
Supervised and Sponsored by Chongqing Southwest Information Co., Ltd.
CODEN JKIEBK


-
Survey of Applications Based on Blockchain in Government Department
任明,汤红波,斯雪明,游伟. 区块链技术在政府部门的应用综述[J]. 计算机科学, 2018, 45(2): 1-7.
REN Ming, TANG Hong-bo, SI Xue-ming and YOU Wei. Survey of Applications Based on Blockchain in Government Department[J]. Computer Science, 2018, 45(2): 1-7. - REN Ming, TANG Hong-bo, SI Xue-ming and YOU Wei
- Computer Science. 2018, 45 (2): 1-7. doi:10.11896/j.issn.1002-137X.2018.02.001
-
Abstract
PDF(1254KB) ( 1182 )
- References | Related Articles | Metrics
-
As the value of Bitcoin continuously rises,the blockchain technology applied behind it has promptly drawn widespread attention throughout the world,and it has also attracted the attention of governments at the same time.In particular,some countries,represented by the United States,under the support of the governments and the power institutions,have begun to try to apply this technology in various aspects,including the construction of specific information platforms,the operation of equipment supplies,and the control of systems.They think that the features including distribution,traceability and difficult tampering,etc of this technology could give full play to advantages of many aspects such as anonymous data collection,data integrity verification,interconnected communication of intelligent equipments,etc.In the meantime,the government institutions of many countries still maintain a cautious attitude towards the application of blockchain technology and they think that this technology is still faced with lots of problems including security and the universality of application,etc.Through the introduction and analysis of applications of the blockchain technology of government departments,the challenges confronted by current blockchain technology in the applications of government departments were pointed out.Lastly,for these problems,corresponding solutions were brought forward through combing the existing work in the academic field.
-
Abnormal Detection of Eclipse Attacks on Blockchain Based on Immunity
吕婧淑,杨培,陈文,操晓春,李涛. 基于免疫的区块链eclipse攻击的异常检测[J]. 计算机科学, 2018, 45(2): 8-14.
LV Jing-shu, YANG Pei, CHEN Wen, CAO Xiao-chun and LI Tao. Abnormal Detection of Eclipse Attacks on Blockchain Based on Immunity[J]. Computer Science, 2018, 45(2): 8-14. - LV Jing-shu, YANG Pei, CHEN Wen, CAO Xiao-chun and LI Tao
- Computer Science. 2018, 45 (2): 8-14. doi:10.11896/j.issn.1002-137X.2018.02.002
-
Abstract
PDF(1343KB) ( 807 )
- References | Related Articles | Metrics
-
The eclipse attack against the blockchain has the characteristics of concurrency and concealment,and often relies on multi-node to collaboratively complete the attack of monopolizing victim’s network connections.Correspon-dingly,the computer immune system has the characteristics of distribution,self-learning and strong adaptive ability.To detect whether the blockchain suffers from eclipse attacks,this paper proposed a new immunity based model to detect eclipse attacks on blockchain.At the same time,this paper established the architecture of the detection model,and pre-sented the formal definitions of each element and the execution processes of each module in this model.The simulated experiments were carried out according to the proposed detection model.The experimental results show higher accuracy and efficiency of this model.
-
Blockchain-based Big Data Right Confirmation Scheme
王海龙,田有亮,尹鑫. 基于区块链的大数据确权方案[J]. 计算机科学, 2018, 45(2): 15-19.
WANG Hai-long, TIAN You-liang and YIN Xin. Blockchain-based Big Data Right Confirmation Scheme[J]. Computer Science, 2018, 45(2): 15-19. - WANG Hai-long, TIAN You-liang and YIN Xin
- Computer Science. 2018, 45 (2): 15-19. doi:10.11896/j.issn.1002-137X.2018.02.003
-
Abstract
PDF(2097KB) ( 2195 )
- References | Related Articles | Metrics
-
Data right confirmation has always been one of the most challenging problems in big data trading.Traditional means of right confirmation adopt the model of submitting the ownership evidence and expert reviewing,but they lack technological credibility and there are some uncontrollable factors such as potential tampering.In order to solve these problems,a strongly operational confirmation scheme is urgently needed.This paper put forward a new big data right confirmation scheme based on the technologies of blockchain and digital watermarking.Firstly,the auditing center and watermarking center are brought in to separate the duties of the integrity auditing of big data and watermarking generation.Secondly,using provable data possession technique and sampling technique,the lightweight audit of the integrity of big data is realized.Thirdly,the special security properties of digital watermarking technology are used to confirm the origin of big data.Finally,in the light of the integrity and persistence of evidence involved in the right confirmation,the native features of blockchain,such as the shared ledger,are used to implement strong consistency of the right confirmation result and relevant evidence.Correctness and security analysis results show that the proposed scheme can provide a new technical solution for the definition of ownership of big data.
-
Byzantine Consensus Algorithm Based on Gossip Protocol
张仕将,柴晶,陈泽华,贺海武. 基于Gossip协议的拜占庭共识算法[J]. 计算机科学, 2018, 45(2): 20-24.
ZHANG Shi-jiang, CHAI Jing, CHEN Ze-hua and HE Hai-wu. Byzantine Consensus Algorithm Based on Gossip Protocol[J]. Computer Science, 2018, 45(2): 20-24. - ZHANG Shi-jiang, CHAI Jing, CHEN Ze-hua and HE Hai-wu
- Computer Science. 2018, 45 (2): 20-24. doi:10.11896/j.issn.1002-137X.2018.02.004
-
Abstract
PDF(1198KB) ( 1111 )
- References | Related Articles | Metrics
-
Blockchain is a kind of distributed ledger system with peer-to-peer network,which has drawn widespread attention because of its characteristics such as decentralization,non-tempering,security and credibility.In a blockchain system,some nodes have the Byzantine errors such as operational errors,network latency,system crashes,malicious attacks,and so on.The existing consensus algorithms are less tolerant to the Byzantine nodes in the blockchain,and the scalability of the blockchain system is poor.In order to solve these problems,this paper proposed a Byzantine consensus algorithm based on Gossip protocol,which allows the system to tolerate less than half of the nodes as the Byzantine node and achieve the fault-tolerant performance of XFT consensus algorithm.This paper proved that the algorithm can reach consensus in a distributed system with Byzantine defects from the agreement,correctness and termination.At the same time,the system adopts the uniform data structure,and thus has better scalability and facilitates the right node to identify the Byzantine nodes in the blockchain system.In this algorithm,the proposed node is shifted with the change of the length of blockchain,so that all nodes in the system are in the same position,thus avoiding the single point of failure problem,and making the system have better dynamic load balancing performance.
-
Study on Virtual Power Plant Model Based on Blockchain
邵炜晖,许维胜,徐志宇,王宁,农静. 基于区块链的虚拟电厂模型研究[J]. 计算机科学, 2018, 45(2): 25-31.
SHAO Wei-hui, XU Wei-sheng, XU Zhi-yu, WANG Ning and NONG Jing. Study on Virtual Power Plant Model Based on Blockchain[J]. Computer Science, 2018, 45(2): 25-31. - SHAO Wei-hui, XU Wei-sheng, XU Zhi-yu, WANG Ning and NONG Jing
- Computer Science. 2018, 45 (2): 25-31. doi:10.11896/j.issn.1002-137X.2018.02.005
-
Abstract
PDF(1554KB) ( 1198 )
- References | Related Articles | Metrics
-
The power system is evolving from Smart Grid to Energy Internet with the development of new energy technologies and Internet technologies.Distributed energy resources will become the main primary energy in the future Ener-gy Internet.In this situation,virtual power plant technology plays an important role in the convergence of distributed power generation resources and the establishment of virtual power resource transactions.As a new distributed computing paradigm,blockchain has the characteristics of security,transparency and decentralization.This paper proposed a blockchain based virtual power plant model for the future Energy Internet driven by real-time electricity price.The coordinated control method of virtual power plant and the independent grid connected behavior of distributed energy resources are organically linked by the incentive mechanism of blockchain,so as to realize the distributed dispatching calculation of virtual power plant.Simulation results show that the proposed model meets the grid-connected requirements of high penetration,high freedom,high frequency and high speed of distributed energy resources in the future Energy Internet.
-
Information Security Framework Based on Blockchain for Cyber-physics System
丁庆洋,王秀利,朱建明,宋彪. 基于区块链的信息物理融合系统的信息安全保护框架[J]. 计算机科学, 2018, 45(2): 32-39.
DING Qing-yang, WANG Xiu-li, ZHU Jian-ming and SONG Biao. Information Security Framework Based on Blockchain for Cyber-physics System[J]. Computer Science, 2018, 45(2): 32-39. - DING Qing-yang, WANG Xiu-li, ZHU Jian-ming and SONG Biao
- Computer Science. 2018, 45 (2): 32-39. doi:10.11896/j.issn.1002-137X.2018.02.006
-
Abstract
PDF(1378KB) ( 682 )
- References | Related Articles | Metrics
-
Cyber-physics system has drawn widespread attention of academia,and the protection problems and protection measures it faces are also increasingly becoming the research focus in the field.By combing the current research results about the security issues of cyber-physics system and corresponding protective measures at home and abroad,it is found that the security protection measures based on the overall multi-level coordination and distributed architecture have become the current research direction,which is in line with the features of distributed architecture of blockchain technology.Based on the introduction of the distributed topology of blockchain and its information security features,this paper proposed the idea of security protection in which the blockchain technology is integrated with the cyber-physics system,proved the possibility of combining the two parts,and constructed BCCPS framework mechanism of integrating the two parts deeply.The specific construction of BCCPS framework at both the basic level and the integrated level was highlighted.Finally,the security of BCCPS framework was demonstrated from four aspects:confidentiality,integrity,availability and traceability of information security.This research provides a new idea for establishing a secure and robust cyber-physics system.
-
Public Blockchain of Pharmaceutical Business Resources Based on Double-chain Architecture
毕娅,周贝,冷凯君,王存法. 基于双链架构的医药商业资源公有区块链[J]. 计算机科学, 2018, 45(2): 40-47.
BI Ya, ZHOU Bei, LENG Kai-jun and WANG Cun-fa. Public Blockchain of Pharmaceutical Business Resources Based on Double-chain Architecture[J]. Computer Science, 2018, 45(2): 40-47. - BI Ya, ZHOU Bei, LENG Kai-jun and WANG Cun-fa
- Computer Science. 2018, 45 (2): 40-47. doi:10.11896/j.issn.1002-137X.2018.02.007
-
Abstract
PDF(1661KB) ( 645 )
- References | Related Articles | Metrics
-
Blockchain is a decentralized shared ledger system and computational paradigm.As a core underlying support technology,it is highly compatible with the distributed economic system.The distributed scheduling model of pharmaceutical business resources based on the public service platform is a comprehensive solution to the current situation of pharmaceutical industry which is “scattered,small,disorderly and weak”,and plays an important role in integrating decentralized resource and making on-demand schedule.Aiming at some key problems in the current public service platform,this paper proposed a public blockchain of pharmaceutical business resources based on double chain architecture,and mainly studied the double-chain structure and its storage mode,privacy protection,resource rent-seeking and mat-ching mechanism,and consensus algorithm.The results show that the public blockchain of pharmaceutical business resources based on double-chain architecture can take into account the openness and security of transaction information and the privacy of enterprise information,self-adaptively complete rent-seeking and matching of resources,and greatly enhance the credibility of the public service platform and the overall efficiency of the system.
-
Remote Attestation Model Based on Blockchain
刘明达,拾以娟. 基于区块链的远程证明模型[J]. 计算机科学, 2018, 45(2): 48-52.
LIU Ming-da and SHI Yi-juan. Remote Attestation Model Based on Blockchain[J]. Computer Science, 2018, 45(2): 48-52. - LIU Ming-da and SHI Yi-juan
- Computer Science. 2018, 45 (2): 48-52. doi:10.11896/j.issn.1002-137X.2018.02.008
-
Abstract
PDF(1920KB) ( 920 )
- References | Related Articles | Metrics
-
Remote attestation is the core of constructing the trusted network.However,current remote attestation modelonly looks on centralized network,in which there are some problems,such as centralized gateway and decision by single point,causing that it is not suitable to use this model in decentralized situation.Aiming at the problem that the computing node cannot execute remote attestation in the environment of centralized distributed network,by drawing lessons from the thought of blockchain,this paper proposed a remote attestation model based on blockchain (RABBC),and focused on model frame,core structure of blockchain and protocol process.The analysis shows that RABBC has the safe characteristics of decentralization,traceability,anonymity,non-tampering,and it is efficient.
-
Optimization Scheme of Consensus Algorithm Based on Aggregation Signature
苑超,徐蜜雪,斯雪明. 基于聚合签名的共识算法优化方案[J]. 计算机科学, 2018, 45(2): 53-56.
YUAN Chao, XU Mi-xue and SI Xue-ming. Optimization Scheme of Consensus Algorithm Based on Aggregation Signature[J]. Computer Science, 2018, 45(2): 53-56. - YUAN Chao, XU Mi-xue and SI Xue-ming
- Computer Science. 2018, 45 (2): 53-56. doi:10.11896/j.issn.1002-137X.2018.02.009
-
Abstract
PDF(1215KB) ( 987 )
- References | Related Articles | Metrics
-
With the rise of Bitcoin,Ethernet,Hyperledger and so on,blockchain has been paid more and more attention.Blockchain is the product of many technologies,and the consensus algorithm is an important standard to adjudicate a blockchain system.The adopted consensus algorithm should be different from the blockchain system to another for the different features.Different consensus algorithms have their own advantages,but they also have shortcomings.Currently,efficiency problem is one of the main problems faced by the consensus algorithm in the blockchain.In order to improve the efficiency,the potential optimization scheme of the consensus algorithm in the blockchain was introduced.Then,the dBFT consensus algorithm commonly used in the alliance chain was taken as the research object,and through combining with the aggregation signature and the bilinear mapping technology,the consensus process was modified.At last,compared with the original scheme,the space complexity of the signature in blockchain system can be effectively reduced with the aggregated dBFT.
-
Blockchain Based Secure Storage Scheme of Dynamic Data
乔蕊,董仕,魏强,王清贤. 基于区块链技术的动态数据存储安全机制研究[J]. 计算机科学, 2018, 45(2): 57-62.
QIAO Rui, DONG Shi, WEI Qiang and WANG Qing-xian. Blockchain Based Secure Storage Scheme of Dynamic Data[J]. Computer Science, 2018, 45(2): 57-62. - QIAO Rui, DONG Shi, WEI Qiang and WANG Qing-xian
- Computer Science. 2018, 45 (2): 57-62. doi:10.11896/j.issn.1002-137X.2018.02.010
-
Abstract
PDF(2437KB) ( 763 )
- References | Related Articles | Metrics
-
In order to solve the potential security problems such as tampering and forgery of dynamic data,this paper proposed a secure storage scheme of dynamic data based on blockchain.First,the mathematical model for the problems above was established.Then,the consistency between local behavior of consensus terminals maximizing their own benefits and the overall goals to ensure the system security and effectiveness was analyzed.Furthermore,the consensus mechanism which is suitable for secure storage of dynamic data,the ownership state transition function of instance system and the architecture for the dynamic data storage system were designed.Finally,quality and growth characteristics of the dynamic data storage blockchain were analyzed under stochastic state model.Results show that the scheme can preclude unauthorized changes of “dynamic data book” effectively,thus enhancing the credibility of the dynamic data of instance system.
-
Feature Selection Algorithm Using SAC Algorithm
张梦林,李占山. 基于SAC的特征选择算法[J]. 计算机科学, 2018, 45(2): 63-68.
ZHANG Meng-lin and LI Zhan-shan. Feature Selection Algorithm Using SAC Algorithm[J]. Computer Science, 2018, 45(2): 63-68. - ZHANG Meng-lin and LI Zhan-shan
- Computer Science. 2018, 45 (2): 63-68. doi:10.11896/j.issn.1002-137X.2018.02.011
-
Abstract
PDF(1234KB) ( 684 )
- References | Related Articles | Metrics
-
Feature selection can improve the performance of learning algorithm with the help of removing the irrelevant and redundant features.As evolutionary algorithm is reported to be suitable for optimization tasks,this paper proposed a new feature selection algorithm FSSAC.The new initialization strategy and evaluation function make FSSAC regard feature selection as a discrete space search problem.The algorithm also uses the accuracy of feature subset to guide the sampling period.In the stage of experiment,FSSAC was combined with the SVM,J48 and KNN,and then it was validated on UCI machine learning datasets by comparing with FSFOA,HGAFS,PSO and so on .The experiments show that FSSAC can improve the classification accuracy of classifier and has good generalization.Besides,FSSAC was also compared with other available methods in dimensionality reduction.
-
Improved Ensemble Method on MicroRNA Prediction Model
董红斌,石丽,李涛. 一种改进的microRNA预测模型集成方法[J]. 计算机科学, 2018, 45(2): 69-75.
DONG Hong-bin, SHI Li and LI Tao. Improved Ensemble Method on MicroRNA Prediction Model[J]. Computer Science, 2018, 45(2): 69-75. - DONG Hong-bin, SHI Li and LI Tao
- Computer Science. 2018, 45 (2): 69-75. doi:10.11896/j.issn.1002-137X.2018.02.012
-
Abstract
PDF(2854KB) ( 498 )
- References | Related Articles | Metrics
-
The existing microRNA prediction methods often present the problems of imbalance data set class and single applicable species.In order to solve the above problems,the main work is as follows.Firstly,a hierarchical sampling algorithm based on sequence entropy was proposed,which can generate a training set enhancing balance positive and negative samples based on the overall distribution of the samples.Secondly,a feature selection algorithm based on signal-to-noise ratio and correlation was designed to reduce the scale of training set and achieve the purpose of improving training speed.Thirdly,the DS-GA was proposed to shorten the optimization time of SVM classifier parameters and avoid the over-fitting problem.At last,based on the idea of ensemble learning,a common microRNA prediction model was established by sampling,feature selection and classifier parameter optimization.Experiments show that the model solves the problem of imbalance effectively,it is not limited to a single species and achieves better results for the hybrid species test set prediction.
-
Generation Algorithm for Scale-free Networks with Community Structure
郑文萍,曲瑞,穆俊芳. 具有社区结构的无标度网络生成算法[J]. 计算机科学, 2018, 45(2): 76-83.
ZHENG Wen-ping, QU Rui and MU Jun-fang. Generation Algorithm for Scale-free Networks with Community Structure[J]. Computer Science, 2018, 45(2): 76-83. - ZHENG Wen-ping, QU Rui and MU Jun-fang
- Computer Science. 2018, 45 (2): 76-83. doi:10.11896/j.issn.1002-137X.2018.02.013
-
Abstract
PDF(1393KB) ( 649 )
- References | Related Articles | Metrics
-
Generating complex network models can help researchers to understand network behaviors and simulate the transmission processes of disease epidemics and information diffusion.It is also important to generate complex networks meeting the characteristics of real networks and having structural diversity.A network generation algorithm TCMSN (Scale-free Network with Tunable Clustering Coefficient and Modularity) was proposed to generate scale-free complex networks with tunable clustering coefficient and modularity.TCMSN can adjust modularity by changing the mixing parameter and adjust clustering coefficient by changing the global preferential attachment probability and mixing parameter of the network.It adopts a reasonable strategy about adding edges in networks to maintain the scale-free characteristics,as much as possible without destroying network diversity.Experimental results on artificial data sets and real networks show that the proposed TCMSN algorithm can not only generate scale-free network model with tunable clustering coefficient and modularity,but also generate network model closed to the community structure of the real networks.
-
Robust Video Hashing Algorithm Based on Short-term Spatial Variations
于晓,聂秀山,马林元,尹义龙. 基于短空时变化的鲁棒视频哈希算法[J]. 计算机科学, 2018, 45(2): 84-89.
YU Xiao, NIE Xiu-shan, MA Lin-yuan and YIN Yi-long. Robust Video Hashing Algorithm Based on Short-term Spatial Variations[J]. Computer Science, 2018, 45(2): 84-89. - YU Xiao, NIE Xiu-shan, MA Lin-yuan and YIN Yi-long
- Computer Science. 2018, 45 (2): 84-89. doi:10.11896/j.issn.1002-137X.2018.02.014
-
Abstract
PDF(1667KB) ( 439 )
- References | Related Articles | Metrics
-
A robust video hashing algorithm based on short-term spatial variations was proposed to detect near-duplicate videos in the Internet.Feature extraction and feature quantization are key steps in this algorithm.In the feature extraction phase,compared to the existing feature extraction methods based on temporal and spatial information fusion,the innovation of the proposed algorithm is to make full use of short-time variations of local spatial information between adjacent frames (referred to “short-term spatial variations”).In the proposed algorithm,inscribed spheres of the video are constructed first,and then a series of spherical tori are obtained by partitioning the inscribed spheres with the center of the sphere as the starting point to capture short-term changes in spatial information between adjacent frames.After that,the decomposition coefficients by non-negative matrix factorization of spherical tori are used as the feature representation of the video.In the feature quantization phase,to map the feature representation into binary hash sequences,the optimized Manhattan hashing strategy is adopted which better reserves the neighborhood structure in the original data space,and thus improves the accuracy of quantization.Experiments were carried out on a video dataset to evaluate the performance of the proposed video hashing method.Experimental results show that the proposed algorithm has good performance.
-
Generalized Discriminant Local Median Preserving Projections and Face Recognition
张永,万鸣华. 广义的鉴别局部中值保持投影及人脸识别[J]. 计算机科学, 2018, 45(2): 90-93.
ZHANG Yong and WAN Ming-hua. Generalized Discriminant Local Median Preserving Projections and Face Recognition[J]. Computer Science, 2018, 45(2): 90-93. - ZHANG Yong and WAN Ming-hua
- Computer Science. 2018, 45 (2): 90-93. doi:10.11896/j.issn.1002-137X.2018.02.015
-
Abstract
PDF(1907KB) ( 381 )
- References | Related Articles | Metrics
-
To solve the problem of the singularity of the within-class scatter matrix in discriminant local median preserving projections (DLMPP) in the case of small sample problem,an algorithm named generalized local median preserving projection (GDLMPP) was proposed.To solve the small sample problem,GDLMPP firstly transforms the samples into a lower dimensional space equivalently,and then solves the optimal projection matrix.The theoretical analysis shows that GDLMPP is equivalent to DLMPP when the within-class scatter matrix is non-singular.At last,the experimental results validate the effectiveness of the proposed algorithm on the ORL and AR face databases.
-
Sparsity-adaptive Image Denoising Algorithm Based on Difference Coefficient
焦莉娟,王文剑. 一种基于差异系数的稀疏度自适应图像去噪算法[J]. 计算机科学, 2018, 45(2): 94-97.
JIAO Li-juan and WANG Wen-jian. Sparsity-adaptive Image Denoising Algorithm Based on Difference Coefficient[J]. Computer Science, 2018, 45(2): 94-97. - JIAO Li-juan and WANG Wen-jian
- Computer Science. 2018, 45 (2): 94-97. doi:10.11896/j.issn.1002-137X.2018.02.016
-
Abstract
PDF(1270KB) ( 489 )
- References | Related Articles | Metrics
-
With the remarkable adaptability and the details recovery capability,K-SVD is a highly effective method based on sparse representation theory in image denoising.But the sparsity K should be given in advance,and different images have different K values in fact.On the other hand,pursuit algorithms which are used in evaluating the relevance between vectors of an image by calculating vector inner product,are brought into K-SVD to train sparse coefficients.Denoising effect is reduced because a few noisy pixels are likely to cause false relevance.This paper addressed this problem and proposed a novel sparsity-adaptive speeded K-SVD(SASK-SVD) algorithm based on different coefficient,which can improve the efficiency.The different coefficient is to eliminate false relevance.The sparsity K is adaptively generated by using the average correlation as the threshold.This study conducted extensive experiments to demonstrate these ideas.The experimental results show that the proposed method achieves the state-of-the-art denoising performance.
-
Particle Swarm Optimization Algorithm with Dynamically Adjusting Inertia Weight
董红斌,李冬锦,张小平. 一种动态调整惯性权重的粒子群优化算法[J]. 计算机科学, 2018, 45(2): 98-102.
DONG Hong-bin, LI Dong-jin and ZHANG Xiao-ping. Particle Swarm Optimization Algorithm with Dynamically Adjusting Inertia Weight[J]. Computer Science, 2018, 45(2): 98-102. - DONG Hong-bin, LI Dong-jin and ZHANG Xiao-ping
- Computer Science. 2018, 45 (2): 98-102. doi:10.11896/j.issn.1002-137X.2018.02.017
-
Abstract
PDF(1295KB) ( 1711 )
- References | Related Articles | Metrics
-
In order to tackle the problems of slow convergence,low accuracy and parameter dependence of the standard particle swarm optimization(PSO) algorithm,a nonlinear exponential inertia weight in particle swarm optimization(EIW-PSO) was proposed.In each iteration,the new algorithm improves its performance by adjusting inertia weight dynamically.The new weight is an exponential function of the minimal and maximal fitness of the particles,which is more conducive for the algorithm being out of local optimization in optimization process. Random factors are introduced to ensure population diversity,so that the particles converge to the global optimal position faster.The standard PSO,linearly decreasing inertia weigh (LDIW-PSO),mean adaptive inertia weigh (MAW-PSO) were tested and compared in different dimensions and population sizes through eight benchmark test functions.Experimental results show that the proposed EIW-PSO algorithm has faster convergence rate and higher solving precision.
-
Parallel Algorithm for Mining User Frequent Communication Relationship
朱鹏宇,鲍培明,吉根林. 用户频繁通信关系的并行挖掘算法研究[J]. 计算机科学, 2018, 45(2): 103-108.
ZHU Peng-yu, BAO Pei-ming and JI Gen-lin. Parallel Algorithm for Mining User Frequent Communication Relationship[J]. Computer Science, 2018, 45(2): 103-108. - ZHU Peng-yu, BAO Pei-ming and JI Gen-lin
- Computer Science. 2018, 45 (2): 103-108. doi:10.11896/j.issn.1002-137X.2018.02.018
-
Abstract
PDF(1294KB) ( 488 )
- References | Related Articles | Metrics
-
With the rapid development of mobile communication technology and Internet,mobile communication equipment has become a portable tool for most people.A parallel algorithm PMFCS was proposed for mining frequent communication sub-graph of mass communication data.The algorithm is based on the Apriori algorithm and sub-graph connect principle.It uses Spark to distribute all the edges to each computing node,then the 1th-order frequent candidate sub-graphs are distributed to each node,the 1th-order frequent candidate sub-graphs are counted at each node,and the 1th-order sub-graphs are got by summarizing candidate sub-graphs.PMFCS iteratively connects the (k-1)th-order sub-graph and the 1th-order sub-graph to generate kth-order candidate sub-graphs.Subsequently,the algorithm terminates until the kth-order frequent sub-graph set is empty.The experimental results show that PMFCS can mine the frequent communication sub-graph efficiently and quickly.
-
Fuzzy Weighted Clustering Algorithm with Fuzzy Centroid for Mixed Data
冀进朝,赵晓威,何飞,胡英慧,白天,李在荣. 基于模糊质心的混合属性数据模糊加权聚类算法[J]. 计算机科学, 2018, 45(2): 109-113.
JI Jin-chao, ZHAO Xiao-wei, HE Fei, HU Ying-hui, BAI Tian and LI Zai-rong. Fuzzy Weighted Clustering Algorithm with Fuzzy Centroid for Mixed Data[J]. Computer Science, 2018, 45(2): 109-113. - JI Jin-chao, ZHAO Xiao-wei, HE Fei, HU Ying-hui, BAI Tian and LI Zai-rong
- Computer Science. 2018, 45 (2): 109-113. doi:10.11896/j.issn.1002-137X.2018.02.019
-
Abstract
PDF(1210KB) ( 390 )
- References | Related Articles | Metrics
-
In fuzzy c-means type algorithms,fuzy parameters are used to control the degree of possible overlap,but it also has the negative effects that all data objects tend to influence all clusters.To solve this issue,Klawonn and Hppner proposed a fuzzy function for replacing the fuzzier.However,this method is only designed for numeric data.In many real-world applications,data objects are usually described by both numeric and categorical attributes.In this paper,a novel weighted fuzzy clustering algorithm based on fuzzy centroid (FWFC) was proposed for the data with both numeric and categorical attributes,i.e.mixed data.In this method,the mean is first integrated with fuzzy centroid to represent the cluster centers.Then,a measure which can evaluate the influence of different attributes in the process of clustering is used to evaluate the dissimilarity between data objects and cluster centers.Finally,the algorithm is presented for clustering the data with mixed attributes.The proposed algorithm was tested by a series of experiments on three mixed datasets.Experimental results show that the proposed algorithm outperforms traditional clustering algorithms.
-
Robotic Fish Tracking Method Based on Suboptimal Interval Kalman Filter
童晓红,唐超. 基于次优区间卡尔曼滤波的机器鱼跟踪方法[J]. 计算机科学, 2018, 45(2): 114-120.
TONG Xiao-hong and TANG Chao. Robotic Fish Tracking Method Based on Suboptimal Interval Kalman Filter[J]. Computer Science, 2018, 45(2): 114-120. - TONG Xiao-hong and TANG Chao
- Computer Science. 2018, 45 (2): 114-120. doi:10.11896/j.issn.1002-137X.2018.02.020
-
Abstract
PDF(3092KB) ( 479 )
- References | Related Articles | Metrics
-
Research of autonomous underwater vehicle (AUV) focuses on tracking and positioning,precise guidance and return to dock,and so on.The robotic fish of AUV has become a hot application in intelligent education,civil and military and so on.From the nonlinear tracking analysis of robotic fish,it is found that the interval Calman filtering algorithm contains all possible filtering results,but the range is wide and relatively conservative,and the interval data vector is uncertain before implementation.This paper proposed a ptimization algorithm of suboptimal interval Kalman filtering.Suboptimal interval Kalman filtering scheme uses the inverse of interval matrix instead of its worst inverse,and it is more approximate to nonlinear state equation and measurement equation than the standard interval Kalman filter,increasing the accuracy of the nominal dynamic system model,and improving the speed and precision of tracking system.Monte-Carlo simulation results show that the optimal trajectory of suboptimal interval Kalman filtering algorithm is better than that of the interval Kalman filtering method and the standard filter method.
-
User Gender Classification with Dual-channel LSTM
王礼敏,严倩,李寿山,周国栋. 基于双通道LSTM模型的用户性别分类方法研究[J]. 计算机科学, 2018, 45(2): 121-124.
WANG Li-min, YAN Qian, LI Shou-shan and ZHOU Guo-dong. User Gender Classification with Dual-channel LSTM[J]. Computer Science, 2018, 45(2): 121-124. - WANG Li-min, YAN Qian, LI Shou-shan and ZHOU Guo-dong
- Computer Science. 2018, 45 (2): 121-124. doi:10.11896/j.issn.1002-137X.2018.02.021
-
Abstract
PDF(1185KB) ( 625 )
- References | Related Articles | Metrics
-
User gender classification aims at classifying the users into male and female with the provided information.Previous studies on gender classification mainly focus on a single type of features (i.e.,textual features or social features).Different from previous research,this paper proposed a new approach named dual-channel LSTM by making full use of the relationship between textual features (the text which user publishes) and social features (the followers which user concerns).Specifically,this paper first got two kinds of features using single-channel LSTM respectively.Then,it proposed a joint learning method to integrate the features.Lastly,it got the final classification results by the dual-channel LSTM.Empirical studies show that the dual-channel LSTM model achieves effective results for gender classification compared with traditional classification algorithms.
-
Clustering Algorithm Based on Shared Nearest Neighbors and Density Peaks
刘奕志,程汝峰,梁永全. 一种基于共享近邻的密度峰值聚类算法[J]. 计算机科学, 2018, 45(2): 125-129.
LIU Yi-zhi, CHENG Ru-feng and LIANG Yong-quan. Clustering Algorithm Based on Shared Nearest Neighbors and Density Peaks[J]. Computer Science, 2018, 45(2): 125-129. - LIU Yi-zhi, CHENG Ru-feng and LIANG Yong-quan
- Computer Science. 2018, 45 (2): 125-129. doi:10.11896/j.issn.1002-137X.2018.02.022
-
Abstract
PDF(1235KB) ( 586 )
- References | Related Articles | Metrics
-
Robust clustering by detecting density peaks and assigning points based on fuzzy weighted K-nearest neighbors(FKNN-DPC) is a simple and efficient clustering algorithm,which can automatically detect the cluster center and assign the non-cluster center sample based on weighted K-nearest neighbors quickly and accurately.It is powerful in recognizing high quality cluster in any scale ,any dimension,any size and any shape of the data set,but the weight calculation in assigning strategies only considers the Euclidean distance between samples.In this paper,a similarity measure based on shared neighborhood was proposed,and the sample assigning strategy was improved by this similarity,so that the cluster is more consistent with the real attribution,thus improving the clustering quality.The effectiveness of the algorithm is verified by comparing the experiments on the UCI real data set with the K-means,DBSCAN,AP,DPC,and FKNN-DPC algorithm.
-
Fast Image Segmentation Method Based on Image Complexity through Curve Fitting
王海峰,章怡,蒋益锋. 基于图像复杂度曲线拟合的快速图像分割方法[J]. 计算机科学, 2018, 45(2): 130-134.
WANG Hai-feng, ZHANG Yi and JIANG Yi-feng. Fast Image Segmentation Method Based on Image Complexity through Curve Fitting[J]. Computer Science, 2018, 45(2): 130-134. - WANG Hai-feng, ZHANG Yi and JIANG Yi-feng
- Computer Science. 2018, 45 (2): 130-134. doi:10.11896/j.issn.1002-137X.2018.02.023
-
Abstract
PDF(1302KB) ( 467 )
- References | Related Articles | Metrics
-
The classical Otsu algorithm,maximum entropy algorithm,and minimum cross entropy algorithm have poor segmentation image effect when image signal noise ratio (SNR) is low.The paper proposed a kind of image segmentation method based on image background and target object complexity from the perspective of the image complexity,greatly reducing redundancy with the curve fitting method and improving the real-time performance and stability of the algorithm.According to the experiment results,compared with the classical algorithm,the fast segmentation algorithm proposed in the paper has high operation speed,stability and reliability,and can effectively solve dissatisfactory image segmentation effect when image SNR is low.
-
Study on Three-way Decisions Based on Intuitionistic Fuzzy Probability Distribution
薛占熬,辛现伟,袁艺林,吕敏杰. 基于直觉模糊可能性分布的三支决策模型的研究[J]. 计算机科学, 2018, 45(2): 135-139.
XUE Zhan-ao, XIN Xian-wei, YUAN Yi-lin and LV Min-jie. Study on Three-way Decisions Based on Intuitionistic Fuzzy Probability Distribution[J]. Computer Science, 2018, 45(2): 135-139. - XUE Zhan-ao, XIN Xian-wei, YUAN Yi-lin and LV Min-jie
- Computer Science. 2018, 45 (2): 135-139. doi:10.11896/j.issn.1002-137X.2018.02.024
-
Abstract
PDF(1221KB) ( 475 )
- References | Related Articles | Metrics
-
The fusion of intuitionistic fuzzy sets theory and possibility theory is a hot spot for dealing with uncertain questions.This paper proposed a three-way decisions model based on the probability distribution of intuitionistic fuzzy probability measurement (IFPM).First of all,the intuitionistic fuzzy decision space and the possibility distribution of the space were defined,and the properties of them were proved.Then,the calculation method of possibility means value for domain object membership degree and the non-membership degree was given.Thirdly,by analyzing the relationship possibility mean value of domain object membership degree and the non-membership degree between decision threshold,its probability distribution was discussed.Thus the three-way decisions model based on the probability distribution to the possibility distribution of transformation relations was expanded.An IFPM decision-making risk calculation method was given.Finally,this paper provided the formulas and analyzed the dynamic decision process of the three-way decisions through analyzing the changing of IFPM under different domain elements,and validated the effectiveness of the model through examples.
-
Comparative Research on Computational Experiment of Social Manufacturing Based on Social Learning Evolution Paradigm
施曼,王俊峰,薛霄,周长兵. 基于SLE范式的社群化制造计算实验比较研究[J]. 计算机科学, 2018, 45(2): 140-146.
SHI Man, WANG Jun-feng, XUE Xiao and ZHOU Chang-bing. Comparative Research on Computational Experiment of Social Manufacturing Based on Social Learning Evolution Paradigm[J]. Computer Science, 2018, 45(2): 140-146. - SHI Man, WANG Jun-feng, XUE Xiao and ZHOU Chang-bing
- Computer Science. 2018, 45 (2): 140-146. doi:10.11896/j.issn.1002-137X.2018.02.025
-
Abstract
PDF(4811KB) ( 587 )
- References | Related Articles | Metrics
-
Under the background of the Internet society,the advanced manufacturing models need to realize collaboration between intra-firm and inter-enterprise from information,social and services.As a new type of manufacturing mode,social manufacturing can adapt to the future socialization,service and large-scale personalized manufacturing environment,and it can solve the problem of multi-participants’ resource sharing,collaboration and interaction in the future manufacturing industry,so it is important to research on this issue.However,the complexity of the social manufacturing system has led to the difficulties of modeling and evaluating the cooperation strategy which has attracted the attention of many researchers.Therefore,this paper presented a social manufacturing computing model based on SLE paradigm including three parts:individual model,interaction model and social model,and further introduced the idea of computatio-nal experiment.The calculation of experiment shows that this model is feasible and effective.It plays a role in promoting the research of social manufacturing.
-
Blind Single Image Super-resolution Using Maximizing Self-similarity Prior
李键红,吕巨建,吴亚榕. 基于最大化自相似性先验的盲单帧图像超分辨率算法[J]. 计算机科学, 2018, 45(2): 147-151.
LI Jian-hong, LV Ju-jian and WU Ya-rong. Blind Single Image Super-resolution Using Maximizing Self-similarity Prior[J]. Computer Science, 2018, 45(2): 147-151. - LI Jian-hong, LV Ju-jian and WU Ya-rong
- Computer Science. 2018, 45 (2): 147-151. doi:10.11896/j.issn.1002-137X.2018.02.026
-
Abstract
PDF(6034KB) ( 487 )
- References | Related Articles | Metrics
-
The relationship between the self-similarity property of image and image quality is close,and almost all the patches in the clear natural image have recurrence patches in itself or its lower scale.However,in the image which was processed by blur or noise,this appearance is not dramatically.Aiming at this phenomenon,this paper proposed a blind single image super-resolution algorithm using the prior of maximizing self-similarity.This algorithm estimates the high-resolution image and the blur kernel by iterative computation,thus making any patch in the final estimated high resolution image exists in the inputted low resolution image with maximizing probability.The proposed algorithm not only estimates the degradation kernel and the high-resolution image accurately,but also adapts the prior according to the inputted image to make the result more robust.Extensive experiments illustrate that our algorithm shows obvious advantages when comparing to other main stream algorithms in terms of PSNR and SSIM.
-
Optimal Granularity Selection of Attribute Reductions in Multi-granularity Decision System
史进玲,张倩倩,徐久成. 多粒度决策系统属性约简的最优粒度选择[J]. 计算机科学, 2018, 45(2): 152-156.
SHI Jin-ling, ZHANG Qian-qian and XU Jiu-cheng. Optimal Granularity Selection of Attribute Reductions in Multi-granularity Decision System[J]. Computer Science, 2018, 45(2): 152-156. - SHI Jin-ling, ZHANG Qian-qian and XU Jiu-cheng
- Computer Science. 2018, 45 (2): 152-156. doi:10.11896/j.issn.1002-137X.2018.02.027
-
Abstract
PDF(1216KB) ( 549 )
- References | Related Articles | Metrics
-
Granular computing,as an important theory method of artificial intelligent,studies the solution of uncertain,imprecise issues or complicated problems from different angles and granularity levels.On the basis of decision system theory of multi-granularity,information granulation and granularity partition were analyzed through different granularity levels.Then the concepts of granulating measurement and granular roughness which can exactly express the size of different granularity partition were defined for the problems of attribute reductions and efficient decision making in decision system.After discussing the local reduction method based on objects,an algorithm of optimal granularity reductions was proposed based on both universe and objects for overcoming the drawbacks of decision system reductions in traditional methods,which are only focused on the universe of decision system.Finally,the experimental results show the validity of the proposed algorithm.
-
Participant Selection Algorithm for t-Sweep k-Coverage Crowd Sensing Tasks
周杰,於志勇,郭文忠,郭龙坤,朱伟平. “t-时隙k-覆盖”群智感知任务的参与者选择方法[J]. 计算机科学, 2018, 45(2): 157-164.
ZHOU Jie, YU Zhi-yong, GUO Wen-zhong, GUO Long-kun and ZHU Wei-ping. Participant Selection Algorithm for t-Sweep k-Coverage Crowd Sensing Tasks[J]. Computer Science, 2018, 45(2): 157-164. - ZHOU Jie, YU Zhi-yong, GUO Wen-zhong, GUO Long-kun and ZHU Wei-ping
- Computer Science. 2018, 45 (2): 157-164. doi:10.11896/j.issn.1002-137X.2018.02.028
-
Abstract
PDF(26351KB) ( 393 )
- References | Related Articles | Metrics
-
With the rapid development and popularization of the wireless network technology and mobile intelligent terminal,the research of crowd sensing has been concerned by more and more related research workers.The crowd sensing uses the idea of crowdsourcing to assign tasks to users who have mobile devices and then the users respectively upload the data sensed by their own mobile devices.Therefore,the choice of the participants directly determines the quality of information collection and related costs.Selecting as few users as possible to accept the perceptual tasks to achieve the quality requirements of the time and space coverage of the specified location set is very improtant.First,the “t-sweep k-coverage” crowd sensing tasks was defined.It is an NP-hard problem to complete the task with the mini-mum cost.Through the construction of special skills,linear programming can be used to solve the problem while the scale of the problem is small.With the increase of the scale of the problem,the linear programming fails to solve it .Therefore,the participant selection algorithm based on the theory of greedy strategy was proposed.Based on the information of the mobile users’ CDR,two kinds of participant selection method were simulated in the experiment.The results of experiment show that when the problem scale is small,both the above two methods can find the user set to meet the coverage requirements.The size of user set of the greedy strategy is about twice bigger than that of the linear programming.When the scale of the problem becomes larger,the linear programming fails to solve the problem sometimes,while the greedy strategy can still get a reasonable result.
-
Capacity Analysis of Energy Harvesting Wireless Communication Channel Based on Hybrid Energy Storage
姚信威,钟礼斌,王万良,杨双华. 基于混合储能结构的能量捕获无线通信信道容量分析[J]. 计算机科学, 2018, 45(2): 165-170.
YAO Xin-wei, ZHONG Li-bin, WANG Wan-liang and YANG Shuang-hua. Capacity Analysis of Energy Harvesting Wireless Communication Channel Based on Hybrid Energy Storage[J]. Computer Science, 2018, 45(2): 165-170. - YAO Xin-wei, ZHONG Li-bin, WANG Wan-liang and YANG Shuang-hua
- Computer Science. 2018, 45 (2): 165-170. doi:10.11896/j.issn.1002-137X.2018.02.029
-
Abstract
PDF(1320KB) ( 372 )
- References | Related Articles | Metrics
-
Due to the constraints of the instability of energy source and the limited storage capacities of devices in exis-ting energy harvesting technology,a hybrid energy storage structure composed by super capacitor and battery was proposed for device,and the corresponding channel capacity of the proposed structure model was analyzed.Firstly,an energy harvesting channel model based on hybrid energy storage structure was presented for a point-to-point energy harvesting communication system.Secondly,by considering the intermittent peculiarities of energy harvesting,this paper assumed that the energy arrival process conforms to the Bernoulli stochastic process.A near optimal allocation policy was proposed with the upper and lower bounds of the average system throughput.In particular,the gap of two bounds is derived to be a constant,then the approximate channel capacity is obtained.Finally,simulation results illustrate that the gap between the upper and lower bounds of channel capacity is 1.77bps/Hz and 2.49bps/Hz respectively,when harvesting energy is less than and more than storage capacity of super capacitor.Meanwhile, the experiment results show that compared with the conventional wireless node with single battery storage,the hybrid energy storage structure can improve the energy utilization and increase the channel capacity of system.The upper bound of channel capacity can be increased up to 70% when the storage capacity ratio of supper capacitor and battery is 12.
-
Dynamic Community Detection Based on Evolutionary Spectral Method
付立东,聂靖靖. 基于进化谱分方法的动态社团检测[J]. 计算机科学, 2018, 45(2): 171-174.
FU Li-dong and NIE Jing-jing. Dynamic Community Detection Based on Evolutionary Spectral Method[J]. Computer Science, 2018, 45(2): 171-174. - FU Li-dong and NIE Jing-jing
- Computer Science. 2018, 45 (2): 171-174. doi:10.11896/j.issn.1002-137X.2018.02.030
-
Abstract
PDF(1220KB) ( 453 )
- References | Related Articles | Metrics
-
In order to effectively analyze the function and characteristics of the community structure in the dynamic network,the module density function and the negative average correlation function were optimized based on the evolutionaryclustering algorithm under the evolutionary time smoothing framework,and the theoretical feasibility was demonstrated.The evolution spectrum algorithm was proposed based on community structure of the dynamic network.The accuracy and effectiveness of the proposed algorithm was verified and compared with other algorithms in the computer synthesis and real dynamic network respectively.The experimental results show that the proposed algorithm is still very accurate and effective in the community detection of dynamic network.
-
Evaluation Method for Node Importance in Air Defense Networks Based on Functional Contribution Degree
罗金亮,金家才,王雷. 基于功能贡献度的网络化防空节点重要性评价方法[J]. 计算机科学, 2018, 45(2): 175-180.
LUO Jin-liang, JIN Jia-cai and WANG Lei. Evaluation Method for Node Importance in Air Defense Networks Based on Functional Contribution Degree[J]. Computer Science, 2018, 45(2): 175-180. - LUO Jin-liang, JIN Jia-cai and WANG Lei
- Computer Science. 2018, 45 (2): 175-180. doi:10.11896/j.issn.1002-137X.2018.02.031
-
Abstract
PDF(2256KB) ( 486 )
- References | Related Articles | Metrics
-
In order to evaluate the importance of node in air defense networks which is a kind of functional social network,on the basis of analyzing the shortcomings of current evaluation method for network node importance,a evaluation method for node importance based on functional contribution was put forward.The method comprehensively considers the functional properties and structural properties of the node.In order to verify the validity and superiority of the method,two types of efficiency index for networked systems,such as network connectivity efficiency and combat loop,were built,and the evaluation method was used to evaluate the node importance in ARPA and air defense networks.Experimental results show that the evaluation method has some advantages in accuracy and applicability of the network node importance evaluation.
-
Authentication Method Synthesizing Multi-factors for Web Browsing Behavior
陈冬祥,丁志军,闫春钢,王咪咪. 一种综合多因素的网页浏览行为认证方法[J]. 计算机科学, 2018, 45(2): 181-188.
CHEN Dong-xiang, DING Zhi-jun, YAN Chun-gang and WANG Mi-mi. Authentication Method Synthesizing Multi-factors for Web Browsing Behavior[J]. Computer Science, 2018, 45(2): 181-188. - CHEN Dong-xiang, DING Zhi-jun, YAN Chun-gang and WANG Mi-mi
- Computer Science. 2018, 45 (2): 181-188. doi:10.11896/j.issn.1002-137X.2018.02.032
-
Abstract
PDF(2401KB) ( 446 )
- References | Related Articles | Metrics
-
In the process of electronic trades,users trade through the PC browser.Due to the threats of phishing sites and other hacking way, there is a failure risk in the traditional account-password-authentication mode.The existing methods of user Web-browsing-authentication mainly aim at authenticating one aspect of the user’s behaviors.For a large number of users,if the authentication is done only from the single aspect,it is difficult to distinguish the features among similar users,which will result in authentication invalidation.Based on the sequence behavior of user browsing Web,the behavior of hyperlink usage and browser manipulation,a authentication method synthesizing multi-factors was proposed by using the machine learning method.The experimental results show that this method achieves more than 90% detection rate under a certain false positive rate.
-
Pixel Prediction Based Reversible Data Hiding Scheme for Image
项煜东,吴桂兴. 一种基于像素预测的图像可逆信息隐藏策略[J]. 计算机科学, 2018, 45(2): 189-196.
XIANG Yu-dong and WU Gui-xing. Pixel Prediction Based Reversible Data Hiding Scheme for Image[J]. Computer Science, 2018, 45(2): 189-196. - XIANG Yu-dong and WU Gui-xing
- Computer Science. 2018, 45 (2): 189-196. doi:10.11896/j.issn.1002-137X.2018.02.033
-
Abstract
PDF(2180KB) ( 640 )
- References | Related Articles | Metrics
-
The pixel prediction based reversible data hiding is an emerging and state-of-the-art technology for the low distortion and high capacity.In particular,for the prediction based difference expansion (DE) and histogram shift (HS) schemes,an accurate prediction can increase the payload and reduce the distortion simultaneously.This paper proposed a pixel prediction based histogram shift method in order to increase payload and reduce distortion.This method is designed based on the modified warped distance algorithm and the local gradient of an image,which can increase the prediction accuracy and furthermore improve the HS algorithm.Meanwhile,this paper gave some advice about how to avoid overflow after shifting the histogram.Experiments demonstrate that the proposed method outperforms the previous counterparts significantly in terms of both the prediction accuracy and the final embedding performance,and the tradeoff between the payload and the distortion can be run by modifying the embedding level as well.Moreover,the usage of local gradient and the local geometric similarity can improve the payload-distortion performance of reversible data hiding.
-
ABAC Static Policy Conflict and Redundancy Detection Algorithm Based on Mask Key
江泽涛,谢朕,王琦,张文辉. 一种基于屏蔽码的ABAC静态策略冲突与冗余检测算法[J]. 计算机科学, 2018, 45(2): 197-202.
JIANG Ze-tao, XIE Zhen, WANG Qi and ZHANG Wen-hui. ABAC Static Policy Conflict and Redundancy Detection Algorithm Based on Mask Key[J]. Computer Science, 2018, 45(2): 197-202. - JIANG Ze-tao, XIE Zhen, WANG Qi and ZHANG Wen-hui
- Computer Science. 2018, 45 (2): 197-202. doi:10.11896/j.issn.1002-137X.2018.02.034
-
Abstract
PDF(1253KB) ( 412 )
- References | Related Articles | Metrics
-
A static policy conflict detection algorithm based on ordered attribute set and binary mask key was proposed.The algorithm can detect all of the static policy conflicts and redundancy in attribute-based access control model. Compared with the typical violence algorithm and the attribute segmentation algorithm,the proposed algorithm can reduce the time complexity and space complexity .Furthermore,it supports adding and removing attributes from set.New algorithm can meet the requirements of modern complex network environments.
-
Study on Security Enhancement Mechanism of Android System Kernel Based on Security Domain
陈伟,杨秋辉,程雪梅. 基于安全域的Android系统内核安全增强机制研究[J]. 计算机科学, 2018, 45(2): 203-208.
CHEN Wei, YANG Qiu-hui and CHENG Xue-mei. Study on Security Enhancement Mechanism of Android System Kernel Based on Security Domain[J]. Computer Science, 2018, 45(2): 203-208. - CHEN Wei, YANG Qiu-hui and CHENG Xue-mei
- Computer Science. 2018, 45 (2): 203-208. doi:10.11896/j.issn.1002-137X.2018.02.035
-
Abstract
PDF(2564KB) ( 600 )
- References | Related Articles | Metrics
-
Android system is facing challenges on security with its explosive development recently.Android system’s security is composed of system security and software security.System security is the cornerstone of integral security,which is vital to Android.In order to strengthen the system security,this paper proposed an improved domain generation algorithm to enhance the kernel level security mechanism based on TOMOYO Linux.In addition,the experiment shows that the proposed method is efficient to enhance the security of Android system.
-
Modeling for Three Kinds of Network Attacks Based on Temporal Logic
聂凯,周清雷,朱维军,张朝阳. 基于时序逻辑的3种网络攻击建模[J]. 计算机科学, 2018, 45(2): 209-214.
NIE Kai, ZHOU Qing-lei, ZHU Wei-jun and ZHANG Chao-yang. Modeling for Three Kinds of Network Attacks Based on Temporal Logic[J]. Computer Science, 2018, 45(2): 209-214. - NIE Kai, ZHOU Qing-lei, ZHU Wei-jun and ZHANG Chao-yang
- Computer Science. 2018, 45 (2): 209-214. doi:10.11896/j.issn.1002-137X.2018.02.036
-
Abstract
PDF(1253KB) ( 545 )
- References | Related Articles | Metrics
-
Compared with other detection methods,the intrusion detection methods based on temporal logic can detect many complex network attacks effectively.There is no network attack temporal logic formula,so common back,ProcessTable and Saint attacks can not be detected using the above method.Thus,this paper employed propositional interval temporal logic (ITL) and real-time attack signature logic (RASL) to model the temporal logic formula for the three attacks,respectively.In general,based on attack basic principle of the three attacks,the key attack steps are decomposed into atomic actions.Next,this paper defined atomic propositions.Lastly,according to the relationship between the atomicpropositions,this paper constructed the network attack temporal logic formula which is an input of the model checker.In addition,the automaton was used to model the log library as another input of the model checker.The output of the model checker is the result of intrusion detection in the three network attacks.Besides,the intrusion detection method for three attacks was given.
-
Mimic Security Defence Strategy Based on Software Diversity
张宇嘉,庞建民,张铮,邬江兴. 基于软件多样化的拟态安全防御策略[J]. 计算机科学, 2018, 45(2): 215-221.
ZHANG Yu-jia, PANG Jian-min, ZHANG Zheng and WU Jiang-xing. Mimic Security Defence Strategy Based on Software Diversity[J]. Computer Science, 2018, 45(2): 215-221. - ZHANG Yu-jia, PANG Jian-min, ZHANG Zheng and WU Jiang-xing
- Computer Science. 2018, 45 (2): 215-221. doi:10.11896/j.issn.1002-137X.2018.02.037
-
Abstract
PDF(1290KB) ( 674 )
- References | Related Articles | Metrics
-
With the development of reverse engineering,the software industry has suffered a great loss from the software piracy and malicious attack for a long time.Code obfuscation techniques which can hide specific function of a program from malicious analysis for malware is thus frequently employed to mitigate this risk.However,most of the exis-ting obfuscation methods are language embedded and depend on the target architecture,this paper proposed a method of compile-time obfuscation,and further presented a prototype implementedation based on the LLVM compiler infrastructure.Furthermore,this paper implemented a mimic security defence system which is free from malicious attack with the software diversity method.
-
Collision Attack on MIBS Algorithm
段丹青,卫宏儒. 对MIBS算法的碰撞攻击[J]. 计算机科学, 2018, 45(2): 222-225.
DUAN Dan-qing and WEI Hong-ru. Collision Attack on MIBS Algorithm[J]. Computer Science, 2018, 45(2): 222-225. - DUAN Dan-qing and WEI Hong-ru
- Computer Science. 2018, 45 (2): 222-225. doi:10.11896/j.issn.1002-137X.2018.02.038
-
Abstract
PDF(1254KB) ( 481 )
- References | Related Articles | Metrics
-
MIBS algorithm is a lightweight block cipher,which was proposed in 2009.In order to further evaluate its security,the ability of MIBS algorithm against the collision attack was studied.Based on the equivalent structure of MIBS,6-round distinguisher was constructed.By adding two rounds behind the distinguisher and two rounds in front of it in turn,the collision attack was applied to 8/9/10-round MIBS,and the attacking process and complexity analysis were given.The attacking results show that 8/9/10-round MIBS is not immune to collision attack.
-
PCA-AKM Algorithm and Its Application in Intrusion Detection System
牛雷,孙忠林. PCA-AKM算法及其在入侵检测中的应用[J]. 计算机科学, 2018, 45(2): 226-230.
NIU Lei and SUN Zhong-lin. PCA-AKM Algorithm and Its Application in Intrusion Detection System[J]. Computer Science, 2018, 45(2): 226-230. - NIU Lei and SUN Zhong-lin
- Computer Science. 2018, 45 (2): 226-230. doi:10.11896/j.issn.1002-137X.2018.02.039
-
Abstract
PDF(1830KB) ( 392 )
- References | Related Articles | Metrics
-
The initial clustering center is the point or object selected for the first time in the clustering process.Aiming at the instability of clustering results in traditional K-means algorithm caused by choosing the initial clustering centers randomly,the PCA-AKM algorithm was proposed.The algorithm uses the principal component analysis to extract the main components of the data set to achieve data dimensionality reduction,and then uses the self-defined indicators Dw to choose the initial clustering centers,avoiding the clustering center local optimum.Comparison with the K-means algorithm on the UCI data set proves that the clustering stability of the PCA-AKM algorithm is higher than that of K-means.Experiment proves that the algorithm has high detection rate and low false detection rate on KDD CUP99 data set when it is used to simulate intrusion detection,and the algorithm can improve the accuracy of intrusion detection effectively.
-
Novel Network Intrusion Detection Method Based on IPSO-SVM Algorithm
马占飞,陈虎年,杨晋,李学宝,边琦. 一种基于IPSO-SVM算法的网络入侵检测方法[J]. 计算机科学, 2018, 45(2): 231-235.
MA Zhan-fei, CHEN Hu-nian, YANG Jin, LI Xue-bao and BIAN Qi. Novel Network Intrusion Detection Method Based on IPSO-SVM Algorithm[J]. Computer Science, 2018, 45(2): 231-235. - MA Zhan-fei, CHEN Hu-nian, YANG Jin, LI Xue-bao and BIAN Qi
- Computer Science. 2018, 45 (2): 231-235. doi:10.11896/j.issn.1002-137X.2018.02.040
-
Abstract
PDF(1270KB) ( 476 )
- References | Related Articles | Metrics
-
Network intrusion detection has always been the research focus in the field of computer network security,and the current network is facing many potential security problems.In order to improve the accuracy of network intrusion detection,this paper improved the particle swarm optimization (PSO) algorithm,and then optimized the parameters of support vector machine (SVM) by using the improved PSO algorithm.On this basis,this paper also designed a novel network intrusion detection method based on IPSO-SVM algorithm.The experiment results show that the proposed IPSO-SVM algorithm is efficient.Compared with the classical SVM algorithm and PSO-SVM algorithm,IPSO-SVM algorithm not only improves the convergence speed of the network training obviously,but also improves the accuracy rate of network intrusion detection by 7.78% and 4.74% respectively,decreases the false positive rate by 3.37% and 1.19%,and decreases the false negative rate by 1.46% and 0.66%.
-
Surge:A New Low-resource and Efficient Lightweight Block Cipher
李浪,刘波涛. Surge:一种新型、低资源、高效的轻量级分组密码算法[J]. 计算机科学, 2018, 45(2): 236-240.
LI Lang and LIU Bo-tao. Surge:A New Low-resource and Efficient Lightweight Block Cipher[J]. Computer Science, 2018, 45(2): 236-240. - LI Lang and LIU Bo-tao
- Computer Science. 2018, 45 (2): 236-240. doi:10.11896/j.issn.1002-137X.2018.02.041
-
Abstract
PDF(1253KB) ( 546 )
- References | Related Articles | Metrics
-
Lightweight cryptography algorithm has become a hot research.The paper presented a new lightweight block cipher algorithm named Surge.Surge has low resource,high performance and high security.Block length of Surge cipher is 64 bits.Its variable key uses 64,80 or 128-bit length.Surge is based on the SPN structure.The round function is divided into 5 modules.Key expansion module is no expansion.Round-constants add module uses 0 to 15 to combine so that it can achieve efficient and highly confused round-constrants add operation.MixColumn module uses (0,1,2,4) to composite hardware-friendly matrix on the GF (24).Low resource and highly efficient of Surge is attained by this novel design.Surge is implemented and downloaded in FPGA.Experimental results show that it has smaller area resources and better cryptographic properties. The security expriment proves that surge can be against differential and linear attacks,algebraic attacks.
-
Impacts of Correlation Effects among Multi-layer Faults on Software Reliability Growth Processes
弋泽龙,温玉梅,林燕敏,陈伟庭,吕冠宇. 多层缺陷关联效应对软件可靠性增长过程的影响[J]. 计算机科学, 2018, 45(2): 241-248.
YI Ze-long, WEN Yu-mei, LIN Yan-min, CHEN Wei-ting and LV Guan-yu. Impacts of Correlation Effects among Multi-layer Faults on Software Reliability Growth Processes[J]. Computer Science, 2018, 45(2): 241-248. - YI Ze-long, WEN Yu-mei, LIN Yan-min, CHEN Wei-ting and LV Guan-yu
- Computer Science. 2018, 45 (2): 241-248. doi:10.11896/j.issn.1002-137X.2018.02.042
-
Abstract
PDF(3519KB) ( 429 )
- References | Related Articles | Metrics
-
Faults in the software systems,which eventually cause the system failures,are usually connected with each other in complicated ways.Software reliability growth models based on non-homogeneous Poisson processes are widely adopted tools when describing the stochastic failure behavior and measuring the reliability growth in software systems.Considering a group of correlated faults,a new model was built to examine the reliability of software systems and assess the model’s performance from real-world data sets.Numerical studies show that the new model captures correlation effects among multi-layer faults,fits the failure data well and performs better than traditional models.The optimal software release policy,which considers both the reliability requirement and the software testing cost,was also formally studied.It is found that if the correlation effects among different layers of faults are ignored by the software testing team,the best time to release the software package to the market will be much earlier while the overall cost will be much higher.
-
Optimization Method of Low Power Test Vectors Based on Hamming Sorting for X Bits Padding
谈恩民,范玉祥. 一种基于海明排序进行无关位填充的低功耗测试向量优化方法[J]. 计算机科学, 2018, 45(2): 249-253.
TAN En-min and FAN Yu-xiang. Optimization Method of Low Power Test Vectors Based on Hamming Sorting for X Bits Padding[J]. Computer Science, 2018, 45(2): 249-253. - TAN En-min and FAN Yu-xiang
- Computer Science. 2018, 45 (2): 249-253. doi:10.11896/j.issn.1002-137X.2018.02.043
-
Abstract
PDF(1195KB) ( 420 )
- References | Related Articles | Metrics
-
The test power consumption in the process of integrated circuit testing is usually much higher than the normal power consumption of the integrated circuit.However,the high test power consumption may cause the circuit to be damaged or the chip to be burned.An optimization method of low power test vectors based on Hamming sorting for X bits padding was proposed to reduce the test power consumption.Firstly,the test vectors in the test set are ranged from high X bits to low X bits.Then,the test vectors are sorted in ascending order according to the Hamming distance.Finally,the test power consumption is reduced by padding X bits for the sorted test set reasonably,which increases the correlation between test vectors.The ISCAS’85 standard circuit was used as the test object.The experimental results show that compared with using the non-optimized test set,the test power consumption is reduced obviously with the optimized test set.
-
Intuitionistic Fuzzy Numbers Decision-theoretic Rough Sets
陈玉金,李续武. 直觉模糊数决策粗糙集[J]. 计算机科学, 2018, 45(2): 254-260.
CHEN Yu-jin and LI Xu-wu. Intuitionistic Fuzzy Numbers Decision-theoretic Rough Sets[J]. Computer Science, 2018, 45(2): 254-260. - CHEN Yu-jin and LI Xu-wu
- Computer Science. 2018, 45 (2): 254-260. doi:10.11896/j.issn.1002-137X.2018.02.044
-
Abstract
PDF(1258KB) ( 583 )
- References | Related Articles | Metrics
-
The cost function of decision-theoretic rough set does not include fuzzy concept,which can not describe the decision of the fuzzy information discreetly.For the above shortage,firstly,the concept of precise value of loss function was generalized to intuitionistic fuzzy numbers and the intuitionistic fuzzy numbers decision-theoretic rough set was established.Then,the expected loss with intuitionistic fuzzy numbers based on down-ideal and up-ideal was analyzed.The strategies based on conservatism,activism and variable semantics were described and decision rules were derived.The corresponding propositions of the intuitionistic fuzzy numbers decision-theoretic rough sets were analyzed.Finally,an example of disposition schemes for strategic target air-defense operation was given to illuminate the proposed model in applications.
-
Named Entity Recognition Method Based on BLSTM
冯艳红,于红,孙庚,孙娟娟. 基于BLSTM的命名实体识别方法[J]. 计算机科学, 2018, 45(2): 261-268.
FENG Yan-hong, YU Hong, SUN Geng and SUN Juan-juan. Named Entity Recognition Method Based on BLSTM[J]. Computer Science, 2018, 45(2): 261-268. - FENG Yan-hong, YU Hong, SUN Geng and SUN Juan-juan
- Computer Science. 2018, 45 (2): 261-268. doi:10.11896/j.issn.1002-137X.2018.02.045
-
Abstract
PDF(1337KB) ( 1057 )
- References | Related Articles | Metrics
-
Traditional named entity recognition methods directly rely on plenty of hand-crafted features and special domain knowledge,and have resolved the problem that there are few supervised learning corpora which are available.But the costs of developing hand-crafted features and obtaining domain knowledge are expensive.To solve this problem,a neural network model based on BLSTM(Bidirectional Long Short-Term Memory) was proposed.This method does not directly use hand-crafted features and domain knowledge any more,but utilizes the word embedding based on context and word embedding based on characters.The former expresses the information about context of named entities,and the latter expresses the information about prefix,postfix and domain knowledge which make up the named entities.Simultaneously,it constrains the cost function of BLSTM by using the dependency between the labels in tagged sequence,and integrates the domain knowledge into the cost function,furtherly improving the recognition ability of the model.The experiments show that the recognition effect of the method in this paper is superior to traditional methods.
-
Optimization Method of Production Scheduling in Flexible Job
张贵军,丁情,王柳静,周晓根. 柔性车间生产排产调度优化方法[J]. 计算机科学, 2018, 45(2): 269-275.
ZHANG Gui-jun, DING Qing, WANG Liu-jing and ZHOU Xiao-gen. Optimization Method of Production Scheduling in Flexible Job[J]. Computer Science, 2018, 45(2): 269-275. - ZHANG Gui-jun, DING Qing, WANG Liu-jing and ZHOU Xiao-gen
- Computer Science. 2018, 45 (2): 269-275. doi:10.11896/j.issn.1002-137X.2018.02.046
-
Abstract
PDF(4188KB) ( 733 )
- References | Related Articles | Metrics
-
To meet the needs of the production scheduling of flexible manufacturing enterprises,an optimization method for production scheduling was proposed.Firstly,an overall flow of the production scheduling which meets the workshop application requirements and various resource constraints is designed by analyzing the characteristics of the production scheduling problem in the enterprise workshop,and a constraint condition based production objective relation model is presented.Secondly,a differential evolution with dynamic strategy is proposed.In the proposed algorithm,the mutation strategy is dynamically selected according to the crowding degree between each individual in the current population.Moreover,a decoding scheme is designed based on the position of the process.Therefore,the optimal scheduling scheme is obtained to improve the operational efficiency of equipment to maximize the utilization of resources.Finally,the effectiveness of the proposed method is verified by six benchmark functions,FT6-6 scheduling problem and practical example.
-
Important Micro-blog User Recommendation Algorithm Based on Label and PageRank
王嵘冰,安维凯,冯勇,徐红艳. 基于标签和PageRank的重要微博用户推荐算法[J]. 计算机科学, 2018, 45(2): 276-279.
WANG Rong-bing, AN Wei-kai, FENG Yong and XU Hong-yan. Important Micro-blog User Recommendation Algorithm Based on Label and PageRank[J]. Computer Science, 2018, 45(2): 276-279. - WANG Rong-bing, AN Wei-kai, FENG Yong and XU Hong-yan
- Computer Science. 2018, 45 (2): 276-279. doi:10.11896/j.issn.1002-137X.2018.02.047
-
Abstract
PDF(1198KB) ( 616 )
- References | Related Articles | Metrics
-
Massive micro-blog information makes it difficult for new users to obtain the content they are interested in.Important micro-blog user recommendation provides an effective way for new users to access information.At present,inadequate consideration of the relationship between users and the lack of user personalized label processing make the recommendation accuracy of important micro-blog user be not high.Therefore, an important micro-blog user recommendation algorithm based on label and PageRank was proposed.Firstly,the personalized label is processed by word segmentation,de-noising and setting weight,and the processed result is used as the representative of user interest.Se-condly,the relationship between users is analyzed by PageRank calculation model.Finally,important micro-blog users are recommended to new users with similar interests by label similarity calculation.The experiment shows that the proposed algorithm improves the recommendation accuracy of important micro-blog users compared with the recommendation algorithm based on label and collaborative filtering,because the analysis of the importance of micro-blog user relationship and user’s personalized label is integrated into this algorithm.
-
Cross Evaluation Method Based on Intuitionistic Fuzzy Entropy
范建平,薛坤,吴美琴. 基于直觉模糊熵的交叉评价方法[J]. 计算机科学, 2018, 45(2): 280-286.
FAN Jian-ping, XUE Kun and WU Mei-qin. Cross Evaluation Method Based on Intuitionistic Fuzzy Entropy[J]. Computer Science, 2018, 45(2): 280-286. - FAN Jian-ping, XUE Kun and WU Mei-qin
- Computer Science. 2018, 45 (2): 280-286. doi:10.11896/j.issn.1002-137X.2018.02.048
-
Abstract
PDF(1264KB) ( 517 )
- References | Related Articles | Metrics
-
This paper endeavored to extend the secondary goal model based on the relative closeness to the fuzzy environment and made full use of fuzzy information.Then,this paper proposed a new method to convert triangular fuzzy efficiency to intuitionistic fuzzy set,so that it can integrate the fuzzy efficiency with intuitionistic fuzzy entropy.After that,ternary directional distance index was used to rank the whole fuzzy efficiencies.At last,the citation efficiencies of ten management science and system science journals which are identified as the important journals by Management Scien-ce Department of National Natural Science Foundation of China in 2011 were analyzed to illustrate the feasibility and validity of the proposed method.
-
Study on Fast Incremental Clustering Algorithm for High Complexity Dynamic Data in Cloud Computing Environment
陈赣浪,颜飞龙,潘家辉. 云计算环境下高复杂度动态数据的增量密度快速聚类算法研究[J]. 计算机科学, 2018, 45(2): 287-290.
CHEN Gan-lang, YAN Fei-long and PAN Jia-hui. Study on Fast Incremental Clustering Algorithm for High Complexity Dynamic Data in Cloud Computing Environment[J]. Computer Science, 2018, 45(2): 287-290. - CHEN Gan-lang, YAN Fei-long and PAN Jia-hui
- Computer Science. 2018, 45 (2): 287-290. doi:10.11896/j.issn.1002-137X.2018.02.049
-
Abstract
PDF(1187KB) ( 350 )
- References | Related Articles | Metrics
-
In order to solve the problems that the traditional clustering algorithm has the disadvantages of high cost,poor clustering quality and slow clustering speed,this paper proposed a new fast clustering algorithm based on incremental density of high complexity dynamic data in cloud computing environment.First of all,on the basis of density under the environment of high complexity of dynamic data clustering in cloud computing,this algorithm finds some subspace from the data space.The data mapped to the space area can produce high density point set,and the set of connec-ted regions is regarded as the clustering results.Secondly,it executes incremental clustering by DBSCAN algorithm, and studies the original clustering merger or split caused by inserting or deleting data.Finally,by dealing with all the core data in the neighborhood of changing the core status in the process of updating,the incremental clustering is analyzed from two aspects of inserting or deleting data.The experimental results show that the proposed algorithm has the cha-racteristics of low cost,fast clustering speed and high clustering quality.
-
Early Classification of Time Series Based on Piecewise Aggregate Approximation
马超红,翁小清. 基于PAA的时间序列早期分类[J]. 计算机科学, 2018, 45(2): 291-296.
MA Chao-hong and WENG Xiao-qing. Early Classification of Time Series Based on Piecewise Aggregate Approximation[J]. Computer Science, 2018, 45(2): 291-296. - MA Chao-hong and WENG Xiao-qing
- Computer Science. 2018, 45 (2): 291-296. doi:10.11896/j.issn.1002-137X.2018.02.050
-
Abstract
PDF(1274KB) ( 614 )
- References | Related Articles | Metrics
-
Early classification on time series is more and more significant in the field of time series data ming.As the high dimension of time series data,it is of highly necessary to choose an efficient and appreciate dimensionality reduction method in the practical application of early classification on time series.Thus,this paper aimed at applying piecewise aggregate approximation to time series data,and then implemented early classification in lower dimension.In addition,through making comparison with some existing methods,the experiments were carried on in forty-three datasets.The experimental result indicates that this proposal is better than other existing methods in accuracy,earliness and reliability.
-
Color Image Enhancement Algorithm Based on Lab Color Space and Tone Mapping
赵军辉,吴玉峰,胡坤融,蒲斌. 基于Lab色彩空间和色调映射的彩色图像增强算法[J]. 计算机科学, 2018, 45(2): 297-300.
ZHAO Jun-hui, WU Yu-feng, HU Kun-rong and PU Bin. Color Image Enhancement Algorithm Based on Lab Color Space and Tone Mapping[J]. Computer Science, 2018, 45(2): 297-300. - ZHAO Jun-hui, WU Yu-feng, HU Kun-rong and PU Bin
- Computer Science. 2018, 45 (2): 297-300. doi:10.11896/j.issn.1002-137X.2018.02.051
-
Abstract
PDF(3433KB) ( 760 )
- References | Related Articles | Metrics
-
According to the detail preserving and color constancy problems in the low illumination image enhancement processing,this paper proposed a novel Retinex enhancement algorithm based on Lab color space and color mapping image contrast.Firstly,the input image of Lab color space with a low contrast is decomposed into luminance and chrominance components,and adaptive bilateral filtering is used for estimation of illumination intensity,so that appropriate adjacent pixels can be considered according to the brightness and color values.Then the tone mapping function based on the parabola is used to improve the contrast of the estimation of illumination image.Finally,the enhanced brightness and the original chroma are combined together to produce an enhanced color output image.Experimental results show that the proposed algorithm can enhance the image details and edge structure by reducing the image artifacts, and can preserve the image’s nature by avoiding the color shift.
-
Multi-focus Image Fusion Based on Redundant Wavelet Transform and Guided Filtering
杨艳春,李娇,党建武,王阳萍. 基于冗余小波变换与引导滤波的多聚焦图像融合[J]. 计算机科学, 2018, 45(2): 301-305.
YANG Yan-chun, LI Jiao, DANG Jian-wu and WANG Yang-ping. Multi-focus Image Fusion Based on Redundant Wavelet Transform and Guided Filtering[J]. Computer Science, 2018, 45(2): 301-305. - YANG Yan-chun, LI Jiao, DANG Jian-wu and WANG Yang-ping
- Computer Science. 2018, 45 (2): 301-305. doi:10.11896/j.issn.1002-137X.2018.02.052
-
Abstract
PDF(1249KB) ( 604 )
- References | Related Articles | Metrics
-
For the problem of edge halo in multi-focus image fusion based on traditional multi-scale transform,this paper proposed a novel method of image fusion based on redundant wavelet transform and guided filtering.Firstly,the source images are decomposed by the redundant wavelet transform,and a similar plane and a series of wavelet planes are obtained.The multi-scale decomposition can effectively extract the detail information in the source images.Then the weighted fusion rules of guided filtering are respectively used in the similar plane and the wavelet planes,and the weighted maps are constructed to obtain the weighted fusion coefficients of the similar plane and the wavelet planes.Finally,the redundant wavelet inverse transform is used to obtain the fusion image.The experiment results show that the proposed method can better reflect edge detail features of the images and can achieve better fusion results compared with the traditional fusion methods.
-
Multi-person Behavior Recognition Method Based on Convolutional Neural Networks
龚安,费凡,郑君. 基于卷积神经网络的多人行为识别方法[J]. 计算机科学, 2018, 45(2): 306-311.
GONG An, FEI Fan and ZHENG Jun. Multi-person Behavior Recognition Method Based on Convolutional Neural Networks[J]. Computer Science, 2018, 45(2): 306-311. - GONG An, FEI Fan and ZHENG Jun
- Computer Science. 2018, 45 (2): 306-311. doi:10.11896/j.issn.1002-137X.2018.02.053
-
Abstract
PDF(5002KB) ( 796 )
- References | Related Articles | Metrics
-
In order to solve the problems in multi-person behavior recognition,for example,it is difficult to distinguish many characters,it is difficult to express and learn increased feature dimension of image,the behavior background is complex and it is easy to cause interference,this paper proposed a method of multiplayer behavior recognition based on convolutional neural network.At first,considering the complexity of multi-person behavior recognition,the simple two-person interactive behavior is choosen as the research object and the picture database is collected.Then,because multiplayer behavior recognition has complicated background and many features in the recognition progress,a method using the Dense-sift algorithm for feature pretreatment mode is proposed.Against the complexity of the multiplayer behavior recognition,this network makes various modifications,such as input dimensions which is expanded to include layer convolution,convolution kernel increasing,output reduction,etc.Experimental results show that the proposed method can recognize simple multi-person behavior recognition,such as boxing,hug and kissing effectively.
-
Image Denoising Optimization Algorithm Combined with Visual Saliency
赵杰,马玉娇,刘帅奇. 结合视觉显著性的图像去噪优化算法[J]. 计算机科学, 2018, 45(2): 312-317.
ZHAO Jie, MA Yu-jiao and LIU Shuai-qi. Image Denoising Optimization Algorithm Combined with Visual Saliency[J]. Computer Science, 2018, 45(2): 312-317. - ZHAO Jie, MA Yu-jiao and LIU Shuai-qi
- Computer Science. 2018, 45 (2): 312-317. doi:10.11896/j.issn.1002-137X.2018.02.054
-
Abstract
PDF(1274KB) ( 602 )
- References | Related Articles | Metrics
-
The image is disturbed by noise in the process of sampling,processing,transmission and storage,which leads to the decline of the visual information of image.Based on the difference of sensitivity of the human eyes to the noise in different regions,this paper put forward an improved image denoising algorithm combined with visual significance.Firstly,the algorithm preprocesses the image by visual significance,and gets the interesting region in the image.Then this paper used the BM3D algorithm,which can better protect the image texture,to denoise this region,and used the arithmetic mean filter algorithm with faster computing speed to denoise the non-interest region.The results show that the proposed method can not only obtain higher subjective image quality evaluation,but also reduce the computational time by using BM3D algorithm.
-
Local Feature Fuzzy Segmentation Algorithm for Single Defocused Image
王亮,田萱. 单幅散焦图像的局部特征模糊分割算法[J]. 计算机科学, 2018, 45(2): 318-321.
WANG Liang and TIAN Xuan. Local Feature Fuzzy Segmentation Algorithm for Single Defocused Image[J]. Computer Science, 2018, 45(2): 318-321. - WANG Liang and TIAN Xuan
- Computer Science. 2018, 45 (2): 318-321. doi:10.11896/j.issn.1002-137X.2018.02.055
-
Abstract
PDF(1207KB) ( 481 )
- References | Related Articles | Metrics
-
At present,the fuzzy segmentation algorithm of local features does not preprocess a single defocused image,resulting in low definition of the single defocused image and affecting the segmentation effect.The original fuzzy segmentation algorithm requires a large number of pixel labels in the process of pixel segmentation,and its segmentation process is complicated.Therefore,this paper proposed a method of using immune spectral clustering algorithm to excute fuzzy segmentation of the local features for a single defocused image .Firstly,the local fuzzy image is blurred again by using the method of block.Then,the variation of the singular value for the defocused image is compared,and the defocused image is identified based on this variation.Finally,the singular value features of a single defocused image are extracted,and the local features of a single defocused image are blurred.The spectral clustering method is used to cluster the pixels in the defocused image and the Nystrm approximation method is used to calculate the eigenvectors of the pixel similarity matrix,which reduces the computational complexity.The immune algorithm improves the accuracy of the clustering results and ensures the fuzzy segmentation results of the local features for defocused images.The experimental results show that the proposed algorithm can effectively segment the defocused image,the segmentation result is better and the calculation process is simpler.