Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Spectral clustering algorithm based on differential privacy protection
ZHENG Xiaoyao, CHEN Dongmei, LIU Yuqing, YOU Hao, WANG Xiangshun, SUN Liping
Journal of Computer Applications    2018, 38 (10): 2918-2922.   DOI: 10.11772/j.issn.1001-9081.2018040888
Abstract725)      PDF (753KB)(401)       Save
Aiming at the problem of privacy leakage in the application of traditional clustering algorithm, a spectral clustering algorithm based on differential privacy protection was proposed. Based on the differential privacy model, the cumulative distribution function was used to generate random noise that satisfies Laplasse distribution. Then the noise was added to the sample similarity function calculated by the spectral clustering algorithm, which disturbed the weight values between the individual samples and realized information hiding between sample individuals for privacy protection. Experimental results of UCI dataset verify that the proposed algorithm can achieve effective data clustering within a certain degree of information loss, and can also protect clustered data.
Reference | Related Articles | Metrics
Overview on feature selection in high-dimensional and small-sample-size classification
WANG Xiang, HU Xuegang
Journal of Computer Applications    2017, 37 (9): 2433-2438.   DOI: 10.11772/j.issn.1001-9081.2017.09.2433
Abstract1110)      PDF (1146KB)(1244)       Save

With the development of bioinformatics, gene expression microarray and image recognition, classification on high-dimensional and small-sample-size data has become a challenging task in data ming, machine learning and pattern recognition as well. High-dimensional and small-sample-size data may cause the problem of "curse of dimensionality" and overfitting. Feature selection can prevent the "curse of dimensionality" effectively and promote the generalization ability of classification mode, and thus become a hot research topic. Accordingly, some recent development of world-wide research on feature selection in high-dimensional and small-sample-size classification was briefly reviewed. Firstly, the nature of high-dimensional and small-sample feature selection was analyzed. Secondly, according to their essential difference, feature selection algorithms for high-dimensional and small-sample-size classification were divided into four categories and compared to summarize their advantages and disadvantages. Finally, challenges and prospects for future trends of feature selection in high-dimensional small-sample-size data were proposed.

Reference | Related Articles | Metrics
MSNV:network structure visualization method based on multi-level community detection
WANG Xiangang, YAO Zhonghua, SONG Hanchen
Journal of Computer Applications    2016, 36 (5): 1347-1351.   DOI: 10.11772/j.issn.1001-9081.2016.05.1347
Abstract471)      PDF (928KB)(502)       Save
Focused on the issue that large-scale network has characteristics of huge number of nodes, high structural complexity and difficulty to demonstrate its structural characteristics by the limited screen space, a multi-level network visualization method based on community detection was proposed. Firstly, a community detection algorithm based on network modularity was used to detect the network node and a greedy algorithm was used to find the community detection with maximum modularity to get different level of granularity communities. Then, in order to solve the problem that the Force-Directed Algorithm (FDA) could not display network nodes hierarchically, the classic FDA was improved by setting the level blinding force to achieve hierarchical layout of different level of granularity communities. Finally, high level communities and low level nodes were displayed respectively by using the interactive method such as multi-window view and Overview+Detail, meeting the requirement of both network high-level macrostructure and low-level details of the display. In the simulation test, the community detection algorithm is faster and more accurate compared to self-contained GN (Girvan-Newman) algorithm. The theoretical analysis and simulation results show that the proposed method has good effect and performance in display and interaction of large-scale network structure.
Reference | Related Articles | Metrics
Generalized hybrid dislocated function projective synchronization between different-order chaotic systems and its application to secure communication
LI Rui ZHANG Guangjun ZHU Tao WANG Xiangbo WANG Yu
Journal of Computer Applications    2014, 34 (7): 1915-1918.   DOI: 10.11772/j.issn.1001-9081.2014.07.1915
Abstract214)      PDF (684KB)(490)       Save

In order to improve the security of secure communication, a new Generalized Hybrid Dislocated Function Projective Synchronization (GHDFPS) based on generalized hybrid dislocated projective synchronization and function projective synchronization was researched by Lyapunov stability theory and adaptive active control method. At the same time, the control methods of GHDFPS between two different-order chaotic systems with uncertain parameter and parameter identification were presented, and the application of the novel synchronization on secure communication was analyzed. By strict mathematical proof and numerical simulation, the GHDFPS between two different-order chaotic systems with uncertain parameter were achieved, the uncertain parameter was identified. Because of the variety of function scaling factor matrix, the security of secure communication has been increased by GHDFPS. Moreover, this synchronization form and method of control were applied to secure communication via chaotic masking modulation. Many information signals can be recovered and validated.

Reference | Related Articles | Metrics
Algorithm of edge extraction in intensively noisy log-polar space
WEN Pengcheng ZHANG Yadi WANG Xiangjun
Journal of Computer Applications    2013, 33 (06): 1695-1700.   DOI: 10.3724/SP.J.1087.2013.01695
Abstract743)      PDF (455KB)(621)       Save
Accurate extraction of a target’s edge in a log-polar space is a precondition and key point to successfully apply the visual invariance of the log-polar transformation. Since it is impossible for traditional algorithms to extract the single-pixel edge in an intensively noisy environment, a unique edge extraction algorithm on the basis of active contour model and level set method was designed. After noise removal on the whole via Canny operator based level set method, the energy-driving active contour model was used to iteratively approach the potential edges. By clearing out false edges with an improved tracing way, the true target’s edge was extracted finally. The experimental results demonstrate the effective performance of the proposed algorithm with the edge feature similarity up to 96%.
Reference | Related Articles | Metrics
Efficient key management protocol based on matrix space
ZHANG Cai-xia CHENG Liang-lun WANG Xiang-dong
Journal of Computer Applications    2012, 32 (06): 1605-1608.   DOI: 10.3724/SP.J.1087.2012.01605
Abstract1052)      PDF (662KB)(427)       Save
Related Articles | Metrics
Artificial bee colony algorithm based on chaos local search operator
Wang Xiang LI Zhi-yong XU Guo-yi WANG Yan
Journal of Computer Applications    2012, 32 (04): 1033-1036.   DOI: 10.3724/SP.J.1087.2012.01033
Abstract2966)      PDF (730KB)(541)       Save
In order to improve the ability of Artificial Bee Colony (ABC) algorithm at exploitation, a new Chaos Artificial Bee Colony (CH-ABC) algorithm was proposed for continuous function optimization problems. A new chaotic local search operator was embedded in the framework of the new algorithm. The new operator, whose search radius shrinks with the evolution generation, can do the local search around the best food source. The simulation results show that: compared with those of ABC algorithm, the solution quality and the convergence speed of the new algorithm are better for Rosenbrock and the convergence speed of the new algorithm is better for Griewank and Rastrigin.
Reference | Related Articles | Metrics
Using uncertainty DHT to solve non-transitive connectivity problems in overlay network
WANG Xiang-Hui 王向辉 Guo-Yin ZHANG
Journal of Computer Applications   
Abstract2071)      PDF (768KB)(932)       Save
In order to resolve the widely existing problem of Non-Transitive Connectivity (NTC) in networks, a uncertainty Distributed Hash Tables (DHT) method to resolve the NTC problem in overlay network was proposed. The relationship of bottom node ID and logical space location was lifted to avoid infection of network structure by NTC nodes, and redirection route mechanism was used to implement the message routing of network. Simulation shows that uncertainty DHT could effectively resolve the NTC problem in overlay network.
Related Articles | Metrics
Artificial neural net model analysis of desktop’s color and illuminance
WANG xiang,WANG Feng-hu,SUN Jian-ping
Journal of Computer Applications    2005, 25 (11): 2685-2687.  
Abstract1424)      PDF (656KB)(1022)       Save
An artificial neural net(ANN) model was established for considering multi physical factors’ effects on reading environment.Typical back-propagation net(BP net) with three layers was selected with input parameters of illuminance and desktop’s brightness,outputing relative reading gross and reading accuracy.The ANN model could consider several factors’ effects on reading working at the same time,figuring out multi-parameters and strong coupling in reading environment.Using the ANN model,illuminance and brightness were analyzed,and relative reading gross and reading accuracy were calculated under different reading environments.
Related Articles | Metrics
New kernel generalized optimal feature extraction method
XU Chun-ming,ZHANG Tian-ping,WANG Zheng-qun,WANG Xiang-dong
Journal of Computer Applications    2005, 25 (09): 2134-2136.   DOI: 10.3724/SP.J.1087.2005.02134
Abstract1101)      PDF (201KB)(775)       Save
Based on the theory of kernel generalized optimal feature extracted mode,a new method for the corresponding mode was proposed.Firstly space transform method was used to transform initial kernel between class scatter matrix and kernel total scatter matrix,so the kernel total scatter matrix became positive definition. At the same time,by the means of kernel uncorrelated feature vectors extraction,the feature vectors got were statistical uncorrelated.To verify the effectiveness of this method,experiment was tested on ORL face databases and the result showed that the face recognition method proposed is more available than other methods such as kernel discriminant analysis.
Related Articles | Metrics