首页 > 最新文献

2013 International Conference on Information Science and Cloud Computing Companion最新文献

英文 中文
A Process-Oriented Ontology-Based Knowledge Model 面向过程的基于本体的知识模型
Yanhong Zhao, Hongqi Li, Liping Zhu, Fengqi Tan, Ying Wang
With the rapid growth of knowledge resources, the production departments in the field of oil and gas exploration and development produce daily a great volume of result documents. Meanwhile, a large part of knowledge is stored in the experts' brain as experience. How to spend less effort finding knowledge meeting users' need and how to make effective use of the expertise to avoid knowledge loss become more and more important. This paper adopts a knowledge model which is composed by process model and ontology model in the subject of Well Site Deployment. In this knowledge model, the process model provides the detailed operation flow and data flow, the ontology model provides the evaluating standards and the operating standards. We build a web-based knowledge service platform based on this knowledge model, through which knowledge can be shared between experts and non-experts. Furthermore, users can reuse the knowledge and trace the existing work results of well site deployment and development by the platform. All of these can help the final users to improve the efficiency of decision making.
随着知识资源的快速增长,油气勘探开发领域的生产部门每天都会产生大量的成果文件。同时,很大一部分知识以经验的形式储存在专家的大脑中。如何以更少的精力找到满足用户需求的知识,如何有效利用专业知识,避免知识流失变得越来越重要。本文在井场部署课题中采用了由过程模型和本体模型组成的知识模型。在该知识模型中,过程模型提供了详细的操作流程和数据流,本体模型提供了评价标准和操作标准。在此基础上构建了基于网络的知识服务平台,实现了专家与非专家之间的知识共享。此外,用户可以重用这些知识,并通过平台跟踪井场部署和开发的现有工作结果。这些都可以帮助最终用户提高决策效率。
{"title":"A Process-Oriented Ontology-Based Knowledge Model","authors":"Yanhong Zhao, Hongqi Li, Liping Zhu, Fengqi Tan, Ying Wang","doi":"10.1109/ISCC-C.2013.29","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.29","url":null,"abstract":"With the rapid growth of knowledge resources, the production departments in the field of oil and gas exploration and development produce daily a great volume of result documents. Meanwhile, a large part of knowledge is stored in the experts' brain as experience. How to spend less effort finding knowledge meeting users' need and how to make effective use of the expertise to avoid knowledge loss become more and more important. This paper adopts a knowledge model which is composed by process model and ontology model in the subject of Well Site Deployment. In this knowledge model, the process model provides the detailed operation flow and data flow, the ontology model provides the evaluating standards and the operating standards. We build a web-based knowledge service platform based on this knowledge model, through which knowledge can be shared between experts and non-experts. Furthermore, users can reuse the knowledge and trace the existing work results of well site deployment and development by the platform. All of these can help the final users to improve the efficiency of decision making.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123588753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Real-Time Federate Cloud for Large Group Company 面向大型集团公司的实时联邦云
Lixin Du, Wei He
How to improve the utilization of IT facilities is a major problem for enterprises which have many real-time control systems. We think that improving or rebuilding legacy applications using cloud computing ideology is more suitable than building new cloud platform for these traditional real-time companies. In this paper, we propose federate cloud (FC) architecture for large group company having many subsidiaries with the similar real-time applications based on centric model. In the FC architecture, a sub cloud is constructed for applications in each subsidiary and all the sub clouds are connected together by cloud bus. We discuss the detailed mechanism for the FC architecture, including construction of the FC component, the real-time cloud storage strategies and cloud service scheduling algorithm. Experiment results show that our method can improve the utilization of IT facilities effectively.
对于拥有众多实时控制系统的企业来说,如何提高IT设施的利用率是一个重要的问题。我们认为使用云计算思想改进或重建遗留应用程序比为这些传统的实时公司构建新的云平台更合适。本文提出了一种基于中心模型的联合云(FC)架构,适用于拥有多家子公司的大型集团公司,具有相似的实时应用。在FC架构中,为每个子云中的应用构建一个子云,所有子云通过云总线连接在一起。讨论了FC架构的具体机制,包括FC组件的构建、实时云存储策略和云服务调度算法。实验结果表明,该方法可以有效地提高信息技术设施的利用率。
{"title":"Towards Real-Time Federate Cloud for Large Group Company","authors":"Lixin Du, Wei He","doi":"10.1109/ISCC-C.2013.148","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.148","url":null,"abstract":"How to improve the utilization of IT facilities is a major problem for enterprises which have many real-time control systems. We think that improving or rebuilding legacy applications using cloud computing ideology is more suitable than building new cloud platform for these traditional real-time companies. In this paper, we propose federate cloud (FC) architecture for large group company having many subsidiaries with the similar real-time applications based on centric model. In the FC architecture, a sub cloud is constructed for applications in each subsidiary and all the sub clouds are connected together by cloud bus. We discuss the detailed mechanism for the FC architecture, including construction of the FC component, the real-time cloud storage strategies and cloud service scheduling algorithm. Experiment results show that our method can improve the utilization of IT facilities effectively.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115354238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Architecture Core Data Optimization Design Based on DM2 基于DM2的架构核心数据优化设计方法
Xiaoxue Zhang, Ai-min Luo, Xueshan Luo
Based on the complexity in military information systems architecture design, we proposed the concepts of architecture optimization design. After analyzed application of logical data meta-model (DM2) in building architecture data and products, we built a framework of architecture optimization design. Combined with the building sequence and designing guidelines of architecture data and products, we proposed architecture core data optimization design process. After analyzing the main contents of taking architecture optimization design, the goals and the guidelines of building mathematical models of architecture core data optimization design are put forward. Finally, we took the optimization design of activity data as an example, built the corresponding mathematical model, and illustrated relative optimization method. Architecture core data optimization design method affords a realizable approach of making architecture design solutions more quantitatively, scientifically, and automatically.
针对军事信息系统体系结构设计的复杂性,提出了体系结构优化设计的概念。通过分析逻辑数据元模型(DM2)在构建体系结构数据和产品中的应用,构建了体系结构优化设计框架。结合建筑序列和建筑数据与产品的设计准则,提出了建筑核心数据优化设计流程。在分析了进行建筑优化设计的主要内容后,提出了建筑核心数据优化设计数学模型建立的目标和指导方针。最后,以活动数据的优化设计为例,建立了相应的数学模型,并举例说明了相应的优化方法。架构核心数据优化设计方法为架构设计方案的定量化、科学化和自动化提供了一种可实现的途径。
{"title":"Method of Architecture Core Data Optimization Design Based on DM2","authors":"Xiaoxue Zhang, Ai-min Luo, Xueshan Luo","doi":"10.1109/ISCC-C.2013.84","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.84","url":null,"abstract":"Based on the complexity in military information systems architecture design, we proposed the concepts of architecture optimization design. After analyzed application of logical data meta-model (DM2) in building architecture data and products, we built a framework of architecture optimization design. Combined with the building sequence and designing guidelines of architecture data and products, we proposed architecture core data optimization design process. After analyzing the main contents of taking architecture optimization design, the goals and the guidelines of building mathematical models of architecture core data optimization design are put forward. Finally, we took the optimization design of activity data as an example, built the corresponding mathematical model, and illustrated relative optimization method. Architecture core data optimization design method affords a realizable approach of making architecture design solutions more quantitatively, scientifically, and automatically.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115381188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing on the Failure Mode of BFNNs' Learning and its Improving Algorithm bfnn学习失效模式分析及改进算法
Shuiming Zhong, Yinghua Lv, Tinghuai Ma, Yu Xue
In order to improve the learning mechanism of BFNNs, the paper firstly analyzes the failure mode of BFNNs trained by SBALR, which takes the form of a local cycle. And then by mean of the sensitivity theory, a disturbance learning algorithm is developed to make the BFNNs that suffering from learning failure to escape the local cycle. The new algorithm aims to keep the existing learning performance as much as possible. Experimental results demonstrate the effectiveness of the new algorithm on both learning effect and learning efficiency.
为了改进bfnn的学习机制,本文首先分析了SBALR训练的bfnn的失效模式,其失效模式采用局部循环的形式。然后利用灵敏度理论,提出了一种干扰学习算法,使学习失败的bfnn脱离局部循环。新算法的目标是尽可能保持现有的学习性能。实验结果证明了新算法在学习效果和学习效率上的有效性。
{"title":"Analyzing on the Failure Mode of BFNNs' Learning and its Improving Algorithm","authors":"Shuiming Zhong, Yinghua Lv, Tinghuai Ma, Yu Xue","doi":"10.1109/ISCC-C.2013.47","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.47","url":null,"abstract":"In order to improve the learning mechanism of BFNNs, the paper firstly analyzes the failure mode of BFNNs trained by SBALR, which takes the form of a local cycle. And then by mean of the sensitivity theory, a disturbance learning algorithm is developed to make the BFNNs that suffering from learning failure to escape the local cycle. The new algorithm aims to keep the existing learning performance as much as possible. Experimental results demonstrate the effectiveness of the new algorithm on both learning effect and learning efficiency.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123306197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of Clustering Algorithm Based on Information Entropy and Frequency Sensitive Discrepancy Metric in Anomaly Detection 基于信息熵和频率敏感差异度量的异常检测聚类算法研究
Han Li, Qiuxin Wu
Anomaly detection is an active branch of intrusion detection technology which can detect intrusion behaviors including system or users' non-normal behavior and unauthorized use of computer resources. Clustering analysis is an unsupervised method to group data set into multiple clusters. Using clustering algorithm to detect anomaly behavior has good scalability and adaptability. This paper mainly focuses on improving k-means clustering algorithm, and uses it to detect the abnormal records. Our goal is to increase the DR value and decrease the FAR value in anomaly detection by calculating appropriate value of parameters and improve the clustering algorithm. In our IE&FSDM algorithm, we use network records' minimum standard information entropy to compute the initial cluster centers. In testing phase, discrepancy metric is introduced to help calculate exact number of clusters in testing data set. Using the results of initial cluster centers calculated in the pre-phase, IE&FSDM compute the actual clusters by converging cluster centers and obtains the actual cluster centers according to the frequency sensitive discrepancy metric. Then comply with the improved k-means algorithm, iterative calculate until divide all network data into corresponding clusters, and according to the results of cluster we can classify the normal and abnormal network behaviors. At last, we use KDD CUP1999 dataset to implement IE&FSDM algorithm. Test results show that comparing with previous clustering methods, IE&FSDM algorithm improve the detection rate of anomaly behavior and reduce the false alarm rate.
异常检测是入侵检测技术的一个活跃分支,它可以检测到入侵行为,包括系统或用户的异常行为和对计算机资源的非法使用。聚类分析是一种将数据集分成多个聚类的无监督方法。采用聚类算法检测异常行为具有良好的可扩展性和适应性。本文主要对k-means聚类算法进行改进,并将其用于异常记录的检测。我们的目标是通过计算合适的参数值和改进聚类算法来提高异常检测中的DR值和降低FAR值。在我们的IE&FSDM算法中,我们使用网络记录的最小标准信息熵来计算初始聚类中心。在测试阶段,引入差异度量来精确计算测试数据集中的簇数。IE&FSDM利用前期计算的初始聚类中心的结果,通过聚类中心收敛计算实际聚类,并根据频率敏感差异度量得到实际聚类中心。然后按照改进的k-means算法进行迭代计算,直到将所有网络数据划分到相应的聚类中,根据聚类的结果对网络的正常和异常行为进行分类。最后,利用KDD CUP1999数据集实现了IE&FSDM算法。测试结果表明,与以往的聚类方法相比,IE&FSDM算法提高了异常行为的检出率,降低了虚警率。
{"title":"Research of Clustering Algorithm Based on Information Entropy and Frequency Sensitive Discrepancy Metric in Anomaly Detection","authors":"Han Li, Qiuxin Wu","doi":"10.1109/ISCC-C.2013.108","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.108","url":null,"abstract":"Anomaly detection is an active branch of intrusion detection technology which can detect intrusion behaviors including system or users' non-normal behavior and unauthorized use of computer resources. Clustering analysis is an unsupervised method to group data set into multiple clusters. Using clustering algorithm to detect anomaly behavior has good scalability and adaptability. This paper mainly focuses on improving k-means clustering algorithm, and uses it to detect the abnormal records. Our goal is to increase the DR value and decrease the FAR value in anomaly detection by calculating appropriate value of parameters and improve the clustering algorithm. In our IE&FSDM algorithm, we use network records' minimum standard information entropy to compute the initial cluster centers. In testing phase, discrepancy metric is introduced to help calculate exact number of clusters in testing data set. Using the results of initial cluster centers calculated in the pre-phase, IE&FSDM compute the actual clusters by converging cluster centers and obtains the actual cluster centers according to the frequency sensitive discrepancy metric. Then comply with the improved k-means algorithm, iterative calculate until divide all network data into corresponding clusters, and according to the results of cluster we can classify the normal and abnormal network behaviors. At last, we use KDD CUP1999 dataset to implement IE&FSDM algorithm. Test results show that comparing with previous clustering methods, IE&FSDM algorithm improve the detection rate of anomaly behavior and reduce the false alarm rate.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130005694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Operation Performance Evaluation and Optimization Based on SUPER-SBM DEA Model in Railway Industry in China 基于SUPER-SBM DEA模型的中国铁路行业运营绩效评价与优化
Z. Li
By taking railway industry in China for example, SUPER-SBM DEA model of existing uncontrollable factors are adopted to analyze and evaluate the operation performance in 30 provinces in China. Based on detailed analysis of railway industry operation features, optimization of related slack variables is analyzed. Suggestions are put forward as follows: current railway transportation capacity should be reasonably used, input factors should be reasonably collocated, input capital should be accumulated through various channels.
以中国铁路行业为例,采用现有不可控因素的SUPER-SBM DEA模型,对中国30个省份的铁路运营绩效进行分析评价。在详细分析铁路行业运行特点的基础上,分析了相关松弛变量的优化问题。建议:合理利用现有铁路运力,合理配置投入要素,多渠道积累投入资金。
{"title":"Operation Performance Evaluation and Optimization Based on SUPER-SBM DEA Model in Railway Industry in China","authors":"Z. Li","doi":"10.1109/ISCC-C.2013.96","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.96","url":null,"abstract":"By taking railway industry in China for example, SUPER-SBM DEA model of existing uncontrollable factors are adopted to analyze and evaluate the operation performance in 30 provinces in China. Based on detailed analysis of railway industry operation features, optimization of related slack variables is analyzed. Suggestions are put forward as follows: current railway transportation capacity should be reasonably used, input factors should be reasonably collocated, input capital should be accumulated through various channels.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127882664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Neural Network Based Algorithm for Generalized Eigenvalue Problem 基于神经网络的广义特征值问题算法
T. Hang, Guoren Yang, Bo Yu, Xuesong Liang, Ying Tang
The present paper introduces a neural network based on approach for solving the generalized eigenvalue problem Ax = λBx, where n-by-n matrices A and B are realvalued, B is non-singular, and 1 B A - is an orthogonal matrix whose determinant is equal to 1. The approach can extract the modulus largest and the modulus smallest eigenvalues, and the corresponding n-dimensional complex eigenvectors can be extracted by using the proposed algorithm that is essentially based on an ordinary differential equation of order n. Experimental results demonstrated the effectiveness of the proposed algorithm.
给出了求解广义特征值问题Ax = λBx的一种基于神经网络的方法,其中n × n矩阵a和B是重值矩阵,B是非奇异矩阵,且a -是行列式等于1的正交矩阵。该方法可以提取模量最大和模量最小的特征值,并可以提取相应的n维复特征向量,该算法本质上是基于n阶常微分方程的。实验结果证明了该算法的有效性。
{"title":"Neural Network Based Algorithm for Generalized Eigenvalue Problem","authors":"T. Hang, Guoren Yang, Bo Yu, Xuesong Liang, Ying Tang","doi":"10.1109/ISCC-C.2013.93","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.93","url":null,"abstract":"The present paper introduces a neural network based on approach for solving the generalized eigenvalue problem Ax = λBx, where n-by-n matrices A and B are realvalued, B is non-singular, and 1 B A - is an orthogonal matrix whose determinant is equal to 1. The approach can extract the modulus largest and the modulus smallest eigenvalues, and the corresponding n-dimensional complex eigenvectors can be extracted by using the proposed algorithm that is essentially based on an ordinary differential equation of order n. Experimental results demonstrated the effectiveness of the proposed algorithm.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124570213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparisons of Evolutionary Algorithms for Walking Gait Optimization 步行步态优化的进化算法性能比较
C. Cai, Hong Jiang
To investigate the performance of different evolutionary algorithms on walking gait optimization, we designed an optimization framework. There are four bio-inspired methods in the framework, which include Genetic Algorithm (GA), Covariance Matrix Adaption Evolution Strategy (CMA-ES), Particle Swarm Optimization (PSO) and Differential Evolution (DE). In the learning process of each method, we employed three learning tasks to optimize the walking gait, which are aiming at generating a gait with higher speed, stability and flexibility respectively. We analyzed the gaits optimized by each four methods separately. According to the comparison of these results, it indicates that DE performs better than the other three algorithms. The comparison also shows that the gaits learned by CMA-ES and PSO are acceptable, but there exist drawbacks compared to DE. And among these methods, GA presents weak performance on gait optimization.
为了研究不同进化算法在步态优化中的性能,设计了一个优化框架。该框架包括遗传算法(GA)、协方差矩阵自适应进化策略(CMA-ES)、粒子群优化(PSO)和差分进化(DE)四种生物启发方法。在每种方法的学习过程中,我们采用了三个学习任务来优化步行步态,这三个任务的目标分别是生成更高的速度、稳定性和灵活性的步态。分别对四种方法优化后的步态进行了分析。通过对这些结果的比较,可以看出DE算法的性能优于其他三种算法。对比还表明,CMA-ES和PSO学习的步态是可以接受的,但与DE相比存在不足。其中,遗传算法在步态优化方面表现较弱。
{"title":"Performance Comparisons of Evolutionary Algorithms for Walking Gait Optimization","authors":"C. Cai, Hong Jiang","doi":"10.1109/ISCC-C.2013.100","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.100","url":null,"abstract":"To investigate the performance of different evolutionary algorithms on walking gait optimization, we designed an optimization framework. There are four bio-inspired methods in the framework, which include Genetic Algorithm (GA), Covariance Matrix Adaption Evolution Strategy (CMA-ES), Particle Swarm Optimization (PSO) and Differential Evolution (DE). In the learning process of each method, we employed three learning tasks to optimize the walking gait, which are aiming at generating a gait with higher speed, stability and flexibility respectively. We analyzed the gaits optimized by each four methods separately. According to the comparison of these results, it indicates that DE performs better than the other three algorithms. The comparison also shows that the gaits learned by CMA-ES and PSO are acceptable, but there exist drawbacks compared to DE. And among these methods, GA presents weak performance on gait optimization.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117031166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Preserving Social Network Privacy Using Edge Vector Perturbation 利用边缘矢量扰动保护社交网络隐私
Lihui Lan, Lijun Tian
With the social network application, Popularity, the researchers can benefit through social network analysis, but it raises serious privacy concerns for the individual involved in social network. Some techniques have been proposed for protecting personal privacy. However, the existing methods tend to focus on un-weighted social network for anonymizing nodes and structure information or weighted social networks for anonymizing edge weight. We propose an edge vector perturbation method to preserve structural properties and edge weights for weighted social networks. First, we construct edge vector or edge space of the original weighted social network. Second, we calculate the edge betweenness and assign weights to elements in edge vector. Third, we construct release candidate set by the weighted Euclidean distance. We leverage the notions of edge vector and edge space in weighted social network. Given a social network G^s, we adopt two methods to build original edge vector E_Vec (G^s), and then select from some edge vectors from ψ(K_n)as publication candidate set of E_Vec(G^s). To ensure the effectiveness of released dataset, we use Euclidean distance between the vectors as metrics of the similarity. We execute experiments on datasets to study publication utility and quality. Our method can be applied to a typical perturbation algorithm to achieve better preservation of the utility of its output.
随着社交网络应用的普及,研究人员可以通过社会网络分析获益,但它提出了严重的隐私问题,涉及到个人的社会网络。人们提出了一些保护个人隐私的方法。然而,现有的方法往往侧重于对节点和结构信息进行匿名化的非加权社会网络或对边缘权值进行匿名化的加权社会网络。我们提出了一种边缘矢量摄动方法来保持加权社会网络的结构属性和边缘权重。首先,构造原始加权社会网络的边缘向量或边缘空间。其次,计算边缘间度,并对边缘向量中的元素赋权。第三,利用加权欧几里得距离构造发布候选集。我们利用了加权社交网络中边缘向量和边缘空间的概念。给定一个社交网络G^s,我们采用两种方法构建原始边缘向量E_Vec(G^s),然后从ψ(K_n)中的一些边缘向量中选择E_Vec(G^s)作为E_Vec(G^s)的发布候选集。为了保证发布数据集的有效性,我们使用向量之间的欧几里得距离作为相似度的度量。我们对数据集进行实验,以研究出版物的效用和质量。我们的方法可以应用于典型的摄动算法,以更好地保持其输出的效用。
{"title":"Preserving Social Network Privacy Using Edge Vector Perturbation","authors":"Lihui Lan, Lijun Tian","doi":"10.1109/ISCC-C.2013.103","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.103","url":null,"abstract":"With the social network application, Popularity, the researchers can benefit through social network analysis, but it raises serious privacy concerns for the individual involved in social network. Some techniques have been proposed for protecting personal privacy. However, the existing methods tend to focus on un-weighted social network for anonymizing nodes and structure information or weighted social networks for anonymizing edge weight. We propose an edge vector perturbation method to preserve structural properties and edge weights for weighted social networks. First, we construct edge vector or edge space of the original weighted social network. Second, we calculate the edge betweenness and assign weights to elements in edge vector. Third, we construct release candidate set by the weighted Euclidean distance. We leverage the notions of edge vector and edge space in weighted social network. Given a social network G^s, we adopt two methods to build original edge vector E_Vec (G^s), and then select from some edge vectors from ψ(K_n)as publication candidate set of E_Vec(G^s). To ensure the effectiveness of released dataset, we use Euclidean distance between the vectors as metrics of the similarity. We execute experiments on datasets to study publication utility and quality. Our method can be applied to a typical perturbation algorithm to achieve better preservation of the utility of its output.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116194049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Study on Image Encryption Algorithm Based on Chaotic Theory 基于混沌理论的图像加密算法研究
Qiuxia Zhang
With the rapid development of high-tech such as the cloud technology, information security has become more critical than before, so the cryptography assunes a key technology in information security. Recently, some new cryptography theories have attracted increasing attention under the background of research on algorithm efficiency and security has become the current hot research topic. Chaotic algorithm is very suitable for stream cipher encryption not only for its sensitivity to initial conditions for time series generated but also for its complex structure which is difficult to analyze and forecast. At the same time, it can provide smart pseudo random sequence with excellent randomness, correlation and complexity. This paper mainly studies about the image encryption algorithm based on chaotic theory.
随着云技术等高新技术的飞速发展,信息安全变得越来越重要,加密技术成为信息安全中的一项关键技术。近年来,在算法效率和安全性研究成为当前研究热点的背景下,一些新的密码学理论越来越受到人们的关注。混沌算法不仅对生成的时间序列的初始条件敏感,而且结构复杂,难以分析和预测,因此非常适合于流密码加密。同时,它可以提供具有良好随机性、相关性和复杂性的智能伪随机序列。本文主要研究了基于混沌理论的图像加密算法。
{"title":"Study on Image Encryption Algorithm Based on Chaotic Theory","authors":"Qiuxia Zhang","doi":"10.1109/ISCC-C.2013.129","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.129","url":null,"abstract":"With the rapid development of high-tech such as the cloud technology, information security has become more critical than before, so the cryptography assunes a key technology in information security. Recently, some new cryptography theories have attracted increasing attention under the background of research on algorithm efficiency and security has become the current hot research topic. Chaotic algorithm is very suitable for stream cipher encryption not only for its sensitivity to initial conditions for time series generated but also for its complex structure which is difficult to analyze and forecast. At the same time, it can provide smart pseudo random sequence with excellent randomness, correlation and complexity. This paper mainly studies about the image encryption algorithm based on chaotic theory.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126606512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2013 International Conference on Information Science and Cloud Computing Companion
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1