Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Data analysis method for parallel DHP based on Hadoop
YANG Yanxia, FENG Lin
Journal of Computer Applications    2016, 36 (12): 3280-3284.   DOI: 10.11772/j.issn.1001-9081.2016.12.3280
Abstract624)      PDF (830KB)(385)       Save
It is a bottleneck of Apriori algorithm for mining association rules that the candidate set C 2 is used to generate the frequent 2-item set L 2. In the Direct Hashing and Pruning (DHP) algorithm, a generated Hash table H 2 is used to delete the unused candidate item sets in C 2 for improving the efficiency of generating L 2. However,the traditional DHP is a serial algorithm, which cannot effectively deal with large scale data. In order to solve the problem, a DHP parallel algorithm, termed H_DHP algorithm, was proposed. First, the feasibility of parallel strategy in DHP was analyzed and proved theoretically. Then, the generation method for the Hash table H 2 and frequent item sets L 1, L 3- L k was developed in parallel based on Hadoop, and the association rules were generated by Hbase database. The simulation experimental results show that, compared with the DHP algorithm, the H_DHP algorithm has better performance in the processing efficiency of data, the size of the data set, the speedup and scalability.
Reference | Related Articles | Metrics
Secret information sharing algorithm based on CL multi-wavelet and combination bit plane for confidential communication
ZHANG Tao REN Shuai JU Yongfeng LING Rao YANG Zhaohui
Journal of Computer Applications    2013, 33 (11): 3232-3234.  
Abstract631)      PDF (490KB)(378)       Save
In view of the contradiction between capability, invisibility and robustness of the existing information hiding algorithms, a preprocessing algorithm for digital image based on CL (Chui-Lian) multi-wavelet transform and Combination Bit Plane (CBP) was proposed. Then the digital image preprocessed by CL multi-wavelet and CBP was taken as the cover image to embed secret information for confidential communication and image sharing. CL multi-wavelet transform could divide the cover image into four lowest resolution sub-images with different energy level. And CBP method could analyze the above four sub-images into different bit planes as the final embedding regions. During the hiding procedure, robust information, secret information and fragile information could be embedded according to the energy and robustness characteristics of the embedding regions. The experimental results show that the robustness against several common attacks described in this paper has certain enhancement compared with other two methods when the embedding rate is 25%. The Peak Signal-to-Noise Ratio (PSNR) is increased by 37.16% and 20.00% respectively compared with Discrete Cosine Transform-Least Significant Bit (DCT-LSB) and Discrete Wavelet Transform -Least Significant Bit (DWT-LSB) algorithm.
Related Articles | Metrics
New algorithm for computing attribute core in decision tables
FENG Lin
Journal of Computer Applications    2010, 30 (4): 1086-1088.  
Abstract1198)      PDF (440KB)(983)       Save
Attribute reduction is one of the key problems in rough set theory, and determination of core attribute is the basis to solve the problem of attribute reduction. First, by using the tree structure knowledge expression in the decision table, an approach for computing positive and negative regions was introduced. Next, according to changes of positive and negative regions in tree structure decision table relative to the conditional attribute set, an algorithm for computing core attributes was developed. An efficiency of the proposed methods was illustrated by time and space complexities analysis and experimental result in a weather decision table.
Related Articles | Metrics
On computer networks and grid service
ZENG Hua-shen, LI Ji, FENG Lin, GONG Xun
Journal of Computer Applications    2005, 26 (07): 1475-1478.   DOI: 10.3724/SP.J.1087.2005.01475
Abstract1296)            Save

Grid service provides a distributed computing service over heterogeneous network environment by taking the advantage of the Web Service. The relationship among grid system and network systems, especially the Web Service system, was examined in the perspective of computer network architecture. An emphasis has been given to clarification of Open Grid Service Architecture(OGSA), in which some of layers irrelevant to network functionality (outside of the scope of OSI/RM) were miss-represented in early documents.

Reference | Related Articles | Metrics
On computer networks and grid service
ZENG Hua-shen, LI Ji, FENG Lin, GONG Xun
Journal of Computer Applications    2005, 25 (07): 1475-1478.   DOI: 10.3724/SP.J.1087.2005.01475
Abstract842)      PDF (727KB)(912)       Save

Grid service provides a distributed computing service over heterogeneous network environment by taking the advantage of the Web Service. The relationship among grid system and network systems, especially the Web Service system, was examined in the perspective of computer network architecture. An emphasis has been given to clarification of Open Grid Service Architecture(OGSA), in which some of layers irrelevant to network functionality (outside of the scope of OSI/RM) were miss-represented in early documents.

Reference | Related Articles | Metrics
Heuristic algorithm of user session identification based on ExLF Log file format
FENG Lin, HE Ming-rui, LUO Fen
Journal of Computer Applications    2005, 25 (02): 314-316.   DOI: 10.3724/SP.J.1087.2005.0314
Abstract1057)      PDF (126KB)(1060)       Save

Based on ExLF Log file format, the Session Tabel was defined, and the conception of user session graph was expounded in detail. A heuristic algorithm of creating graph of user sessions identification was presented. At last, an example illustrated the efficiency of this algorithm.

Related Articles | Metrics