Toggle navigation
Home
About
About Journal
Historical Evolution
Indexed In
Awards
Reference Index
Editorial Board
Journal Online
Archive
Project Articles
Most Download Articles
Most Read Articles
Instruction
Contribution Column
Author Guidelines
Template
FAQ
Copyright Agreement
Expenses
Academic Integrity
Contact
Contact Us
Location Map
Subscription
Advertisement
中文
Journals
Publication Years
Keywords
Search within results
(((CHEN Huan[Author]) AND 1[Journal]) AND year[Order])
AND
OR
NOT
Title
Author
Institution
Keyword
Abstract
PACS
DOI
Please wait a minute...
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Business data security of system wide information management based on content mining
MA Lan, WANG Jingjie, CHEN Huan
Journal of Computer Applications 2019, 39 (
2
): 488-493. DOI:
10.11772/j.issn.1001-9081.2018071449
Abstract
(
437
)
PDF
(1015KB)(
283
)
Knowledge map
Save
Considering the data security problems of service sharing in SWIM (System Wide Information Management), the risks in the SWIM business process were analyzed, and a malicious data filtering method based on Latent Dirichlet Allocation (LDA) topic model and content mining was proposed. Firstly, big data analysis was performed on four kinds of SWIM business data, then LDA model was used for feature extraction of business data to realize content mining. Finally, the pattern string was searched in the main string by using KMP (Knuth-Morris-Pratt) matching algorithm to detect SWIM business data containing malicious keywords. The proposed method was tested in the Linux kernel. The experimental results show that the proposed method can effectively mine the content of SWIM business data and has better detection performance than other methods.
Reference
|
Related Articles
|
Metrics
Select
Knowledge driven automatic annotating algorithm for game strategies
CHEN Huanhuan, CHEN Xiaohong, RUAN Tong, GAO Daqi, WANG Haofen
Journal of Computer Applications 2017, 37 (
1
): 278-283. DOI:
10.11772/j.issn.1001-9081.2017.01.0278
Abstract
(
546
)
PDF
(996KB)(
450
)
Knowledge map
Save
To help users to quickly retrieve the interesting game strategies, a knowledge driven automatic annotating algorithm for game strategies was proposed. In the proposed algorithm, the game domain knowledge base was built automatically by fusing multiple sites that provide information for each game. By using the game domain vocabulary discovering algorithm and decision tree classification model, game terms of the game strategies were extracted. Since most terms existing in the strategies in the form of abbreviation, the game terms were finally linked to knowledge base to generate the full name semantic tags for them. The experimental results on many games show that the precision of the proposed game strategy annotating method is as high as 90%. Moreover, the game domain vocabulary discovering algorithm has a better result compared with the
n
-gram language model.
Reference
|
Related Articles
|
Metrics
Select
Small fault detection method of instruments based on independent component subspace algorithm and ensemble strategy
HU Jichen HUANG Guoyong SHAO Zongkai WANG Xiaodong ZOU Jinhui
Journal of Computer Applications 2013, 33 (
07
): 2063-2066. DOI:
10.11772/j.issn.1001-9081.2013.07.2063
Abstract
(
647
)
PDF
(605KB)(
409
)
Knowledge map
Save
To solve the problem of small fault detection of instruments in process industry, independent components were extracted by Independent Component Analysis (ICA) from instruments recorded data. And independent component subspaces were established according to the contribution matrix. Fault detection model was constructed in each independent component subspace with statistical variables. A proper ensemble strategy was chosen by combining all the fault detection results. Finally, the instrument with fault was located by contribution algorithm. The simulation results with TE (Tennessee Eastman) process show that this method has higher precision on small fault detection and more flexibility with proper ensemble strategy.
Reference
|
Related Articles
|
Metrics
Select
Multi-population invasive weed optimization algorithm based on chaotic sequence
CHEN Huan ZHOU Yong-quan ZHAO Guang-wei
Journal of Computer Applications 2012, 32 (
07
): 1958-1961. DOI:
10.3724/SP.J.1087.2012.01958
Abstract
(
1043
)
PDF
(583KB)(
758
)
Knowledge map
Save
Concerning the premature convergence of invasive weed optimization algorithm, a new invasive weed optimization with multi-population based on chaotic sequence (CMIWO) was proposed. Firstly, chaotic sequence was adopted to initialize population at the initialization of algorithm, which improved the quality of the initial solution. Secondly, threshold was used to estimate the cluster degree of individuals in iterations and if cluster degree was less than threshold, initializing population with chaotic sequence was implemented again, thus the algorithm could effectively jump out of local minima. Thirdly, the weed population was divided into five groups to collaborate so as to discourage premature convergence, thus improving the algorithm's precision and increasing the convergence speed. In the end, the test results on eight test functions show that the proposed algorithm improves the accuracy by 25% to 300% than basic algorithm in terms of optimal value and 50% to 100% for standard deviation.
Reference
|
Related Articles
|
Metrics