[J]. 计算机科学, 2017, 44(7): 8-15.
HU Ya-zhou, DENG Bo, LIN Wang-qun, PENG Fu-yang and WANG Dong-xia. Study on Testing Cloud Computing Elasticity[J]. Computer Science, 2017, 44(7): 8-15. - HU Ya-zhou, DENG Bo, LIN Wang-qun, PENG Fu-yang and WANG Dong-xia
- Computer Science. 2017, 44 (7): 8-15. doi:10.11896/j.issn.1002-137X.2017.07.002
- Abstract PDF(1474KB) ( 1030 )
- References | Related Articles | Metrics
-
Elasticity is the key feature of cloud computing,which can support resources to elastically expand,fast configured,flexibly add and remove,and it can make full use of cloud resources and reduced the cost of cloud services providers and users.To evaluate whether elasticity meet the SLA (Service Level Agreement) requirements and make full use of cloud resources,we should evaluate and test elasticity of cloud computing.In this paper,we introduced the definition of elasticity,solutions and metrics for elasticity.Then we proposed the definition of cloud computing elasticity testing,and summarized some correlational researches of cloud computing elasticity testing.Next,we summarized its key technologies and frameworks.We also discussed some challenges and issues on testing cloud computing elasticity.Finally,we put forward the further research direction of cloud computing elasticity testing.
-
Review on Security Audit Technology for Cloud Computing
王文娟,杜学绘,王娜,单棣斌. 云计算安全审计技术研究综述[J]. 计算机科学, 2017, 44(7): 16-20.
WANG Wen-juan, DU Xue-hui, WANG Na and SHAN Di-bin. Review on Security Audit Technology for Cloud Computing[J]. Computer Science, 2017, 44(7): 16-20. - WANG Wen-juan, DU Xue-hui, WANG Na and SHAN Di-bin
- Computer Science. 2017, 44 (7): 16-20. doi:10.11896/j.issn.1002-137X.2017.07.003
- Abstract PDF(554KB) ( 1080 )
- References | Related Articles | Metrics
-
Now the security concern has become a huge impediment to the development of cloud computing.Due to the specific characteristics such as data and service outsourcing,virtualization,multi-tenant and cross domain sharing,the cloud computing environment faces more complicated threats compared with traditional IT environment,and the security audit technology also needs higher demands.Firstly,this paper analyzed the main challenges that cloud security audit confronts with,proposed a security audit technology framework in cloud environment which provides all-around examination from four dimensions such as user dimension,business dimension,data dimension,infrastructure dimension.Then according to different dimensions,the studies were reviewed from three aspects including log audit,storage audit and configuration audit,in order to provide useful reference to the development research of security audit for cloud computing in our country.
-
Modeling and Analysis of CPS Unmanned Vehicle Systems Based on Extended Hybrid Petri Net
宋相君,张广泉. 基于扩展混成Petri网的CPS无人车系统建模与分析[J]. 计算机科学, 2017, 44(7): 21-24.
SONG Xiang-jun and ZHANG Guang-quan. Modeling and Analysis of CPS Unmanned Vehicle Systems Based on Extended Hybrid Petri Net[J]. Computer Science, 2017, 44(7): 21-24. - SONG Xiang-jun and ZHANG Guang-quan
- Computer Science. 2017, 44 (7): 21-24. doi:10.11896/j.issn.1002-137X.2017.07.004
- Abstract PDF(306KB) ( 889 )
- References | Related Articles | Metrics
-
Cyber-physical system (CPS) is a complex system that integrates computing system,communication system,perceptual system,control system and physical system.Its running is a kind of hybrid behavior that discrete computing process and continuous physical process are closely interacted and deeply integrated.Concerning this feature,hybrid Petri net is used for modeling CPS and on this basis adding the time constraint,in other words,adding time delay to discrete places and adding a function of velocity to continuous places.At the same time,the concept of inhibitor arcs and test arc are introduced to improve the expression ability of Petri net.A new model called extended hybrid Petri Net was proposed.Then obstacles avoidance for unmanned vehicle system was modeled,according to some rules,the models were converted into corresponding Simulink models.Through the simulation of Matlab,the dynamic behaviors and attributes of systems were analyzed.
-
Method of Software Defined Network Path Abnormity Monitoring
李阳,蔡志平,夏竟. 一种SDN网络路径异常监控方法[J]. 计算机科学, 2017, 44(7): 25-30.
LI Yang, CAI Zhi-ping and XIA Jing. Method of Software Defined Network Path Abnormity Monitoring[J]. Computer Science, 2017, 44(7): 25-30. - LI Yang, CAI Zhi-ping and XIA Jing
- Computer Science. 2017, 44 (7): 25-30. doi:10.11896/j.issn.1002-137X.2017.07.005
- Abstract PDF(518KB) ( 974 )
- References | Related Articles | Metrics
-
In the SDN architecture,the controller has to master the operating state of network data transmission path segment,which is quite significant for controller to implement the network security monitoring and traffic load balancing.Based on the characteristics of SDN architecture,the paper proposed an approach which combines reactive mea-surement and passive measurement for monitoring the network path segment abnormity.The method analyzes the opera-ting state of network traversing path from two aspects of path’s latency and available bandwidth,which can also perform the detection and give an alarm for the abnormal network path segments.Our experiments show that the method can not only measure the latency and available bandwidth of path segment,but also can detect the abnormal path segment out timely and send out alarm signals.In network conditions of constant and variable network cross traffic,the approach can monitor the abnormal path segment and measure the path’s performance parameters efficiently.
-
Efficient Frequent Patterns Mining Algorithm Based on MapReduce Model
朱坤,黄瑞章,张娜娜. 一种基于MapReduce模型的高效频繁项集挖掘算法[J]. 计算机科学, 2017, 44(7): 31-37.
ZHU Kun, HUANG Rui-zhang and ZHANG Na-na. Efficient Frequent Patterns Mining Algorithm Based on MapReduce Model[J]. Computer Science, 2017, 44(7): 31-37. - ZHU Kun, HUANG Rui-zhang and ZHANG Na-na
- Computer Science. 2017, 44 (7): 31-37. doi:10.11896/j.issn.1002-137X.2017.07.006
- Abstract PDF(517KB) ( 739 )
- References | Related Articles | Metrics
-
Along with the rapid development of Internet and the rapid growing group of users,many Internet services companies have to manage TB size or higher amount of data every day.How to find useful information in this big data era is becoming an important problem.The data mining algorithm has been widely used in many fields,and finding frequent itemsets is one of the most common and primary applications of data mining,and Apriori algorithm is the most typical algorithm for finding frequent itemsets from a big transaction database.However,when the dataset size is rather huge or a single host is used,the memory would be quickly exhausted and the computation time would also increase dramatically,which make the algorithm performance inefficient.Parallel and distributed computing based on the MapReduce framework has been proposed.An improved reformative MMRA (Matrix MapReduce Algorithm) algorithm which should convert the blocked data into matrixs to find all frequent k-itemsets was proposed in this paper,and the proposed algorithm was compared with current two existed algorithms(one-phase algorithm and k-phase algorithm).Adapting Hadoop-MapReduce as the experiment platform,parallel and distributed computing offer a potential solution for processing vast amount of data.Experimental results show that the proposed algorithm outperforms the other two algorithms.
-
Modeling of CPS Based on Aspect-oriented Spatial-Temporal Petri Net
宋振华,张广泉. 基于AOP的时空Petri网的CPS建模[J]. 计算机科学, 2017, 44(7): 38-41.
SONG Zhen-hua and ZHANG Guang-quan. Modeling of CPS Based on Aspect-oriented Spatial-Temporal Petri Net[J]. Computer Science, 2017, 44(7): 38-41. - SONG Zhen-hua and ZHANG Guang-quan
- Computer Science. 2017, 44 (7): 38-41. doi:10.11896/j.issn.1002-137X.2017.07.007
- Abstract PDF(379KB) ( 747 )
- References | Related Articles | Metrics
-
As a tight integration of computing and physical processes,cyber-physical system (CPS) is the integration of cyber and physical worlds.According to the spatial-temporal and non-function properties in CPS,this paper presented a modeling approach based on aspect-oriented spatial-temporal Petri net.It separates core concern and crosscutting concerns from the system,and allows for analyzing crosscutting cores as aspect modules while ensuring the consistency of time and space.By building rules,these aspect modules will be woven into the system again.This approach can improve the reliability and maintainability for formal analysis of different non-function properties at the system design phase.At last,it is showed that the modeling approach is feasible through an example.
-
Classification Anonymity Algorithm Based on Weight Attributes Entropy
廖军,蒋朝惠,郭春,平源. 一种基于权重属性熵的分类匿名算法[J]. 计算机科学, 2017, 44(7): 42-46.
LIAO Jun, JIANG Chao-hui, GUO Chun and PING Yuan. Classification Anonymity Algorithm Based on Weight Attributes Entropy[J]. Computer Science, 2017, 44(7): 42-46. - LIAO Jun, JIANG Chao-hui, GUO Chun and PING Yuan
- Computer Science. 2017, 44 (7): 42-46. doi:10.11896/j.issn.1002-137X.2017.07.008
- Abstract PDF(409KB) ( 856 )
- References | Related Articles | Metrics
-
In order to efficiently protect data privacy being not leaked,which have high availability,a classification anony-mous method based on weight attributes entropy(WECA) was proposed.The method builds on application-specific background of data classification mining,and calculates the classification importance of different standard identifier to sensitive attribute by the concept of information entropy in the data set,which selects the highest ratio of weight attribu-tes entropy in classification quasi-identifier attributes to favorably divide the classification tree.The method also constructs the anonymous information loss measures of classification,which ensures the utility of classification on the premise of protecting privacy data.Finally,the experimental results on the standard data set show that the algorithm has fewer anonymous losses and higher classification accuracy,improving data availability.
-
Reconfiguring Multiprocessor Arrays for Synchronous Communication
吴亚兰,武继刚,姜文超,刘竹松. 面向通讯同步的多处理器阵列重构[J]. 计算机科学, 2017, 44(7): 47-56.
WU Ya-lan, WU Ji-gang, JIANG Wen-chao and LIU Zhu-song. Reconfiguring Multiprocessor Arrays for Synchronous Communication[J]. Computer Science, 2017, 44(7): 47-56. - WU Ya-lan, WU Ji-gang, JIANG Wen-chao and LIU Zhu-song
- Computer Science. 2017, 44 (7): 47-56. doi:10.11896/j.issn.1002-137X.2017.07.009
- Abstract PDF(755KB) ( 746 )
- References | Related Articles | Metrics
-
Reconfiguring VLSI arrays to get a logical array with given size and synchronous communication is one of the key problems in reconfigurable topology for high performance computing.This paper presented three algorithms based on three different strategies of excluding logical co-lumns.The first algorithm,named SCA_01,can make the logical co-lumns in the uniform distribution in the host array,based on the divide-and-conquer for excluding logical columns.The second algorithm,named SCA_02,can minimize the number of the long interconnects of the logical array,based on the excluding the long logical column in priority.The third algorithm,named SCA_03,keeps the logical columns distributed in uniform way based on the hybrid strategy from excluding the long logical column and divide-and-conquer.In addition,this paper contributed an algorithm to calculate the lower bound of the communication delay for the given logical array.Simulation results show that,the communication delay of the logical array reconstructed by three algorithms is close to the lower bound proposed in this paper,when fault rate is less than 1% and the exclusion rate of logical columns is over 20%.Algorithm SCA_01 is superior to SCA_02 and SCA_03 in most cases,while SCA_02 and SCA_03 have nearly the same performance.But SCA_02 is better on smaller arrays and SCA_03 is better on large arrays,when the fault rate and exclusion rate are relatively small.The communication delay generated by SCA_01 is less than that of SCA_02 and SCA_03 by 25% on 32×32 host arrays.Moreover,SCA_01 is faster than the other two algorithms,and the running time is saved by 19.4%.It is concluded that SCA_01 is one of the relatively desirable algorithms to generate the logical arrays with minimum communication delay for high performance computing.
-
Algebraic Properties of Quantitative Context-free Languages
付雯静,韩召伟. 量化上下文无关语言的代数性质[J]. 计算机科学, 2017, 44(7): 57-60.
FU Wen-jing and HAN Zhao-wei. Algebraic Properties of Quantitative Context-free Languages[J]. Computer Science, 2017, 44(7): 57-60. - FU Wen-jing and HAN Zhao-wei
- Computer Science. 2017, 44 (7): 57-60. doi:10.11896/j.issn.1002-137X.2017.07.010
- Abstract PDF(365KB) ( 647 )
- References | Related Articles | Metrics
-
By introducing the concepts of quantitative pushdown automata and quantitative context-free grammars,this paper investigated the equivalent relation that a quantitative language can be accepted by quantitative pushdown automatain two different ways.It is showed the fact that quantitative pushdown automata can accept the same quantitative context-free languages which are generated by quantitative context-free grammars over commutative double unital valuation monoid in the meanwhile.
-
Cloud Fault Tolerance Services Adaption Method Based on Requirement and Resource Constriction
杨娜,刘靖. 融合容错需求和资源约束的云容错服务适配方法[J]. 计算机科学, 2017, 44(7): 61-67.
YANG Na and LIU Jing. Cloud Fault Tolerance Services Adaption Method Based on Requirement and Resource Constriction[J]. Computer Science, 2017, 44(7): 61-67. - YANG Na and LIU Jing
- Computer Science. 2017, 44 (7): 61-67. doi:10.11896/j.issn.1002-137X.2017.07.011
- Abstract PDF(570KB) ( 725 )
- References | Related Articles | Metrics
-
In the environment of cloud computing,faults have become a normal behavior and the shortage of reliability safeguard not only has become the main obstacle of application promotions in cloud computing,but also has made fault tolerance services in cloud computing become a problem that need to be solved urgently.Aiming at solving the shortage study of fault tolerance services in cloud computing that the definition of user fault tolerance requirements can’t reflect reliability which was concerned by the users directly and the inflexible usage of the resources of cloud fault tolerance service providers,this paper proposed an adaption method of cloud fault tolerance services which was based on user requirement and resource constriction.This paper first defined the fault tolerance requirements of users from the prospective of users,which was conducted by taking a component as a unit and reliability as a basis.Then the optimal adaption method of fault tolerance services was studied from the perspective of cloud fault tolerance services providers under the condition of that the resources of fault tolerance service providers is insufficient or sufficient.This paper solved the fault tolerance services generated by the optimal adaption method using optimization theory.The results of the experiments showed that the fault tolerance services which were generated by our adaption method can better satisfy the requirements of users and cloud fault tolerance service providers.
-
Single-link Failure Protection Algorithm Based on Hop-by-Hop Routing
耿海军,施新刚,王之梁,尹霞,尹少平. 基于逐跳方式的单链路故障保护算法[J]. 计算机科学, 2017, 44(7): 68-73.
GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Single-link Failure Protection Algorithm Based on Hop-by-Hop Routing[J]. Computer Science, 2017, 44(7): 68-73. - GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping
- Computer Science. 2017, 44 (7): 68-73. doi:10.11896/j.issn.1002-137X.2017.07.012
- Abstract PDF(486KB) ( 616 )
- References | Related Articles | Metrics
-
When a link fails,the deployed intra-domain routing protocol need to re-convergen.During the process of re-convergence,packets which travel through the link will be dropped.Therefore,IETF proposed a framework,named IPFRR (IP Fast Re-Route),which can effectively reduce packet loss when a single-link failure occurs.However,IPFRR cannot provide complete protection against all single-link failure scenarios.Based on the framework,lots of IP-tunnel-based schemes have been proposed to solve the problem.However,these methods introduce extra overhead and need the assistance of an auxiliary mechanism.In this work,we aimed for hop-by-hop routing algorithm that can provide complete protection against all such single-link failure scenarios.
-
Opportunistic Forwarding Mechanism Based on Node Movement Tendencies Detecting
刘林峰,严禹道,吴国新. 一种基于节点移动倾向检测的社会网络机会转发机制[J]. 计算机科学, 2017, 44(7): 74-78.
LIU Lin-feng, YAN Yu-dao and WU Guo-xin. Opportunistic Forwarding Mechanism Based on Node Movement Tendencies Detecting[J]. Computer Science, 2017, 44(7): 74-78. - LIU Lin-feng, YAN Yu-dao and WU Guo-xin
- Computer Science. 2017, 44 (7): 74-78. doi:10.11896/j.issn.1002-137X.2017.07.013
- Abstract PDF(1554KB) ( 639 )
- References | Related Articles | Metrics
-
The nodes in the social network can be classified into two types as strong mobility and weak mobility.The MTBR (Mobile-Tendency Based Routing) algorithm was proposed.And MTBR introduces the concept of ‘Movement Tendency’ which associates the human movements with their behavior habits.The algorithm detects the movement tendencies of the strong mobility nodes and takes advantage of strong mobility nodes to forward the messages.The simu-lation results indicate that the movement tendency will be more apparent with a stronger mobility.Besides,compared with other algorithms,MTBR algorithm can effectively forward the messages to the ulterior area near the destination,and produce fewer message copies and achieve a higher delivery ratio.
-
Adaptive Correction Model Location Algorithm Based on CSI
田丽玟,冯秀芳. 基于CSI的自适应修正模型定位算法[J]. 计算机科学, 2017, 44(7): 79-83.
TIAN Li-wen and FENG Xiu-fang. Adaptive Correction Model Location Algorithm Based on CSI[J]. Computer Science, 2017, 44(7): 79-83. - TIAN Li-wen and FENG Xiu-fang
- Computer Science. 2017, 44 (7): 79-83. doi:10.11896/j.issn.1002-137X.2017.07.014
- Abstract PDF(500KB) ( 925 )
- References | Related Articles | Metrics
-
Currently,WLAN-based indoor fingerprinting positioning system has been attractived owing to the advantages of open access and high accuracy.For the shortage that matching features do not consider the current environment variables for the reference environment in positioning stage of traditional indoor fingerprinting positioning systems,a novel CSI-based adaptive correction model location algorithm was proposed.The algorithm is used to indicate sub-carrier fluctuation level with the increasing of the number of people in indoor environment by introducing a indicator called PEM(Percentage of nonzero Elements),which can measure the changes of current indoor environment.At the same time,the algorithm also designs a new positioning correction matching model to compensate fingerprinting characteristic attenuation caused by multipath.Experiments have fully demonstrated that the new positioning scheme has an accuracy improvement of 30% and 15% respectively over previous fingerprint positioning system FIFS and CSI-MIMO.
-
Impact of Path Loss Exponent on Interference and Carrier Sensing Performance Metrics of 802.11 WLANs
王悦. 路径损耗对802.11无线局域网干扰与载波监听性能的影响研究[J]. 计算机科学, 2017, 44(7): 84-88.
WANG Yue. Impact of Path Loss Exponent on Interference and Carrier Sensing Performance Metrics of 802.11 WLANs[J]. Computer Science, 2017, 44(7): 84-88. - WANG Yue
- Computer Science. 2017, 44 (7): 84-88. doi:10.11896/j.issn.1002-137X.2017.07.015
- Abstract PDF(1187KB) ( 1117 )
- References | Related Articles | Metrics
-
We analyzed how path loss exponent affects the interference and carrier sensing performance of 802.11 WLANs and revealed the advantages of larger path loss exponent.This work is based on the SNR threshold reception model and fixed carrier sensing thresholds,and the main bit rates of 802.11a/b/g/n are considered.Firstly,increasing path loss exponent increases SIR and decreases interference range.Secondly,the optimal network capacity increases with the path loss exponent.Thirdly,analysis and simulation reveal that larger path loss exponent results in larger carrier sensing accuracy.The performance of WLANs improves in cities because dense buildings and population increase path loss exponent.
-
LDPC Coded Primary Transmitter Authentication Schemes in Cognitive Radio Networks
周雪倩,吴晓富,余训健. 融入LDPC纠错机制的认知无线电物理层认证分析[J]. 计算机科学, 2017, 44(7): 89-93.
ZHOU Xue-qian, WU Xiao-fu and YU Xun-jian. LDPC Coded Primary Transmitter Authentication Schemes in Cognitive Radio Networks[J]. Computer Science, 2017, 44(7): 89-93. - ZHOU Xue-qian, WU Xiao-fu and YU Xun-jian
- Computer Science. 2017, 44 (7): 89-93. doi:10.11896/j.issn.1002-137X.2017.07.016
- Abstract PDF(349KB) ( 741 )
- References | Related Articles | Metrics
-
In this paper,the capacity of embedded primary transmitter authentication channel in cognitive radio is investigated.By employing the log-likelihood ratios(LLRs) of a tag bit and its approximation,we showed that the equivalent authentication channel observed by the secondary receiver can be viewed as a binary-input additive white Gaussian noise(BI-AWGN) channel.Then,we investigated the practical performance of the embedded authentication channel with the use of LDPC coding.With the approximate form of LLRs,we found that it performs very close to that of belief propagation decoding over the ideal BI-AWGN channel.Hence,we concluded that a good error-control coding scheme for a BI-AWGN channel is also good for embedded primary transmitter authentication channel,and the proposed approximate form of LLRs can be well exploited to facilitate the computation in practice with low complexity.
-
De-jitter Dynamic Slot Allocation Algorithm Based on Cluster Analysis
于明秋,周创明,赵敏. 基于聚类分析的抗时延抖动时隙分配算法[J]. 计算机科学, 2017, 44(7): 94-97.
YU Ming-qiu, ZHOU Chuang-ming and ZHAO Min. De-jitter Dynamic Slot Allocation Algorithm Based on Cluster Analysis[J]. Computer Science, 2017, 44(7): 94-97. - YU Ming-qiu, ZHOU Chuang-ming and ZHAO Min
- Computer Science. 2017, 44 (7): 94-97. doi:10.11896/j.issn.1002-137X.2017.07.017
- Abstract PDF(318KB) ( 684 )
- References | Related Articles | Metrics
-
Instantaneity of information transmission is a prominent feature of tactical data link.Data chain communication is requited possessing good delay feature as well as reliable delay jitter performance.The generation of random message flow possesses characteristics of randomness and abruptness,and should dynamically allocate timeslot in accor-dance with demands,which requires a high real-time capability for algorithm.Therefore,a de-jitter dynamic slot allocation algorithm based on cluster analysis was proposed and the clustering method was adopted to divide idle timeslot into slot cluster,which can thus simplify the analysis process of slot allocation.The simulation result shows that timeslot allocated by the algorithm can meet the requirement of delay jitter and the algorithm is of low complexity which can settle timeslot assignment of periodic random message flow efficiently.
-
Multi-user Cooperative Power Control Allocation Scheme for D2D Cellular System Based on Noise Model
杨大禹,李敬兆,任萍. 基于噪声模型下D2D蜂窝系统的多用户合作功率控制分配方案[J]. 计算机科学, 2017, 44(7): 98-103.
YANG Da-yu, LI Jing-zhao and REN Ping. Multi-user Cooperative Power Control Allocation Scheme for D2D Cellular System Based on Noise Model[J]. Computer Science, 2017, 44(7): 98-103. - YANG Da-yu, LI Jing-zhao and REN Ping
- Computer Science. 2017, 44 (7): 98-103. doi:10.11896/j.issn.1002-137X.2017.07.018
- Abstract PDF(445KB) ( 665 )
- References | Related Articles | Metrics
-
In order to alleviate the interference between the D2D users and improve throughput of the whole cellular system during the process of communication,according to the number of D2D users,channel conditions and the limitation of the system throughput requirements,the problem of multi-user transmission power control under the interfe-rence noise model constraint was analyzed.The interference model was constrained by introducing the Boltzmann’s constant and other parameters,and the utility-based of system average transmit power and maximum sum rate was got finally.What’s more,the power control allocation scheme of multi-user cooperation game based on the reverse iteration combining algorithm was put forward.Simulation results show that the algorithm satisfies the power allocation requirements under the multi-user shared cellular network spectrum resource,when the transmit power of end-user reaches the Nash equilibrium after several reverse iterations,the throughput of system is improved significantly,and the spectrum resource achieves a well-balanced earnings.
-
Quantum Multi-proxy Blind Signature Protocol
姚洪迪,邹海. 量子多重代理盲签名协议[J]. 计算机科学, 2017, 44(7): 104-106.
YAO Hong-di and ZOU Hai. Quantum Multi-proxy Blind Signature Protocol[J]. Computer Science, 2017, 44(7): 104-106. - YAO Hong-di and ZOU Hai
- Computer Science. 2017, 44 (7): 104-106. doi:10.11896/j.issn.1002-137X.2017.07.019
- Abstract PDF(279KB) ( 663 )
- References | Related Articles | Metrics
-
In most cases,the original signer only needs to entrust one proxy to sign the file.But in order to decentralize the proxy signer’s rights,more proxies are invited to make a proxy signature on the file.Based on this situation,a quantum multi-proxy blind signature protocol was proposed.The protocol,which makes use of the link between Bell state and Bell measurement,can make the original signer entrust more proxies to have a signature on the file,but also the number of signers can be changed according to actual needs,which increasingly improves the flexibility of the scheme.The security analysis shows that the protocol can resist both internal attacks and external attacks,and it is a safe and achievable protocol.
-
Method to Construct Secure S-boxes Based on Multimap
曹晓梅,陈海山,王少辉. 基于多重映射的安全S盒构造方法[J]. 计算机科学, 2017, 44(7): 107-110.
CAO Xiao-mei, CHEN Hai-shan and WANG Shao-hui. Method to Construct Secure S-boxes Based on Multimap[J]. Computer Science, 2017, 44(7): 107-110. - CAO Xiao-mei, CHEN Hai-shan and WANG Shao-hui
- Computer Science. 2017, 44 (7): 107-110. doi:10.11896/j.issn.1002-137X.2017.07.020
- Abstract PDF(1108KB) ( 869 )
- References | Related Articles | Metrics
-
The problem of constructing S-boxs was transformed to a problem of searching for the mapping of certain conditions.Using the chaotic characteristics of Tent map,we proposed initial mapping algorithm to get the initial mappings which can be used as initial S-boxes.In order to improve the security of S-boxs,multimap algorithm was proposed which using multiple initial mappings to do nonlinear operations on S-boxs.According to security criteria,the proposed algorithm can obtain stronger S-boxes.At last,by setting a security index,the number of strong S-boxes generated by the algorithm was counted.The results of analysis show that the number of strong S-boxes increases with the increase of the number of initial mappings used in multimap algorithm,and the time cost is proportional to the number of initial mappings used in multimap algorithm.
-
Ultra-lightweight Mutual Authentication Protocol for Mobile Radio Frequency Identification
黄琪,凌捷. 一种超轻量级移动射频识别的双向认证协议[J]. 计算机科学, 2017, 44(7): 111-115.
HUANG Qi and LING Jie. Ultra-lightweight Mutual Authentication Protocol for Mobile Radio Frequency Identification[J]. Computer Science, 2017, 44(7): 111-115. - HUANG Qi and LING Jie
- Computer Science. 2017, 44 (7): 111-115. doi:10.11896/j.issn.1002-137X.2017.07.021
- Abstract PDF(411KB) ( 585 )
- References | Related Articles | Metrics
-
Aiming at the security problem between the reader and back-end server of mobile radio frequency identification caused by wireless transmission,an ultra-lightweight mutual authentication protocol for mobile radio frequency identification are proposed.In the protocol,the tag pseudonyms and key label are dynamically updated by cascade operation,which can effectively hide the true identity of the tag.And the cyclic check function is used for identity authentication between the tag,reader and back-end server,which can achieve the system mutual authentication.Security analysis shows that the proposed protocol can resist many kinds of malicious attacks,such as tracking attack, impersona-tion attack,replay attack,man-in-the-middle attack and so on.Compared with several existing protocol,the protocol reduces the computational and communication costs of the label,which are of high security and low cost.
-
Differential Fault Analysis on DBlock Cipher Algorithm
李浪,邹祎,李株华,刘波涛. DBlock密码算法差分故障分析[J]. 计算机科学, 2017, 44(7): 116-119.
LI Lang, ZOU Yi, LI Zhu-hua and LIU Bo-tao. Differential Fault Analysis on DBlock Cipher Algorithm[J]. Computer Science, 2017, 44(7): 116-119. - LI Lang, ZOU Yi, LI Zhu-hua and LIU Bo-tao
- Computer Science. 2017, 44 (7): 116-119. doi:10.11896/j.issn.1002-137X.2017.07.022
- Abstract PDF(1072KB) ( 724 )
- References | Related Articles | Metrics
-
DBlock algorithm is a new type of block cipher algorithm proposed in 2015. The packet length and its corresponding key length are 128bit,192bit and 256bit,with 20-round iterations of each.Based on byte fault model,the differential fault analysis on the DBlock was used on the key expansion to import a random fault in the 17th round.Experimental results show that the analysis can recover its primitive 128bit key only by introducing four fault ciphertexts.
-
Self-adaptive Approach for Container-based Cloud Resources Management
树岸,彭鑫,赵文耘. 基于容器技术的云计算资源自适应管理方法[J]. 计算机科学, 2017, 44(7): 120-127.
SHU An, PENG Xin and ZHAO Wen-yun. Self-adaptive Approach for Container-based Cloud Resources Management[J]. Computer Science, 2017, 44(7): 120-127. - SHU An, PENG Xin and ZHAO Wen-yun
- Computer Science. 2017, 44 (7): 120-127. doi:10.11896/j.issn.1002-137X.2017.07.023
- Abstract PDF(677KB) ( 830 )
- References | Related Articles | Metrics
-
Under the support of cloud computing,more and more applications choose cloud platform as their deployment platform.In order to respond to changing workloads,application scenarios,and user target,service providers need to dynamically adjust the existing resources in a scalable way.However,cloud platform resource management approach via virtual machine has many drawbacks.Virtual machines are heavyweight,it is not suitable for fine-grained and flexible allocation of resources.Meanwhile in the hybrid cloud background,the virtual machines can not migrate quickly.Container technology,to some extent,can make up for the lack of a virtual machine.However,traditional resource management method based on the virtual machine is not very suitable for container technology.To solve the above problems,this approach designed resources infrastructure solution and scheduling way which are more suitable to container.This approach models cloud resources precisely via nonlinear function,and could tune parameters using genetic algorithms,in order to optimize the performance of adjustment.This approach also computed rational allocation of container deployment location to improve physical resource utilization.In addition to that,this approach combines many bottom characteristics of container to adjust the procedure of load-balancing.We also conducted experiments to verify the effectiveness of the method.
-
Formal Method for Describing Software Evolution Ability Feature
何云,王炜,李彤. 一种形式化的软件可演化性特征描述方法[J]. 计算机科学, 2017, 44(7): 128-136.
HE Yun, WANG Wei and LI Tong. Formal Method for Describing Software Evolution Ability Feature[J]. Computer Science, 2017, 44(7): 128-136. - HE Yun, WANG Wei and LI Tong
- Computer Science. 2017, 44 (7): 128-136. doi:10.11896/j.issn.1002-137X.2017.07.024
- Abstract PDF(1276KB) ( 545 )
- References | Related Articles | Metrics
-
The liveness and safety are the most important basis for judging software systems evolution ability.The exi-sting modeling methods use classical logic to describe the liveness and safety of systems.The complexity of the environment and stakeholders leads to conflicting input when analyzing software evolution ability.Because of the non-contradiction law,classical logic can’t model the software system evolution ability effectively.Aiming at this problem,a formal method for describing the software evolution ability was proposed.The method allows contradictions,and can be used for modeling and analyzing systems with contradictions such as software evolution ability.The method uses multi-value temporal logic to describe software system evolution requirements,and proposes a software abstraction model to model software system.It can describe software system evolution ability by analyzing SAM’s liveness and safety.
-
Applications of Fibrations Theory to Uncertainty Semantic Computation for Indexed Inductive Data Types
苗德成,奚建清,刘新盛,苏锦钿. Fibrations理论在索引归纳数据类型不确定语义中的应用[J]. 计算机科学, 2017, 44(7): 137-140.
MIAO De-cheng, XI Jian-qing, LIU Xin-sheng and SU Jin-dian. Applications of Fibrations Theory to Uncertainty Semantic Computation for Indexed Inductive Data Types[J]. Computer Science, 2017, 44(7): 137-140. - MIAO De-cheng, XI Jian-qing, LIU Xin-sheng and SU Jin-dian
- Computer Science. 2017, 44 (7): 137-140. doi:10.11896/j.issn.1002-137X.2017.07.025
- Abstract PDF(337KB) ( 847 )
- References | Related Articles | Metrics
-
This paper discussed the uncertainty semantic computation of indexed inductive data types using Fibrations theory.Firstly,we demonstrated the construction of indexed category,presented the concept of indexed Fibration and its truth and comprehension functors.And then,we proposed a truth-preserving lifting on endo-functor in indexed category.We also presented the definition of partial F-algebra,abstractly described the uncertainty semantic computation of indexed inductive data types using some tools including fold function,and briefly introduced the application by example.At last,we stated the advantages of Fibrations theory by comprising with some related works.
-
Method of Software Architecture Refinement Based on Algebraic Semantics
林雷蕾,周华,代飞,何臻力,沈勇,康洪炜. 一种基于代数语义的软件体系结构求精方法[J]. 计算机科学, 2017, 44(7): 141-146.
LIN Lei-lei, ZHOU Hua, DAI Fei, HE Zhen-li, SHEN Yong and KANG Hong-wei. Method of Software Architecture Refinement Based on Algebraic Semantics[J]. Computer Science, 2017, 44(7): 141-146. - LIN Lei-lei, ZHOU Hua, DAI Fei, HE Zhen-li, SHEN Yong and KANG Hong-wei
- Computer Science. 2017, 44 (7): 141-146. doi:10.11896/j.issn.1002-137X.2017.07.026
- Abstract PDF(1336KB) ( 609 )
- References | Related Articles | Metrics
-
Software architecture is a bridge to connect the requirements and achievements.At present,there are two approaches to model architecture,which are formal and informal.In order to strike a balance between convenient operation and accuracy,we applied Petri nets to model the architecture of large and complex systems,especially in distributed system.First of all,this paper proposed a top-down approach for refining transitions by subnets in Petri nets.This method can establish hierarchical structure model of the complex system.In addition,the method effectively solves the problem of state space explosion.Moreover,we used process algebra to define the algebraic semantics of the behavior of Petri nets,which can guarantee the consistency of behavior between the subnets and the specification.Besides,we gave an algorithm for transforming a process term into a subnet.Finally,a case study was given to verify the correctness of above ideas through open source tools.
-
Web Resource Recommendation Based on Analysis of Developer’s Behavior
杨君雯,王海,彭鑫,赵文耘. 基于开发者行为分析的Web资源推荐[J]. 计算机科学, 2017, 44(7): 147-150.
YANG Jun-wen, WANG Hai, PENG Xin and ZHAO Wen-yun. Web Resource Recommendation Based on Analysis of Developer’s Behavior[J]. Computer Science, 2017, 44(7): 147-150. - YANG Jun-wen, WANG Hai, PENG Xin and ZHAO Wen-yun
- Computer Science. 2017, 44 (7): 147-150. doi:10.11896/j.issn.1002-137X.2017.07.027
- Abstract PDF(355KB) ( 688 )
- References | Related Articles | Metrics
-
Modern integrated development environment (IDE) provides developers with a variety of tools,including error warning,code complementary,code analysis,version control management,etc.,to support software development and improve the developers’ efficiency.However,such tools are deficient,as much more information,such as code sample,configure manifest,and error handling,is needed during development,and frequently switching between Web browser and IDE costs time and effort.A Web information resource recommendation method was proposed,which is based on the analysis of developer’s behavior.The method extracts structured information including code samples from the developers’ browsing history,and classifies them through text clustering.At the same time,the developer’s behavior in the IDE was recorded.The relationship between WEB resources and developer’s behavior will be established so that similar information can be recommended when the same situation happens.At last,an experiments was conducted to demonstrate that our method can save developing time efficiently.
-
Study of Complex Event Hierarchies Realization Based on Hierarchical Automata Model
金大卫,施斯,易彩,杨兵. 基于层次自动机模型的复杂事件层次实现研究[J]. 计算机科学, 2017, 44(7): 151-160.
JIN Da-wei, SHI Si, YI Cai and YANG Bing. Study of Complex Event Hierarchies Realization Based on Hierarchical Automata Model[J]. Computer Science, 2017, 44(7): 151-160. - JIN Da-wei, SHI Si, YI Cai and YANG Bing
- Computer Science. 2017, 44 (7): 151-160. doi:10.11896/j.issn.1002-137X.2017.07.028
- Abstract PDF(804KB) ( 683 )
- References | Related Articles | Metrics
-
Complex event processing technology extracts event sequences which satisfy the specific patterns (called complex events) from continuous event streams.It processes a large sum of data in real time intelligently and has attracted the attention from both academia and industry in recent years.However,the state-of-the-art researches focus on single-layer complex event detection.In fact,because business systems have different hierarchical needs of information,events in system should be processed according to their hierarchies.Single-layer complex event detection cannot afford to meet the needs of hierarchical information in different managerial hierarchies.To deal with such problem,in this work,a hierarchical complex event detection model,hierarchical automata,was defined based on the concept of event hierarchies and traditional nondeterministic finite automaton (NFA) model.Then we designed a more intuitive and effective EH-Tree structure and proposed hierarchical complex event detection (HCED) algorithm and its cost model.Finally,taking throughput and memory consumption as indexes,massive experiments were performed to compare the spatial and temporal performance of HCED algorithm based on EH-Tree and SASE algorithm based on NFA.The results testify that our HCED algorithm can perform hierarchical complex event detection effectively and efficiently,which fills in the blanks of hierarchical complex event detection and indicates that our work can be a basis for further research of complex event processing.
-
Relational Database Energy Prediction Model Based on MBRC
杨德先,孙华,于炯,国冰磊. 一种基于MBRC值的关系型数据库负载能耗预测模型[J]. 计算机科学, 2017, 44(7): 161-166.
YANG De-xian, SUN Hua, YU Jiong and GUO Bing-lei. Relational Database Energy Prediction Model Based on MBRC[J]. Computer Science, 2017, 44(7): 161-166. - YANG De-xian, SUN Hua, YU Jiong and GUO Bing-lei
- Computer Science. 2017, 44 (7): 161-166. doi:10.11896/j.issn.1002-137X.2017.07.029
- Abstract PDF(513KB) ( 564 )
- References | Related Articles | Metrics
-
Power modeling and power profiling of database workload are the foundation of building energy-aware DBMS.To solve the high energy consumption problem of database workload,this paper proposed a method of building energy prediction model for database workload by mapping resource consumption of the main components(CPU and Disk) to their power and time cost.Firstly,power cost of workload is estimated according to their resource consumption pattern.Secondly,energy cost of workload is estimated by combing the power cost and time cost derived from the resource consumption pattern.And finally,a deep research of the model prediction accuracy is conducted by using the MBRC settings.Experimental results show that,the proposed energy prediction modeling method can make accurate estimation of workload energy cost,and the research on accuracy of model prediction can improve the reliability and accuracy of the energy modeling method under different system settings.
-
Partially-lazy Learning Classification Algorithm Based on Representation of Data Stream Model
江晶晶,王志海,原继东. 一种基于数据流模式表示的半懒惰式分类算法[J]. 计算机科学, 2017, 44(7): 167-174.
JIANG Jing-jing, WANG Zhi-hai and YUAN Ji-dong. Partially-lazy Learning Classification Algorithm Based on Representation of Data Stream Model[J]. Computer Science, 2017, 44(7): 167-174. - JIANG Jing-jing, WANG Zhi-hai and YUAN Ji-dong
- Computer Science. 2017, 44 (7): 167-174. doi:10.11896/j.issn.1002-137X.2017.07.030
- Abstract PDF(712KB) ( 595 )
- References | Related Articles | Metrics
-
Utilizing patterns extracted from large scale data to build classification model is one of important research problems.Exploiting patterns to estimate Bayesian probability is a feasible approach.However,most of the existing pattern-based Bayesian classifiers aim at static data set,which cannot adapt to the dynamic data stream environment.A Bayesian classification model,named PBDS(Pattern-based Bayesian classifier for Data Stream),based on pattern discove-ry over data streams was proposed.PBDS constructs local model for unseen case based on continuously updated frequent item sets with partially-lazy learning method.To accelerate data processing,the simpler data structure,i.e.,hybrid trees structure was proposed,and pattern extracting mechanism was proposed to reduce the generation of candidate itemsets.Smoothing technique was used to handle incomplete itemset extraction in the data stream.Extensive experiments on real-world and synthetic data streams show that PBDS is more accurate than state-of-the-art data stream classifiers.
-
Emerging Sequences Pattern Mining Based on Location Information
陈湘涛,肖碧文. 基于位置信息的显露序列模式挖掘研究[J]. 计算机科学, 2017, 44(7): 175-179.
CHEN Xiang-tao and XIAO Bi-wen. Emerging Sequences Pattern Mining Based on Location Information[J]. Computer Science, 2017, 44(7): 175-179. - CHEN Xiang-tao and XIAO Bi-wen
- Computer Science. 2017, 44 (7): 175-179. doi:10.11896/j.issn.1002-137X.2017.07.031
- Abstract PDF(374KB) ( 649 )
- References | Related Articles | Metrics
-
Owing to the strong ability of distinguishing,emerging patterns have been widely used to build defective classifier.As most of the existing algorithms focus on the support or the occurrences of sequence patterns,and the location of the sequence patterns in a sequence is usually ignored,some important information may be missed.In this paper,we put forward an emerging sequence pattern with local location information,and a mining algorithm of the emerging sequence pattern with location information.Based on the framework of occurrences,combined with the suffix tree,omitting the generation and selection procedure of candidate patterns,this algorithm can quickly and efficiently mine emerging sequence patterns with the location information.The experimental results show that the classifier which is built by emerging sequence patterns with location information is better than the traditional algorithm of mining the emerging sequence patterns on the average classification accuracy.
-
Research on Recommendation Method of Restaurant Based on LDA Model
张晓阳,秦贵和,邹密,孙铭会,高庆洋. 基于LDA模型的餐厅推荐方法研究[J]. 计算机科学, 2017, 44(7): 180-184.
ZHANG Xiao-yang, QIN Gui-he, ZOU Mi, SUN Ming-hui and GAO Qing-yang. Research on Recommendation Method of Restaurant Based on LDA Model[J]. Computer Science, 2017, 44(7): 180-184. - ZHANG Xiao-yang, QIN Gui-he, ZOU Mi, SUN Ming-hui and GAO Qing-yang
- Computer Science. 2017, 44 (7): 180-184. doi:10.11896/j.issn.1002-137X.2017.07.032
- Abstract PDF(447KB) ( 976 )
- References | Related Articles | Metrics
-
With the rapid development of the network,the amount of the evaluation information of the food and bevera-ge has increased dramatically.The effective analysis of the evaluation information can not only help the consumers choose the suitable restaurant,but also help the businesses improve service.For this purpose,a restaurant recommendation method based on LDA(Dirichlet Allocation Latent) model was proposed.First of all,it classifies the evaluation information according to the emotional tendencies,and then gets the positive evaluation and praise rate.Secondly,it manipulates the LDA model for text clustering to generate restaurant tags.Finally,it calculates the similarity between the user’s needs and the restaurant tags,and according to the similarity and the rate of praise,recommends the suitable restaurants to customers.We got the real food and beverage comments from the Internet,and carried out the experiment.As a result,the effect of the restaurant tags produced from this method is good,which could accurately recommend the restaurants to users.
-
Adaptive Multiclass Boosting Classification Algorithm
王世勋,潘鹏,陈灯,卢炎生. 一种自适应的多类Boosting分类算法[J]. 计算机科学, 2017, 44(7): 185-190.
WANG Shi-xun, PAN Peng, CHEN Deng and LU Yan-sheng. Adaptive Multiclass Boosting Classification Algorithm[J]. Computer Science, 2017, 44(7): 185-190. - WANG Shi-xun, PAN Peng, CHEN Deng and LU Yan-sheng
- Computer Science. 2017, 44 (7): 185-190. doi:10.11896/j.issn.1002-137X.2017.07.033
- Abstract PDF(492KB) ( 833 )
- References | Related Articles | Metrics
-
Many practical problems have involved classification technology which can effectively reduce the comprehension difference between users and computers.In the traditional multiclass Boosting methods,multiclass loss function does not necessarily have guess-aversion,and the combinations of multiclass weak learners are confined to linear weighted sum.To get a final classifier with high accuracy,multiclass loss function need contain three main properties,namely margin maximization,Bayes consistency and guess-aversion.Moreover,the weakness of weak learners may limit the performance of linear classifier,but their nonlinear combinations should provide strong discrimination.Therefore,we designed an adaptive multiclass Boosting classifier,namely SOHPBoost algorithm.At every iteration,our algorithm can add the best weak learner to the current ensemble according to vector addition or Hadamard product.This adaptive process can create the sum of Hadamard products of weak learners,and mine the hidden structure of dataset.The experi-ments show that SOHPBoost algorithm can provide more advantageous performance of multiclass classification.
-
Micro-blog Retweet Behavior Prediction Algorithm Based on Anomaly Detection and Random Forest
周先亭,黄文明,邓珍荣. 融合异常检测与随机森林的微博转发行为预测方法[J]. 计算机科学, 2017, 44(7): 191-196.
ZHOU Xian-ting, HUANG Wen-ming and DENG Zhen-rong. Micro-blog Retweet Behavior Prediction Algorithm Based on Anomaly Detection and Random Forest[J]. Computer Science, 2017, 44(7): 191-196. - ZHOU Xian-ting, HUANG Wen-ming and DENG Zhen-rong
- Computer Science. 2017, 44 (7): 191-196. doi:10.11896/j.issn.1002-137X.2017.07.034
- Abstract PDF(680KB) ( 530 )
- References | Related Articles | Metrics
-
Aiming to solve the issue that the accuracy of micro-blog retweet behavior prediction is not good enough and features are selected with an arbitrary choice,a new method using anomaly detection and random forest algorithms to predict micro-blog retweet behavior was proposed.Firstly,the basic features of the user,the basic characteristics of blog and blog content theme features are extracted,and the user activity and blog influence are calculated based on relative entropy.Secondly,the best feature set are selected by combining the filter and wrapper feature selection method.Finally,anomaly detection and random forest algorithms are fused to predict micro-blog retweet behavior based on selected features.The algorithm parameters of random forest are selected by analyzing the error estimation of out of bag data.By contrasting with Logistic Regression,Decision Tree,Naive Bias and Random Forest algorithms,which are used in the analysis for micro-blog retweet behavior,the prediction accuracy of the proposed method is higher than that of the optimal random forest method on real data,and reaches 90.5%.Meanwhile,the validity of feature selection method is verified.
-
Community Detection Based on User Interaction and Link Analysis in Social Networks
李鹏,李英乐,王凯,何赞园,李星,常振超. 基于交互行为和连接分析的社交网络社团检测[J]. 计算机科学, 2017, 44(7): 197-202.
LI Peng, LI Ying-le, WANG Kai, HE Zan-yuan, LI Xing and CHANG Zhen-chao. Community Detection Based on User Interaction and Link Analysis in Social Networks[J]. Computer Science, 2017, 44(7): 197-202. - LI Peng, LI Ying-le, WANG Kai, HE Zan-yuan, LI Xing and CHANG Zhen-chao
- Computer Science. 2017, 44 (7): 197-202. doi:10.11896/j.issn.1002-137X.2017.07.035
- Abstract PDF(505KB) ( 787 )
- References | Related Articles | Metrics
-
With the rapid development of social media network,the user is also more convenient to participate in social networking,which also brings a large number of complex interaction and connection mode.How to effectively analysis the interactive information and the connection information between network nodes to complete the efficient community detection is the key problem faced by current network analysis.Based on this,this paper put forward a kind of social network community detection method(CDUILS) based on the interaction behavior and link analysis.In this method,the interaction information between nodes is used as the cooperative learning of the community.The non negative matrix factorization is used to analyze the two types of information sources by the way of iterative update,and the community results can be obtained with two kinds of information retrieval.Experiments on real data sets show that the proposed method can effectively utilize the interaction behavior to guide the community division and have better quality of community division.
-
Improved Water Wave Optimization Algorithm with Adaptive Control Parameters
刘翱,邓旭东,李维刚. 基于自适应控制参数的改进水波优化算法[J]. 计算机科学, 2017, 44(7): 203-209.
LIU Ao, DENG Xu-dong and LI Wei-gang. Improved Water Wave Optimization Algorithm with Adaptive Control Parameters[J]. Computer Science, 2017, 44(7): 203-209. - LIU Ao, DENG Xu-dong and LI Wei-gang
- Computer Science. 2017, 44 (7): 203-209. doi:10.11896/j.issn.1002-137X.2017.07.036
- Abstract PDF(1949KB) ( 936 )
- References | Related Articles | Metrics
-
Water wave optimization algorithm(WWO) is a novel population-based optimization algorithm.Despite of its advantages with few controllable parameters,simple operations,and easy implementation,it still risks slow convergence rate and low search precision.To mitigate the aforementioned risks,firstly,a concise yet powerful theoretical analysis was carried out to derive the convergence condition that the control algorithm parameters should satisfy.Then,an improved WWO was proposed to meet the above conditions by incorporating an adaptive algorithm parameters tuning strategy,and it’s expected to further enhance the capability of balancing between global exploration and local exploitation via this strategy.Finally,simulation experiments and statistical comparisons between four algorithms(ApWWO,WWO,FA,MVO) on 10 benchmark functions were conducted.The results show that ApWWO performs significantly better than WWO and FA in terms of search accuracy,speed and robustness,as well as outperforms MVO in five test function.Compared with PSO and GA,ApWWO can yield good performance,which can be affected by the problem’s dimension and population size,and ApWWO also performs well on the permutation flow shop scheduling problem.
-
K-Nearest Neighbor Algorithm Based on Hash Technology and MapRecuce
翟俊海,张明阳,王婷婷,郝璞. 基于哈希技术和MapReduce的大数据集K-近邻算法[J]. 计算机科学, 2017, 44(7): 210-214.
ZHAI Jun-hai, ZHANG Ming-yang, WANG Ting-ting and HAO Pu. K-Nearest Neighbor Algorithm Based on Hash Technology and MapRecuce[J]. Computer Science, 2017, 44(7): 210-214. - ZHAI Jun-hai, ZHANG Ming-yang, WANG Ting-ting and HAO Pu
- Computer Science. 2017, 44 (7): 210-214. doi:10.11896/j.issn.1002-137X.2017.07.037
- Abstract PDF(379KB) ( 706 )
- References | Related Articles | Metrics
-
K-nearest neighbor(K-NN) is a famous classification algorithm.Because the idea of K-NN is simple and it is easy to implement,K-NN has been widely applied to many fields,such as face recognition,gene classification and decision making,etc.However,in the big data environment,the efficiency of K-NN is very low,even it is not workable.In order to deal with this problem,based on hash technology and MapRecuce,this paper proposed an improved K-nearest neighbor algorithm.In order to verify the effectiveness of the proposed algorithm,some experiments were conducted on 4 big data sets.The experimental results show that the proposed algorithm is effective and efficient.
-
Shortest Path Network Routing Optimization Algorithm Based on Improved ITO Algorithm
满振祯,余世明,何德峰. 基于改进伊藤算法的最短路径网络路由优化算法[J]. 计算机科学, 2017, 44(7): 215-220.
MAN Zhen-zhen, YU Shi-ming and HE De-feng. Shortest Path Network Routing Optimization Algorithm Based on Improved ITO Algorithm[J]. Computer Science, 2017, 44(7): 215-220. - MAN Zhen-zhen, YU Shi-ming and HE De-feng
- Computer Science. 2017, 44 (7): 215-220. doi:10.11896/j.issn.1002-137X.2017.07.038
- Abstract PDF(495KB) ( 804 )
- References | Related Articles | Metrics
-
Through the analysis of shortest path problem on network routing,we built the network model of the shortest path routing problem by using ITO algorithm to get the lowest cost route optimization target.To speed up ITO lowest routing algorithm’s convergence speed,the proposed algorithm involves cost inspired factor in the state transition strategy,and hence improves path weight updating rules.The convergence speed and optimization capability are enhanced simultaneously by introducing the method of population cross and using the information exchange between populations.A 2-opt operator-based inversion operator is adopted to optimize the algorithm and to avoid falling into local optimal solution.The astringency of the algorithm was also analyzed systematically.The case study illustrates that the improved algorithm is effective to speed up the convergence speed and enhance optimization capability.
-
Detecting Community from Bipartite Network Based on Generalized Suffix Tree
邹凌君,陈崚,戴彩艳. 基于广义后缀树的二分网络社区挖掘算法[J]. 计算机科学, 2017, 44(7): 221-226.
ZOU Ling-jun, CHEN Ling and DAI Cai-yan. Detecting Community from Bipartite Network Based on Generalized Suffix Tree[J]. Computer Science, 2017, 44(7): 221-226. - ZOU Ling-jun, CHEN Ling and DAI Cai-yan
- Computer Science. 2017, 44 (7): 221-226. doi:10.11896/j.issn.1002-137X.2017.07.039
- Abstract PDF(463KB) ( 646 )
- References | Related Articles | Metrics
-
In recent years,the problem of detecting communities from bipartite network has drawn much attention of researchers.This paper presented an algorithm based on generalized suffix tree for detecting communities from bipartite networks.The algorithm firstly extracts the adjacent node sequence for each node from the adjacency matrix of the bipartite network,and constructs a generalized suffix tree.Each node in the generalized suffix tree represents a complete bipartite clique.Then the algorithm extracts and adjusts those cliques.The closeness of two cliques is introduced to form initial communities.Finally,isolated nodes are processed to get the final community partition.The proposed algorithm can detect overlapping communities,and is able to get one-to-many correspondence between communities.Experimental results on the artificial networks and real-world networks show that,our algorithm can not only accurately identify the number of communities from bipartite networks,but also obtain high quality of community partitioning.
-
Time-based Local Collaborative Filtering Recommendation Algorithm on Tensor Factorization
孙艳歌,王志海,黄丹. 基于时间的局部低秩张量分解的协同过滤推荐算法[J]. 计算机科学, 2017, 44(7): 227-231.
SUN Yan-ge, WANG Zhi-hai and HUANG Dan. Time-based Local Collaborative Filtering Recommendation Algorithm on Tensor Factorization[J]. Computer Science, 2017, 44(7): 227-231. - SUN Yan-ge, WANG Zhi-hai and HUANG Dan
- Computer Science. 2017, 44 (7): 227-231. doi:10.11896/j.issn.1002-137X.2017.07.040
- Abstract PDF(388KB) ( 830 )
- References | Related Articles | Metrics
-
Traditional recommendation models are stationary with neglecting time factor.Some recommendation algorithms take time factor into consideration,but what they do is using the latest data or reducing the weight of past data.It may lead to the loss of some useful information.To solve the above problem,a time-based local low-rank tensor factorization algorithm was proposed.In contract to standard collaborative filtering algorithms,our method does not assume that the rating matrix is low-rank.We relaxed the assumption and assumed that the rating matrix is locally low-rank.The algorithm takes time factor into consideration and views rating matrix as 3-dimensional sensor based on the traditional recommendation algorithms which extend the traditional algorithms to tensor field.Experiments show that the algorithm could improve the efficiency of ranking recommendation.
-
Generalized Intuitionistic Fuzzy Rough Set Model
路艳丽,雷英杰,周炜. 一种广义直觉模糊粗糙集模型[J]. 计算机科学, 2017, 44(7): 232-236.
LU Yan-li, LEI Ying-jie and ZHOU Wei. Generalized Intuitionistic Fuzzy Rough Set Model[J]. Computer Science, 2017, 44(7): 232-236. - LU Yan-li, LEI Ying-jie and ZHOU Wei
- Computer Science. 2017, 44 (7): 232-236. doi:10.11896/j.issn.1002-137X.2017.07.041
- Abstract PDF(336KB) ( 574 )
- References | Related Articles | Metrics
-
Intuitionistic fuzzy set,proposed by Atanassov,is one of the most influential generalizations of Zadeh’s fuzzy sets.To extend the capability of Pawlak’s rough set theory in processing multiple uncertainties,intuitionistic fuzzy set and rough set were combined and a general model of intuitionistic fuzzy rough set was discussed by using constructive approach.Firstly,an equivalent definition of intuitionistic fuzzy set on a special lattice was introduced.Secondly,several important properties of intuitionistic fuzzy logic operators and intuitionistic fuzzy relation which are the two fundamental elements of intuitionistic fuzzy approximation space were proved,and then the model of intuitionistic fuzzy rough sets was constructed.Finally,the properties of proposed model were classified and examined respectively.
-
Novel ABC Algorithm with Adaptive Disturbance
周树亮,冯冬青,陈雪美. 自扰动人工蜂群算法[J]. 计算机科学, 2017, 44(7): 237-243.
ZHOU Shu-liang, FENG Dong-qing and CHEN Xue-mei. Novel ABC Algorithm with Adaptive Disturbance[J]. Computer Science, 2017, 44(7): 237-243. - ZHOU Shu-liang, FENG Dong-qing and CHEN Xue-mei
- Computer Science. 2017, 44 (7): 237-243. doi:10.11896/j.issn.1002-137X.2017.07.042
- Abstract PDF(478KB) ( 1339 )
- References | Related Articles | Metrics
-
As a new type of algorithm,artificial bee colony simulates the bee behaviors to find food.Since its simple parameters and flexibility,ABC is widely used to solve engineering problems.But the premature convergence and cross-border are disadvantages of ABC.To solve these problems,a novel ABC algorithm with adaptive disturbance(IGABC) was proposed in this paper.This improved algorithm adopted symmetry axis strategy to deal with the cross-border individuals,so the search efficiency is improved.A novel global self-adaptive search equation was proposed in this paper.The new search equation improves the structure of original global search equation,and adds linear increasing strategy with threshold.The search method for onlooker bees and employed bees improves the convergence precision and speed.IGABC algorithm designs a novel method on the base of global adaptive disturbance.The simulation results on 18 benchmark functions show that IGABC algorithm enhances the exploitation capacity,and the convergence speed and accuracy have made great progress,contrasting with other six improved ABC algorithms,which were proposed in the last two years.Especially when the test function is Rosenbrock,which is very difficult to find optimum solution,the convergence precision is increased by 16 orders of magnitude.
-
Incremental Attribute Reduction Algorithm Based on Binary Discernibility Matrix in Incomplete Information System
丁棉卫,张腾飞,马福民. 基于二进制区分矩阵的不完备系统增量式属性约简算法[J]. 计算机科学, 2017, 44(7): 244-250.
DING Mian-wei, ZHANG Teng-fei and MA Fu-min. Incremental Attribute Reduction Algorithm Based on Binary Discernibility Matrix in Incomplete Information System[J]. Computer Science, 2017, 44(7): 244-250. - DING Mian-wei, ZHANG Teng-fei and MA Fu-min
- Computer Science. 2017, 44 (7): 244-250. doi:10.11896/j.issn.1002-137X.2017.07.043
- Abstract PDF(590KB) ( 597 )
- References | Related Articles | Metrics
-
Incremental attribute reduction algorithm in incomplete information system is one of the important research contents in the area of data mining.For getting the attribute reduction incrementally,the tolerance class needs to be computed.For the purpose of speeding up the tolerance class calculation,an improved static algorithm with rapidityand stability is developed firstly,followed by a novel incremental algorithm,which can update the tolerance class rapidly when a new object is coming.On the basis of the obtained tolerance class and combined with the intuitive and easy of binary matrix,an incremental attribute reduction algorithm based on binary matrix in incomplete information system by updating the binary matrix was proposed.The validity of these algorithms was demonstrated by the simulation and experimental results.
-
Multi-agent Epistemic Explanatory Diagnosis Class
余泉,常亮. 多智能体认知解释诊断类[J]. 计算机科学, 2017, 44(7): 251-256.
YU Quan and CHANG Liang. Multi-agent Epistemic Explanatory Diagnosis Class[J]. Computer Science, 2017, 44(7): 251-256. - YU Quan and CHANG Liang
- Computer Science. 2017, 44 (7): 251-256. doi:10.11896/j.issn.1002-137X.2017.07.044
- Abstract PDF(596KB) ( 596 )
- References | Related Articles | Metrics
-
Explanatory diagnosis is an important branch of model-based diagnosis.Based on the decidable fragments of epistemic explanatory diagnosis,we presented the notion of epistemic explanatory diagnosis class,and gave an algorithm of unique epistemic explanatory Diagnosis class within the decidable fragment.
-
Link Prediction in Networks with Node Attributes Based on Space Mapping
姜卯生,葛剑飞,陈崚. 基于空间映射的顶点带属性网络的链接预测[J]. 计算机科学, 2017, 44(7): 257-261.
JIANG Mao-sheng, GE Jian-fei and CHEN Ling. Link Prediction in Networks with Node Attributes Based on Space Mapping[J]. Computer Science, 2017, 44(7): 257-261. - JIANG Mao-sheng, GE Jian-fei and CHEN Ling
- Computer Science. 2017, 44 (7): 257-261. doi:10.11896/j.issn.1002-137X.2017.07.045
- Abstract PDF(1148KB) ( 755 )
- References | Related Articles | Metrics
-
A link prediction algorithm in networks with node attributes based on space mapping was proposed in this paper.In general,networks with node attributes have two types of information,i.e.topology and node attributes.To integrate these two types of information,we mapped them into a new space.After information being mapped,similarities between nodes were calculated in the new space,which are used to predict the possibility of links between nodes.Alternative iteration method was proposed to get the optimal mapping matrix,so as to integrate topology information and node attribute information effectively.The experimental results verify the correctness of space mapping approach,and show that the proposed space mapping based algorithm can obtain high quality prediction results.
-
Reseach on Improved Apriori Algorithm Based on Hadoop
黄剑,李明奇,郭文强. 基于Hadoop的Apriori改进算法研究[J]. 计算机科学, 2017, 44(7): 262-266.
HUANG Jian, LI Ming-qi and GUO Wen-qiang. Reseach on Improved Apriori Algorithm Based on Hadoop[J]. Computer Science, 2017, 44(7): 262-266. - HUANG Jian, LI Ming-qi and GUO Wen-qiang
- Computer Science. 2017, 44 (7): 262-266. doi:10.11896/j.issn.1002-137X.2017.07.046
- Abstract PDF(481KB) ( 700 )
- References | Related Articles | Metrics
-
Traditional mining based on parallel Apriori algorithms needs much more time in data IO with the increasing size of large transaction database.In this paper,we improved Apriori algorithm in three aspects:compression in the transaction,reducing the number of scanning areas,and simplifying the candidate set generation .We proposed “0” and “1” as the entries to describe the transaction Boolean matrix model,and introduced the weight dimensions to compress the matrix size of the transaction.Meanwhile,dynamic pruning matrix is adopted,and “and” operation of matrix is applied to generate a candidate set.The experiments of the improved algorithm running parallel in Hadoop framework show that the algorithm is suitable for large-scale data mining,and the algorithm has good scalability and effectiveness.
-
Inexact Proximal Point Algorithm for Structured Variational Inequalities
陈小彪,李耿华,梁娟,王建军. 一种非精确求解结构型变分不等式的渐近点算法[J]. 计算机科学, 2017, 44(7): 267-269.
CHEN Xiao-biao, LI Geng-hua, LIANG Juan and WANG Jian-jun. Inexact Proximal Point Algorithm for Structured Variational Inequalities[J]. Computer Science, 2017, 44(7): 267-269. - CHEN Xiao-biao, LI Geng-hua, LIANG Juan and WANG Jian-jun
- Computer Science. 2017, 44 (7): 267-269. doi:10.11896/j.issn.1002-137X.2017.07.047
- Abstract PDF(225KB) ( 539 )
- References | Related Articles | Metrics
-
Recently,the alternating direction method of multipliers has attracted great attention.For a class of variatio-nal inequalities,this method is efficient,when the subproblems can be solved exactly.However,the subproblems could be too difficult or impossible to be solved exactly in many practical applications.In this paper,we proposed an inexact proxi-mal point method based on proximal point method.The subproblem is simple to have a closed form solution.Instead of solving the subproblems exactly,we used the simple projection-correction method to approximate the subproblems’ real solutions.Convergence of the proposed method is proved under mild assumptions and its efficiency is also verified by some numerical experiments.
-
Human Action Recognition Based on Fisher Discrimination Dictionary Learning
季冲,王胜,陆建峰. 基于Fisher鉴别字典学习的人体行为识别[J]. 计算机科学, 2017, 44(7): 270-274.
JI Chong, WANG Sheng and LU Jian-feng. Human Action Recognition Based on Fisher Discrimination Dictionary Learning[J]. Computer Science, 2017, 44(7): 270-274. - JI Chong, WANG Sheng and LU Jian-feng
- Computer Science. 2017, 44 (7): 270-274. doi:10.11896/j.issn.1002-137X.2017.07.048
- Abstract PDF(2632KB) ( 746 )
- References | Related Articles | Metrics
-
Human action recognition is a hot computer vision research field,and has broad application prospects.This paper explored the application of Fisher discrimination based dictionary learning on human action recognition.First,local spatial-temporal features are extracted from the video sequences and random projection is used to reduce dimension.Then,Fisher discrimination based dictionary learning is performed on the reduced motion features.Last,a new classification scheme is proposed using both reconstruction error and representation coefficients.Experimental results confirm the efficiency and robustness of the proposed scheme.
-
Research on Action Recognition Algorithm Based on Hybrid Cooperative Training
景陈勇,詹永照,姜震. 基于混合式协同训练的人体动作识别算法研究[J]. 计算机科学, 2017, 44(7): 275-278.
JING Chen-yong, ZHAN Yong-zhao and JIANG Zhen. Research on Action Recognition Algorithm Based on Hybrid Cooperative Training[J]. Computer Science, 2017, 44(7): 275-278. - JING Chen-yong, ZHAN Yong-zhao and JIANG Zhen
- Computer Science. 2017, 44 (7): 275-278. doi:10.11896/j.issn.1002-137X.2017.07.049
- Abstract PDF(1167KB) ( 822 )
- References | Related Articles | Metrics
-
Human action recognition is an important issue in the field of computer vision.Existing action recognition methods mostly belong to supervised learning category,in which a large number of labeled data are needed to train the recognition model.However,in many real-world tasks,labeled data are often expensive to get,while unlabeled data are readily available in abundance.In this paper,a novel human action recognition algorithm,named as Co-KNN-SVM,was proposed based on hybrid collaborative training.Different types of recognition methods for action recognition field are employed in this method to build the base classifiers,which are then iteratively retrained to increase their generalization abilities.In general,our method can decrease the labeling cost and achieve complementary advantages of different recognition algorithms.In order to decrease the impact of the noise in pseudo labeled data and improved the recognition performance,we also improved the selection method for the pseudo label data and the iterative training strategy in co-trai-ning style algorithms.The experimental results show that the proposed algorithms can identify human action in the vi-deo more effectively.
-
Method to Generate Diagonalizable LDPC Measurement Matrix Based on Compressive Sensing
周春佳,孙权森,刘佶鑫. 对角化LDPC压缩感知观测矩阵生成方法[J]. 计算机科学, 2017, 44(7): 279-282.
ZHOU Chun-jia, SUN Quan-sen and LIU Ji-xin. Method to Generate Diagonalizable LDPC Measurement Matrix Based on Compressive Sensing[J]. Computer Science, 2017, 44(7): 279-282. - ZHOU Chun-jia, SUN Quan-sen and LIU Ji-xin
- Computer Science. 2017, 44 (7): 279-282. doi:10.11896/j.issn.1002-137X.2017.07.050
- Abstract PDF(1797KB) ( 854 )
- References | Related Articles | Metrics
-
Compressive sensing is a technique that is suitable for compressing and recovering signals having sparse representations in certain bases.In view of two main problems in currently existing measurement matrices for compressive sensing of natural images,such as difficulty of hardware implementation and low sensing efficiency,this paper proposed a simple measurement matrix.By combining the diagonal block matrix with the LDPC check matrix in the channel co-ding,a new measurement matrix that facilitates the hardware implementation is generated.The diagonalizable LDPC measurement matrix is highly sparse and binary,and reduces the data storage space and computing time.Through the comparison of multiple sets of images,the reconstruction results of this method are much better than the others.
-
Fast and Robust SAR Image Matching Algorithm
吴鹏,于秋则,闵顺新. 一种快速鲁棒的SAR图像匹配算法[J]. 计算机科学, 2017, 44(7): 283-288.
WU Peng, YU Qiu-ze and MIN Shun-xin. Fast and Robust SAR Image Matching Algorithm[J]. Computer Science, 2017, 44(7): 283-288. - WU Peng, YU Qiu-ze and MIN Shun-xin
- Computer Science. 2017, 44 (7): 283-288. doi:10.11896/j.issn.1002-137X.2017.07.051
- Abstract PDF(5065KB) ( 924 )
- References | Related Articles | Metrics
-
To solve the problem that SIFT and its improved algorithm have low matching performance(poor university,low matching accuracy,high time complexity)in the multi-band SAR image matching,we improved the algorithm respectively from creating scale space and descriptors within the framework of the SIFT algorithm.In scale space level,we proposed to use gauss guided filter to construct scale space and use bilateral filter in image pre-processing stage.This strategy,efficient filter speckles noise and keeps the image’s information,makes full use of gauss guided filter real-time and rotational symmetry and the edge preserving advantages of bilateral filter.In the construction descriptor stage,in order to ensure the distinction and reduce the time of build descriptors,we adopted the local difference binary to describing the local features’ characteristics.In the matching stage,the coarse matching uses the algorithm of nearest neighbor firstly,and then the sparse vector field consensus is used to remove the error matching points quickly.The experimental results show that the proposed algorithm from SAR image matching on time complexity and the matching probability is better than the BFSIFT and KAZE algorithm.In conclusion,our proposed algorithm is an efficient algorithm of real-time,robustness and high matching probability.
-
Implementation of Time-Spatial Domain Retinex Color Correction Algorithm on ZedBoard
周家豪,李佩玥,杨怀江. 时空域Retinex颜色校正算法的ZedBoard实现[J]. 计算机科学, 2017, 44(7): 289-292.
ZHOU Jia-hao, LI Pei-yue and YANG Huai-jiang. Implementation of Time-Spatial Domain Retinex Color Correction Algorithm on ZedBoard[J]. Computer Science, 2017, 44(7): 289-292. - ZHOU Jia-hao, LI Pei-yue and YANG Huai-jiang
- Computer Science. 2017, 44 (7): 289-292. doi:10.11896/j.issn.1002-137X.2017.07.052
- Abstract PDF(1020KB) ( 905 )
- References | Related Articles | Metrics
-
The time-spatial domain retinex color correction algorithm based on white balance was proposed.Hardware platform was designed owing to its high computational complexity and bad real-time quality to realize the algorithm.ZedBoard uses resources of PL and PS to execute white balance processing,extracts light information,and then achieves retinex color correction algorithm efficiently.Eventually projector exports reflection coefficient information images representing objects inherent color.Color data of projection light are collected by color light meter named CL200A from Konica Minolta.Data show that the algorithm spreads color gamut of images to make it approach the standard.And white pixels after being corrected are closer to the standard white pixels.Color resolution is improved and color cast is solved.Compared with time cost of the algorithm’s implementation on PCs,time cost on ZedBoard is reduced about two orders of magnitude.
-
Visual Attention Modeling Based on Multi-scale Fusion of Amplitude Spectrum and Phase Spectrum
袁小艳,王安志,潘刚,王明辉. 多尺度下幅度谱与相位谱相融合的视觉注意建模[J]. 计算机科学, 2017, 44(7): 293-298.
YUAN Xiao-yan, WANG An-zhi, PAN Gang and WANG Ming-hui. Visual Attention Modeling Based on Multi-scale Fusion of Amplitude Spectrum and Phase Spectrum[J]. Computer Science, 2017, 44(7): 293-298. - YUAN Xiao-yan, WANG An-zhi, PAN Gang and WANG Ming-hui
- Computer Science. 2017, 44 (7): 293-298. doi:10.11896/j.issn.1002-137X.2017.07.053
- Abstract PDF(3000KB) ( 631 )
- References | Related Articles | Metrics
-
Aiming at the deficiency of most existing frequency domain saliency detection algorithms which only use frequency domain amplitude spectrum or phase spectrum information alone,a visual attention model combining multi-scale frequency amplitude spectrum and phase spectrum was proposed.Firstly,the amplitude spectrum and the phase spectrum are obtained by quaternary transforming the image,and then the gamma correction and Gaussian filtering are performed on the amplitude spectrum.Finally,the entropy is used as weight to fuse the multi-scale saliency map.On the two published data sets,Bruce and Judd,the ROC curve,AUC value and F-Measure method were used to validate and evaluate the algorithm.The experimental results show that the proposed algorithm outperforms five visual attention models, predicts the significant attention areas more accurately,and achieves more satisfactory results.
-
Real-time Dynamic Sign Language Recognition Based on Hierarchical Matching Strategy
梁文乐,黄元元,胡作进. 基于二级匹配策略的实时动态手语识别[J]. 计算机科学, 2017, 44(7): 299-303.
LIANG Wen-le, HUANG Yuan-yuan and HU Zuo-jin. Real-time Dynamic Sign Language Recognition Based on Hierarchical Matching Strategy[J]. Computer Science, 2017, 44(7): 299-303. - LIANG Wen-le, HUANG Yuan-yuan and HU Zuo-jin
- Computer Science. 2017, 44 (7): 299-303. doi:10.11896/j.issn.1002-137X.2017.07.054
- Abstract PDF(1125KB) ( 1007 )
- References | Related Articles | Metrics
-
Dynamic sign language can be described by its trajectory and the key hand-action.However,a large number of statistical data show that most of the commonly used sign languages can be recognized by its trajectory curve.Therefore,a hierarchical matching recognition strategy for dynamic sign language was proposed in this paper.First,the gesture trajectory can be obtained by the somatosensory equipment like Kinect.According to its point density,an algorithm of key frame detection is designed and is used to extract the key gestures.Thus,we can achieve a precise description of dynamic sign language through trajectory curve and key frames.Then the dynamic time warping(DTW) algorithm is optimized and used to do the first-level matching,i.e.trajectory matching.If the recognition results can be get currently,the recognition process can be finished,otherwise the process should go into the second-level,i.e.key frame matching,and then get the final recognition results.Experiments show that this algorithm not only has better real-time performance,but also has higher recognition accuracy.
-
Lining Seam Elimination Algorithm in Tunnel Concrete Lining Based on Line Feature Unit Extraction
安世全,白羚,瞿中. 基于直线段特征单元提取的隧道砼衬砌接缝去除算法[J]. 计算机科学, 2017, 44(7): 304-308.
AN Shi-quan, BAI Ling and QU Zhong. Lining Seam Elimination Algorithm in Tunnel Concrete Lining Based on Line Feature Unit Extraction[J]. Computer Science, 2017, 44(7): 304-308. - AN Shi-quan, BAI Ling and QU Zhong
- Computer Science. 2017, 44 (7): 304-308. doi:10.11896/j.issn.1002-137X.2017.07.055
- Abstract PDF(2765KB) ( 683 )
- References | Related Articles | Metrics
-
Due to the brightness similarity and linear consistency between surface cracks and inherent lining seams in some tunnel concrete lining,lining seams are prone to sugaring,hollowing,localized rock fall and water leakage.The existing crack detection algorithms cannot accurately extract single cracks.This paper proposed a lining seam elimination algorithm based on the extraction of line feature unit in tunnel concrete lining.Firstly,on the basis of the clustering characteristics detection which is similar to cracks,the significant linear characteristics have been detected by progressive probabilistic hough ransform(PPHT).Secondly,the minimum line feature processing unit of lining seam,which is called Unit-Line,has been extracted by the search calculation of pixel extension.Finally,according to the marking information of the Unit-Line characteristics and the Unit-Line characteristics in fixed area,a part of the lining seams can be removed,and the real surface cracks in tunnel concrete lining can be obtained by the percolation de-noising.The experimental results show that the proposed surface lining seam elimination algorithm based on the extraction of line feature unit,which has strong robustness,fills the gap in the existing technology of tunnel concrete lining surface cracks detection,and the interference of similar linear characteristics to the single real cracks detection can be removed accurately,quickly and effectively.
-
Hypergraph Dual Regularization Concept Factorization Algorithm and Its Application in Data Representation
叶军,金忠. 基于对偶超图正则化的概念分解算法及其在数据表示中的应用[J]. 计算机科学, 2017, 44(7): 309-314.
YE Jun and JIN Zhong. Hypergraph Dual Regularization Concept Factorization Algorithm and Its Application in Data Representation[J]. Computer Science, 2017, 44(7): 309-314. - YE Jun and JIN Zhong
- Computer Science. 2017, 44 (7): 309-314. doi:10.11896/j.issn.1002-137X.2017.07.056
- Abstract PDF(430KB) ( 947 )
- References | Related Articles | Metrics
-
The concept factorization(CF) algorithm can not take the geometric structures of both the data manifold and the feature manifold into account simultaneously.And CF algorithm can not consider the high-order relationship among samples.In this paper,a novel algorithm called hypergraph dual regularization concept factorization(DHCF) algorithm was proposed,which encodes the high-order geometric structure information of data and feature spaces by constructing two undirected weighted hypergraph Laplacian regularize term,respectively.By this way,the proposed method can overcome the deficiency that traditional graph model expresses pair-wise relationship only.Moreover,we developed the iterative updating optimization schemes for DHCF,and provided the convergence proof of our optimization scheme.Experimental results on TDT2 document datasets,PIE and COIL20 image datasets demonstrate the effectiveness of our method.
-
Research on Unsupervised Regional Remote Sensing Image Retrieval Algorithm Based on Graph Theory
李丽萍,赵传荣,孔德仁,王芳. 基于图论的无监督区域遥感图像检索算法研究[J]. 计算机科学, 2017, 44(7): 315-317.
LI Li-ping, ZHAO Chuan-rong, KONG De-ren and WANG Fang. Research on Unsupervised Regional Remote Sensing Image Retrieval Algorithm Based on Graph Theory[J]. Computer Science, 2017, 44(7): 315-317. - LI Li-ping, ZHAO Chuan-rong, KONG De-ren and WANG Fang
- Computer Science. 2017, 44 (7): 315-317. doi:10.11896/j.issn.1002-137X.2017.07.057
- Abstract PDF(1069KB) ( 745 )
- References | Related Articles | Metrics
-
In order to improve the content based remote sensing image retrieval technology,a new image retrieval algorithm based on graph theory was proposed.First,the proposed method models each image by a graph and combines local information and related spatial structures,which provides the region based image representation.Each image is initially divided into different regions.The nodes and boundaries of the attribute relation graph respectively represent the regionalfeatures and the spatial relations between them.Then,image retrieval is achieved based on image similarity.To match the corresponding image and realize image retrieval according to image similarities,a new type of non-accurate image matching strategy is used based on sub-graph isomorphism algorithm and spectral graph embedding technology.The experimental results show that compared with the most advanced unsupervised remote sensing image retrieval methods,the retrieval performance of the proposed method is significantly improved.
-
Study on Grassmann Manifold Dimension Reduction and Its Application
曾青松,黄晓宇,钟闰禄. 格拉斯曼流形降维及应用研究[J]. 计算机科学, 2017, 44(7): 318-323.
ZENG Qing-song, HUANG Xiao-yu and ZHONG Run-lu. Study on Grassmann Manifold Dimension Reduction and Its Application[J]. Computer Science, 2017, 44(7): 318-323. - ZENG Qing-song, HUANG Xiao-yu and ZHONG Run-lu
- Computer Science. 2017, 44 (7): 318-323. doi:10.11896/j.issn.1002-137X.2017.07.058
- Abstract PDF(1891KB) ( 1968 )
- References | Related Articles | Metrics
-
The key issues of video based face recognition is how to model facial images and measure the similarity between two models.To this end,a dimension reduction method in the Grassmann manifold was proposed to improve the performance of set matching.Firstly,an image set is modeled with a subspace,and the basic element of the Grassmann manifold is presented as the projection matrix by projection mapping.Then,to solve the problem of computational overhead with high dimension matrix,while the model cannot strictly describe the distribution with fewer samples,a two dimensional principal component analysis is implemented to reduce the dimension of the orthogonal basis matrix.By applying QR decomposition on the matrix,a lower dimension and tighten Grassmann manifold is obtained,which can be better to model the image set.Finally,a kernel function that mapped the orthogonal basis matrix from a Grassmann manifold to Euclidean space is used to classify image sets.Extensive experimental results on shared video based dataset show that the proposed method is an effective object matching and face recognition method based on set-to-set matching,and it outperforms other state of the art set-based matching methods with lower computational cost.