Proceedings of the 2016 International Conference on Communications, Information Management and Network Security

Session: Intelligence Algorithm and Data Mining

29 articles
Proceedings Article

The Study on Lucene Based IETM Information Retrieval

Jiaju Wu, Zhenji Liu, Xinglin Zhu, Rong Yu
With the intensive and large scale application of IETM in equipment integrated support, information retrieval technology becomes one of the most key technologies. This article discusses the full-text search technology and Lucene full-text retrieval engine, and combines them to develop a high-performance...
Proceedings Article

New Data Clustering Algorithm Combined of Ant Colony Algorithm and Improved Fuzzy C-Means Algorithm

Zhiming Zhang, Guobin Wu, Jie Luo
A new clustering algorithm combined of ant colony and improved Fuzzy C-Means (AC-LFCM) was proposed to resolve the shortage of Fuzzy C-Means (FCM) clustering algorithm on the presence of sensitive to initialization, easy to fall into local optimum and neglected the influence of local information of data....
Proceedings Article

Improved MP3 Hiding Algorithm Based on Huffman Coding

Jun Ao, Rui Li, Chunbo Ma
To further increase the hiding capacity of MP3 files, an improved algorithm is proposed in this paper. Compare to previous work, this algorithm searches out additional 10 Huffman codeword pairs which meet the transparence requirements. With the newly found pairs, the hiding capacity is increased and...
Proceedings Article

Implementation of a Parallel Prefix Adder Based on Kogge-Stone Tree

Yancang Chen, Minlei Zhang, Pei Wei, Sai Sui, Yaxin Zhao, Lunguo Xie
Binary adder is an important module for microprocessors. We present a novel structure of binary adder, named Hyper-Parallel Prefix Adder (HPPA) in this paper. The basic idea of HPPA is to divide the addition into two levels, both of which are parallel prefix adder architecture. It can perfectly reduce...
Proceedings Article

Research on Interpolation Method of Random Hopped-Frequency in Synthetic Wideband Imaging

Junqun Liu, Dawei Lu, Jun Zhang
Coherent pulse synthesis is commonly used in radar receiver for random hopped-frequency processing, which key is to make the frequency point of sampling to order and uniform arrangement, and then similar to the step frequency pulse signal for subsequent signal processing. In the view of numerical analysis...
Proceedings Article

Research and Implementation of Plotting Based on MapX TrueType Font Symbol

Yongzhen Qin, Quanxing Miao, Renyuan Hu, Hu Zhao
Plotting on the electronic map be of great importance and widely used. The method to plot regular unit symbol on map with MapX TrueType font symbol is researched, and the way is realized using MapX and Visual C++. It is showed that the method is more effective and has good quality of reality and real-time...
Proceedings Article

An Improved Apriori Preserving Differential Privacy in the Framework of Spark

Zhiqiang Gao, Longjun Zhang, Renyuan Hu, Qingpeng Li, Jihua Yang
Aimed at the problem that traditional methods fail to deal with malicious attacks under arbitrary background knowledge during the process of massive data analysis, an improved Apriori algorithm preserving differential privacy, combining with Laplace mechanism to mine the pattern of sensitive information...
Proceedings Article

Research on the Application of Data Mining Technology in Teaching Effect Analysis

Lei Che
The application of data mining technology in teaching effect analysis is discussed. Firstly, the necessity of teaching effect analysis is introduced. Next, the data mining and multidimensional data analysis technology are expounded, and solutions of teaching effect analysis are proposed. Last but not...
Proceedings Article

A Frequent Itemsets Data Mining Algorithm Based on Differential Privacy

Qingpeng Li, Longjun Zhang, Haoyu Li, Wenjun Sun
Differential privacy is a new privacy protection technology, which defines a strict and strong privacy protection model, by adding noise data distortion to achieve the purpose of privacy protection. Frequent pattern mining is an important field in data mining, and its purpose is to find frequent patterns...
Proceedings Article

An Extracting Method of 2D Property Line for House Property

Yunfei Shi, Lingling Zhang
2D property line is a combined boundary line of geometry and semantics, extraction of which is basis for reconstruction of right volumes (house property). Research on extraction of property boundaries for flat-layer right volumes in the slab-type apartment buildings has been tried in this article. Besides,...
Proceedings Article

A Sound Source Tracking Method of Distributed Microphone Array

Huannan Lin, Yiwen Zhang
Distributed microphone array is composed of multiple spatial random microphone array, and this kind of way avoid the constraints of the topology of traditional microphone array, and it can perform a flexible positioning and application. Based on this, in this paper, we analyze the characteristics of...
Proceedings Article

Privacy Protection Method on Publishing Dynamic Set-Valued Data

Jian Zhang, Yu Yang
After researching many protection methods for releasing sensitive information, we found that differential privacy could provide strong guarantees on it, but it will adding too much noise and spending too much times in releasing dynamic set-valued data. To solve these problems, this paper present a privacy...
Proceedings Article

UAV 3D Mobility Model Based on Density Change Product

Rui Wang, Nan Di, Na Wang, Fangxin Liu, Qiuli Chen
The network performance of UAV airborne is closely relied on the movement of the mobile nodes which is decided by the mobility mode. And the selection of mobility model and its parameters is of great significance to the simulation results. Based on the three-dimensional Gauss Markova mobility model (3D-GMM),...
Proceedings Article

The Application of Design Structure Matrix Optimization Method Based on Genetic Algorithm

Lefeng Sun, Jing An, Hongmiao Yu
Based on the analysis the disadvantage of present research in optimization of Design Structure Matrix (DSM), the paper proposes a new algorithm of optimizing the design structure matrix, which sets up the objective optimization function, designs the way of coding, crossover, mutation based on genetic...
Proceedings Article

Spaced-Based Multi-Sensor Maneuvering Group Targets Refined Tracking Algorithm

Haipeng Wang, Xueyuan Lin, Tiantian Tang, Shuyi Jia
Aiming to solve the refined tracking problem of the maneuvering group targets with the space-based multi-sensor detections, an algorithm named multi-sensor refined tracking algorithm within maneuvering group targets based on patulous generalized S-D assignment (MSRT-MGT-PGSDA) is proposed. In this algorithm,...
Proceedings Article

Research and Application of Collaborative Filtering Algorithm Based on Hadoop

Ailing Duan, Zhixia Xu, Qiongbo Duan
In order to solve the user rating data about data sparseness and traditional similarity calculation method because of its disadvantages of strict match object attributes, combined with the project classification and cloud computing platform is put forward an improved collaborative filtering recommendation...
Proceedings Article

Community Detection in Complex Networks Using Improved Artificial Bee Colony Algorithm

Ziyang Wang, Xiaolin Zhao, Peiyuan Wen, Jingfeng Xue, Changzhen Hu
With more and more various systems in nature and society are proved to be modeled as complex networks, community detection in complex networks as a fundamental problem becomes a hot research topic in a large scale of subjects. Artificial Bee Colony Algorithm (ABC) has high efficiency and does not require...
Proceedings Article

A Novel Two-Stage PCA Algorithm for Object Tracking

Yuanyuan Yang, Dong Hu
In this paper, we propose a two-stage PCA algorithm to deal with the problem of target appearance changes in object tracking. Our method is based on particle filter framework and aims at building up a robust appearance model for the target. In the first-stage, PCA is applied on several templates collected...
Proceedings Article

An Improved Community Detection Algorithm Based on DCT and K-Means

Lin Li, Kefeng Fan, Jiezhong Gong, Hao Peng
Detecting an overlapping and hierarchical community structure can give a significant insight into structural and functional properties in complex networks. In this paper, we propose an improved algorithm to detect communities in the complex network. The proposed algorithm use discrete cosine transform...
Proceedings Article

A Joint PIC/Decoding Algorithm for Convolutionally Coded CDMA Systems

Guoxiong Xu, Feng Ji
This paper mainly explores parallel interference cancellation and decoding (PIC/decoding) algorithm for convolutionally coded DS-CDMA systems. A new joint PIC/decoding scheme is proposed and analylized, respectively. The proposed scheme is numerically simulated, and compared with other PIC/decoding algorithm...
Proceedings Article

Hardware Implementation of Radio Signals Fast Digital Detection and Demodulation Algorithms

Oleg Vyacheslavovich Chernoyarov, Alexey Nikolaevich Glushkov, Vladimir Petrovich Litvinenko, Boris Vasilyevich Matveev, Konstantin Sergeevich Kalashnikov
We are considering the capabilities and the technical features of the fast digital detection and demodulation algorithms for the signals of various modulation formats as they are realized in programmable logic devices. We show that simultaneous multitype signal processing devices can be implemented in...
Proceedings Article

The Application of Big Data Analysis Techniques and Tools in Intelligence Research

Mengru Li, Hong Fu, Ruodan Sun, Che Che
The advent of big data era has brought opportunities and challenges to intelligence research. This paper analyzes the emerging techniques of intelligence research under the big data environment, like data mining, visualization, semantic processing, etc. Meanwhile it also summarizes some new tools, such...
Proceedings Article

On the Second Descent Points for the K-Error Linear Complexity of 2n-Periodic Binary Sequences

Jianqin Zhou, Xifeng Wang, Wanquan Liu
In this paper, a constructive approach for determining CELCS (critical error linear complexity spectrum) for the k-error linear complexity distribution of 2n-periodic binary sequences is developed via the sieve method and Games-Chan algorithm. Accordingly, the second descent point (critical point) distribution...
Proceedings Article

An Enhanced Map-Based Location Service for VANET

Deling Huang, Chang Su, Yusong Yan
Position-based routing is a promising technology for VANET. And location service is the fundamental component for the success of position-based routing. A map-based location service algorithm is proposed in this paper. It uses a predesigned hash function to map a node to a certain location, where location...
Proceedings Article

Research on Text Classification Based on TextRank

Guangming Lu, Yule Xia, Jiamei Wang, Zhenling Yang
Extracting keywords from the result of word segmentation with the improved TextRank algorithm. Use the relative position of the words in the article to calculate the influence of position; the position of the coverage of the words and expressions is extended to the statement of the words and the key...
Proceedings Article

A Disordered Multiple Group Signature Scheme Based on Discrete Logarithm

Hua Huang
Based on the SCR algorithm authentication and signature, the majority can be calculated in the preprocessing phase is completed, the higher the efficiency, safety lies in the difficulty of computing discrete logarithms. Based on this algorithm and the discrete logarithm theory, we designed a multi-disorder...
Proceedings Article

An Improved Cluster Routing Structure of IOT

Zhihui Wang, Ruokun Wu, Qila Sa, Jinlin Li, Yuejiao Fan, Wenbo Xu, Yiqun Zhao
Nowadays, the Internet of things (IOT) is becoming more and more popular. Due to routing protocol easy to extend, hierarchical routing protocol, for example Low Energy Adaptive Clustering Hierarchy (LEACH) is more widely used. In order to lengthen the life of network as long as possible, an improved...
Proceedings Article

Effect of DNA Physical Characteristics to Drosophila Nucleosome Positioning

Zehua Li, Jihua Feng, Xiaowen Zhou, Huazheng Yu, Jing Chen
This thesis has done some research on Drosophila nucleosome positioning in embryonic period, found in nucleosome positioning is related to many factors, such as DNA, CG, DNA content of bending capacity distortion, DNA flip and so on, found that the size of different influencing factors on nucleosome...
Proceedings Article

New Parallel Interference Cancellation for Coded MC-DS-CDMA

Guoxiong Xu, Feng Ji
In this paper, by the application of Turbo principle, a new parallel interference cancellation and decoding (PIC/decoding) algorithm for convolutionally-coded multi-carrier DS-CDMA (MC-DS-CDMA) is proposed. We give a detailed description of the proposed algorithm, and further mathematical analysis is...