首页 > 最新文献

2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)最新文献

英文 中文
A designated verifier signature scheme with undeniable property in the random oracle 随机数据库中具有不可否认属性的指定验证者签名方案
Xiaoming Hu, Xiaojun Zhang, Chuang Ma, Huajie Xu, Jian Wang, Wenan Tan
In designated verifier signature, only the designated verifier can confirm the validity of a signature and it is applied widely in many environments such as electronic voting. However, most of designated verifier signature schemes cannot distinguish the real signer when the signer and the designated verifier arises a dispute on a signature. In other words, most of existing designated verifier signature schemes have not the undeniable property, namely the signer can deny a generated signature or the designated verifier can deny a simulating signature. In this paper, two designated verifier signature schemes with undeniable property are proposed. The first designated verifier signature scheme with undeniable property is called DVSSWUP-1 and another is called DVSSWUP-2. The both schemes satisfy the unforgeability and non-transferability. What's more, when the signer or the designated verifier denies the signature, a third party can distinguish the signature. Therefore, the proposed two designated verifier signature schemes not only protect the privacy of the signer but also keep the undeniable property of the traditional digital signature schemes.
在指定验证者签名中,只有指定的验证者才能确认签名的有效性,在电子投票等环境中得到了广泛的应用。然而,当签名者和指定验证者对签名产生争议时,大多数指定验证者签名方案无法区分真正的签名者。也就是说,现有的大多数指定验证者签名方案都不具有不可否认性,即签名者可以否认生成的签名,或者指定验证者可以否认模拟签名。本文提出了两种具有不可否认性质的指定验证者签名方案。第一个具有不可否认属性的指定验证者签名方案称为DVSSWUP-1,另一个称为DVSSWUP-2。两种方案均满足不可伪造性和不可转移性。更重要的是,当签名者或指定的验证者否认签名时,第三方可以识别签名。因此,本文提出的两种指定验证者签名方案既保护了签名者的隐私,又保持了传统数字签名方案的不可否认性。
{"title":"A designated verifier signature scheme with undeniable property in the random oracle","authors":"Xiaoming Hu, Xiaojun Zhang, Chuang Ma, Huajie Xu, Jian Wang, Wenan Tan","doi":"10.1109/ICSESS.2016.7883225","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883225","url":null,"abstract":"In designated verifier signature, only the designated verifier can confirm the validity of a signature and it is applied widely in many environments such as electronic voting. However, most of designated verifier signature schemes cannot distinguish the real signer when the signer and the designated verifier arises a dispute on a signature. In other words, most of existing designated verifier signature schemes have not the undeniable property, namely the signer can deny a generated signature or the designated verifier can deny a simulating signature. In this paper, two designated verifier signature schemes with undeniable property are proposed. The first designated verifier signature scheme with undeniable property is called DVSSWUP-1 and another is called DVSSWUP-2. The both schemes satisfy the unforgeability and non-transferability. What's more, when the signer or the designated verifier denies the signature, a third party can distinguish the signature. Therefore, the proposed two designated verifier signature schemes not only protect the privacy of the signer but also keep the undeniable property of the traditional digital signature schemes.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124773665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implementation of the network video data acquisition system 网络视频数据采集系统的设计与实现
Feifei Guo, Yu Liang
Big data technology plays a role in promoting the development of Internet video, and data has become an important carrier for users and network video platform to dig the effect of video communication, guide the video production, and master the user's behavior habits. This system establishes the conceptual process from data acquisition, data processing, data visualization. This article makes analysis and research from the following aspects: the URL extraction module, data acquisition module, data processing module, data visualization module and other functions. For the front page, the system adopts HTML+CSS+JavaScript, for data acquisition core module, the system uses DOM to operate the HTML page node to complete data crawling, and uses MVC architecture of CodeIgniter combined with Ajax technology to achieve the separation between the logical layer data acquisition program and application layer access page . For data visualization, Highcharts is used to display the data so that the data has a better interactivity and presentation capabilities.
大数据技术对互联网视频的发展起到了推动作用,数据已经成为用户和网络视频平台挖掘视频传播效果、指导视频制作、掌握用户行为习惯的重要载体。该系统建立了从数据采集、数据处理、数据可视化的概念流程。本文从以下几个方面进行分析和研究:URL提取模块、数据采集模块、数据处理模块、数据可视化模块等功能。对于首页,系统采用HTML+CSS+JavaScript,对于数据采集核心模块,系统采用DOM操作HTML页面节点完成数据抓取,采用CodeIgniter的MVC架构结合Ajax技术实现逻辑层数据采集程序与应用层访问页面的分离。对于数据可视化,Highcharts用于显示数据,以便数据具有更好的交互性和表示功能。
{"title":"Design and implementation of the network video data acquisition system","authors":"Feifei Guo, Yu Liang","doi":"10.1109/ICSESS.2016.7883121","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883121","url":null,"abstract":"Big data technology plays a role in promoting the development of Internet video, and data has become an important carrier for users and network video platform to dig the effect of video communication, guide the video production, and master the user's behavior habits. This system establishes the conceptual process from data acquisition, data processing, data visualization. This article makes analysis and research from the following aspects: the URL extraction module, data acquisition module, data processing module, data visualization module and other functions. For the front page, the system adopts HTML+CSS+JavaScript, for data acquisition core module, the system uses DOM to operate the HTML page node to complete data crawling, and uses MVC architecture of CodeIgniter combined with Ajax technology to achieve the separation between the logical layer data acquisition program and application layer access page . For data visualization, Highcharts is used to display the data so that the data has a better interactivity and presentation capabilities.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129462608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A two-layer cloud database model and its bidirectional conversion algorithms 一种双层云数据库模型及其双向转换算法
Ying Li, Yuling Lu
The existed cloud data models can not well meet the management requirements of structured data including a great deal of relational data, therefore a two-layer cloud data model consisting of a presentation layer and a storage layer is proposed. In the presentation layer, the conception of composite class and composite object are defined to represent the structure and the data of structured data respectively. In the storage layer, a composite class in the presentation layer is transformed into a 3-tuple which preserves data structure in mappings between composite attributes and their sub-attributes by using a rule set; and a composite object in the presentation layer is transformed into another 3-tuple which preserves a structured data set in simple objects without embed objects by using a CAO (Component-Attribute-Object) set in which each element mainly consists of a simple object and the identification of its father object. In order to store data in key-value model, a method to convert a CAO to a pair of key-value is proposed. Furthermore, two algorithms were proposed to convert data between the representation layer and the storage layer. Data experiment shows the two conversion algorithms are effective. The proposed model is fit for the management requirements of structured data in the cloud because composite object can represent structured data and avoid join operation of relation data and CAO can be stored in key-value model.
现有的云数据模型不能很好地满足包含大量关系数据的结构化数据的管理需求,因此提出了一种由表示层和存储层组成的两层云数据模型。在表示层,定义了复合类和复合对象的概念,分别表示结构化数据的结构和数据。存储层使用规则集将表示层中的组合类转换为3元组,该3元组保留了组合属性与其子属性之间映射的数据结构;通过使用每个元素主要由一个简单对象及其父对象标识组成的CAO (Component-Attribute-Object)集合,将表示层中的复合对象转换为另一个3元组,该3元组在没有嵌入对象的情况下保留了简单对象中的结构化数据集。为了在键值模型中存储数据,提出了一种将CAO转换为一对键值的方法。在此基础上,提出了在表示层和存储层之间转换数据的两种算法。数据实验表明,两种转换算法都是有效的。由于复合对象可以表示结构化数据,避免了关系数据的联接操作,并且CAO可以存储在键值模型中,因此该模型适合云中结构化数据的管理需求。
{"title":"A two-layer cloud database model and its bidirectional conversion algorithms","authors":"Ying Li, Yuling Lu","doi":"10.1109/ICSESS.2016.7883069","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883069","url":null,"abstract":"The existed cloud data models can not well meet the management requirements of structured data including a great deal of relational data, therefore a two-layer cloud data model consisting of a presentation layer and a storage layer is proposed. In the presentation layer, the conception of composite class and composite object are defined to represent the structure and the data of structured data respectively. In the storage layer, a composite class in the presentation layer is transformed into a 3-tuple which preserves data structure in mappings between composite attributes and their sub-attributes by using a rule set; and a composite object in the presentation layer is transformed into another 3-tuple which preserves a structured data set in simple objects without embed objects by using a CAO (Component-Attribute-Object) set in which each element mainly consists of a simple object and the identification of its father object. In order to store data in key-value model, a method to convert a CAO to a pair of key-value is proposed. Furthermore, two algorithms were proposed to convert data between the representation layer and the storage layer. Data experiment shows the two conversion algorithms are effective. The proposed model is fit for the management requirements of structured data in the cloud because composite object can represent structured data and avoid join operation of relation data and CAO can be stored in key-value model.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114698221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Friend recommendation algorithm based on location-based social networks 基于位置社交网络的好友推荐算法
Kunhui Lin, Yating Chen, Xiang Li, Qingfeng Wu, Zhentuan Xu
The rapid expansion of user data and geographic location data in the location-based social networking applications, it is become increasingly difficult for users to quickly and accurately find the information they need. The characteristics of the traditional friend recommendation algorithm are analyzed and discussed in this paper. In order to improve the performance of friend recommendation, we proposed a linear framework combines the three traditional friend recommendation algorithms, which are recommendation based on the proportion of common friends, recommendation based on user-based collaborative filtering and recommendation based on normal check-in location, respectively. Real dataset are used to verify our new method. The experimental results show that compared with the existing algorithms, our improved adaptive recommendation algorithm has better result, which can effectively improve the accuracy and recall rate of friend recommendation.
在基于位置的社交网络应用中,用户数据和地理位置数据的迅速膨胀,使得用户快速准确地找到自己需要的信息变得越来越困难。本文对传统好友推荐算法的特点进行了分析和讨论。为了提高好友推荐的性能,我们提出了一种结合三种传统好友推荐算法的线性框架,分别是基于共同好友比例的推荐、基于用户协同过滤的推荐和基于正常签到位置的推荐。用实际数据集对该方法进行了验证。实验结果表明,与现有的自适应推荐算法相比,改进的自适应推荐算法具有更好的效果,可以有效地提高好友推荐的准确率和召回率。
{"title":"Friend recommendation algorithm based on location-based social networks","authors":"Kunhui Lin, Yating Chen, Xiang Li, Qingfeng Wu, Zhentuan Xu","doi":"10.1109/ICSESS.2016.7883056","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883056","url":null,"abstract":"The rapid expansion of user data and geographic location data in the location-based social networking applications, it is become increasingly difficult for users to quickly and accurately find the information they need. The characteristics of the traditional friend recommendation algorithm are analyzed and discussed in this paper. In order to improve the performance of friend recommendation, we proposed a linear framework combines the three traditional friend recommendation algorithms, which are recommendation based on the proportion of common friends, recommendation based on user-based collaborative filtering and recommendation based on normal check-in location, respectively. Real dataset are used to verify our new method. The experimental results show that compared with the existing algorithms, our improved adaptive recommendation algorithm has better result, which can effectively improve the accuracy and recall rate of friend recommendation.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Research on anonymous protection technology for big data publishing 大数据发布匿名保护技术研究
Yuli Wang, Jiayin Tian, Cheng Yang, Yaping Zhu
Big data publishing anonymity technology is the main way to achieve privacy protection, it is a research hotspot of data publishing privacy protection. Applying anonymity protection to data is an effective way to protect the privacy of data subject in the process of micro data publishing. This paper analyzes the data publishing privacy protection technology in the anonymous models and main technologies, induces and summarizes the advantages and disadvantages of the anonymization algorithms and the existing problems. Finally, the development direction of privacy protection anonymity technology is prospected.
大数据发布匿名技术是实现隐私保护的主要途径,是数据发布隐私保护的研究热点。对数据进行匿名保护是微数据发布过程中保护数据主体隐私的有效途径。分析了数据发布隐私保护技术中的匿名模型和主要技术,归纳总结了各种匿名化算法的优缺点和存在的问题。最后,展望了隐私保护匿名技术的发展方向。
{"title":"Research on anonymous protection technology for big data publishing","authors":"Yuli Wang, Jiayin Tian, Cheng Yang, Yaping Zhu","doi":"10.1109/ICSESS.2016.7883103","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883103","url":null,"abstract":"Big data publishing anonymity technology is the main way to achieve privacy protection, it is a research hotspot of data publishing privacy protection. Applying anonymity protection to data is an effective way to protect the privacy of data subject in the process of micro data publishing. This paper analyzes the data publishing privacy protection technology in the anonymous models and main technologies, induces and summarizes the advantages and disadvantages of the anonymization algorithms and the existing problems. Finally, the development direction of privacy protection anonymity technology is prospected.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130169609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling of air defense and antimissile system based on FUML/FPN 基于FUML/FPN的防空反导系统建模
Li Ma, Yunxiang Ling, Yaohong Zhang
This paper establish the model of air defense and antimissile in uncertain environment based on fuzzy UML method containing fuzzy use case diagram, fuzzy class diagram and fuzzy activity diagram, which aims at the impact of uncertain environment factors on the system. Then model quantifies the uncertainty factors, and uncertain environment experimental verification is carried out for air defense and antimissile model. Finally, this paper explores the proper transforming rules, and verifies the possibility of this kind of method by calculation and analysis.
针对不确定环境因素对防空反导系统的影响,基于模糊UML方法,建立了包含模糊用例图、模糊类图和模糊活动图的不确定环境下防空反导系统模型。然后对模型的不确定因素进行量化,并对防空反导模型进行不确定环境实验验证。最后,本文探讨了适当的转换规则,并通过计算和分析验证了这种方法的可行性。
{"title":"Modeling of air defense and antimissile system based on FUML/FPN","authors":"Li Ma, Yunxiang Ling, Yaohong Zhang","doi":"10.1109/ICSESS.2016.7883052","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883052","url":null,"abstract":"This paper establish the model of air defense and antimissile in uncertain environment based on fuzzy UML method containing fuzzy use case diagram, fuzzy class diagram and fuzzy activity diagram, which aims at the impact of uncertain environment factors on the system. Then model quantifies the uncertainty factors, and uncertain environment experimental verification is carried out for air defense and antimissile model. Finally, this paper explores the proper transforming rules, and verifies the possibility of this kind of method by calculation and analysis.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127432208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The distributed UDDI system model based on service oriented architecture 分布式UDDI系统模型基于面向服务的体系结构
Yongxin Feng, Qin Li
Aiming at the issues of the traditional centralized UDDI model, the distributed UDDI model was proposed. The model adopted the latest version specification of UDDI v3 and the management technology of key space, avoiding uneven service accessing, low processing efficiency and prone to single point of failure. Moreover, service publication and service discovery were elevated, and the good practicability of distributed UDDI system can be verified.
针对传统集中式UDDI模型存在的问题,提出了分布式UDDI模型。该模型采用了UDDI v3的最新版本规范和键空间管理技术,避免了业务访问不均衡、处理效率低和容易出现单点故障的问题。提高了服务发布和服务发现的能力,验证了分布式UDDI系统良好的实用性。
{"title":"The distributed UDDI system model based on service oriented architecture","authors":"Yongxin Feng, Qin Li","doi":"10.1109/ICSESS.2016.7883138","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883138","url":null,"abstract":"Aiming at the issues of the traditional centralized UDDI model, the distributed UDDI model was proposed. The model adopted the latest version specification of UDDI v3 and the management technology of key space, avoiding uneven service accessing, low processing efficiency and prone to single point of failure. Moreover, service publication and service discovery were elevated, and the good practicability of distributed UDDI system can be verified.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124400293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A high performance asynchronous non-blocking data communication protocol 一种高性能异步非阻塞数据通信协议
Guimin Huang, Zhi Zheng, Ya Zhou
In this paper, we design a high-performance data communication message-oriented protocol (ECP), which is based on asynchronous non-blocking I/O model, used reactor design mode, introduced pipeline, and is on top of TCP without modifying the operating system underlying API. It is very effective in the environment that has a great demand of network communication, especially in the case of large-scale data communication and high concurrent requests.
本文设计了一种基于异步非阻塞I/O模型,采用反应器设计模式,引入管道的高性能数据通信面向消息协议(ECP),该协议建立在TCP之上,无需修改操作系统底层API。它在网络通信需求大的环境下,特别是在大规模数据通信和高并发请求的情况下是非常有效的。
{"title":"A high performance asynchronous non-blocking data communication protocol","authors":"Guimin Huang, Zhi Zheng, Ya Zhou","doi":"10.1109/ICSESS.2016.7883064","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883064","url":null,"abstract":"In this paper, we design a high-performance data communication message-oriented protocol (ECP), which is based on asynchronous non-blocking I/O model, used reactor design mode, introduced pipeline, and is on top of TCP without modifying the operating system underlying API. It is very effective in the environment that has a great demand of network communication, especially in the case of large-scale data communication and high concurrent requests.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124519100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The expansibility research of K-Means algorithm under the GPU GPU下K-Means算法的可扩展性研究
Sujie Zhong, Sheng Lin, Guangping Xu, Kai Shi
K-Means algorithm is one of the most popular clustering analysis algorithm. Since the algorithm can be easily understood and implemented, and its execution is more efficient than common clustering algorithm, it has been used widely. At the same time, with the increasing size of the data sets processed, CPU-based serial K-Means implementation has been unable to meet the people's needof data processing. Parallel computing is considered well with the large data sets tasks. GPU-based concurrent computation can accelerate common tasks, and especially for accelerating the compute-intensive tasks. CUDA (Compute Unified Device Architecture) is one of the methods that achieving the GPU-based concurrent computation. In the paper, the author hope to achieve a K-Means algorithm implementation can handle larger data sets via CUDA and the algorithm can be used on a common computer with NVIDIA graphics cards.
K-Means算法是目前最流行的聚类分析算法之一。由于该算法易于理解和实现,并且其执行效率比普通聚类算法高,因此得到了广泛的应用。同时,随着处理的数据集规模的不断增大,基于cpu的串行K-Means实现已经不能满足人们对数据处理的需求。并行计算被认为是处理大型数据集任务的好方法。基于gpu的并发计算可以加速普通任务,特别是对计算密集型任务的加速。CUDA(计算统一设备架构)是实现基于gpu的并发计算的方法之一。在本文中,作者希望通过CUDA实现可以处理更大数据集的K-Means算法,并且该算法可以在带有NVIDIA显卡的普通计算机上使用。
{"title":"The expansibility research of K-Means algorithm under the GPU","authors":"Sujie Zhong, Sheng Lin, Guangping Xu, Kai Shi","doi":"10.1109/ICSESS.2016.7883172","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883172","url":null,"abstract":"K-Means algorithm is one of the most popular clustering analysis algorithm. Since the algorithm can be easily understood and implemented, and its execution is more efficient than common clustering algorithm, it has been used widely. At the same time, with the increasing size of the data sets processed, CPU-based serial K-Means implementation has been unable to meet the people's needof data processing. Parallel computing is considered well with the large data sets tasks. GPU-based concurrent computation can accelerate common tasks, and especially for accelerating the compute-intensive tasks. CUDA (Compute Unified Device Architecture) is one of the methods that achieving the GPU-based concurrent computation. In the paper, the author hope to achieve a K-Means algorithm implementation can handle larger data sets via CUDA and the algorithm can be used on a common computer with NVIDIA graphics cards.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114716348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An improved algorithm of Chinese comments opinion mining based on adverbs 基于副词的中文评论意见挖掘改进算法
Lihong Dong, Weina Wang, Xiangyang She
The existing opinion mining method based on adverbs about Chinese comments has lower precision rate and recall rate. For this problem, this paper redefined the narrow opinion word, and proposed an improved algorithm of Chinese comments opinion mining based on adverbs: In the extraction process of the feature words and opinion words based on adverbs increased conjunctions and negative words judgment; Then using the Extended Version of Synonymy Thesaurus of information retrieval lab in university of Harbin technology to merge synonyms. And obtaining the final feature words and opinion words. Experiments proved the method in this paper is better than the existing method. In opinion words extraction work the recall rate increased by 10.45%, the precision rate increased by 5.11%, the value of F increased by 0.08. In feature words extraction work the recall rate increased by 6.61%, the precision rate increased by 1.73%, the value of F increased by 0.04; In synonyms merger work the recall rate increased by 19.08%, the precision rate increased by 21.96%, the value of F increased by 0.09.
现有的基于副词的中文评论意见挖掘方法准确率和召回率较低。针对这一问题,本文对狭义意见词进行了重新定义,提出了一种基于副词的中文评论意见挖掘改进算法:在基于副词的特征词和意见词提取过程中增加了连词和否定词的判断;然后利用哈尔滨理工大学信息检索实验室的同义词词典扩展版对同义词进行合并。并得到最终的特征词和意见词。实验证明,本文方法优于现有方法。在意见词提取工作中,召回率提高了10.45%,准确率提高了5.11%,F值提高了0.08。在特征词提取工作中,召回率提高了6.61%,准确率提高了1.73%,F值提高了0.04;在同义词合并工作中,查全率提高19.08%,查准率提高21.96%,F值提高0.09。
{"title":"An improved algorithm of Chinese comments opinion mining based on adverbs","authors":"Lihong Dong, Weina Wang, Xiangyang She","doi":"10.1109/ICSESS.2016.7883051","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883051","url":null,"abstract":"The existing opinion mining method based on adverbs about Chinese comments has lower precision rate and recall rate. For this problem, this paper redefined the narrow opinion word, and proposed an improved algorithm of Chinese comments opinion mining based on adverbs: In the extraction process of the feature words and opinion words based on adverbs increased conjunctions and negative words judgment; Then using the Extended Version of Synonymy Thesaurus of information retrieval lab in university of Harbin technology to merge synonyms. And obtaining the final feature words and opinion words. Experiments proved the method in this paper is better than the existing method. In opinion words extraction work the recall rate increased by 10.45%, the precision rate increased by 5.11%, the value of F increased by 0.08. In feature words extraction work the recall rate increased by 6.61%, the precision rate increased by 1.73%, the value of F increased by 0.04; In synonyms merger work the recall rate increased by 19.08%, the precision rate increased by 21.96%, the value of F increased by 0.09.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115055271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1