{"title":"Simulation for Target Detection in Polarimetric Scenes","authors":"Junhua Yue, Yan Li","doi":"10.23940/ijpe.20.08.p18.13101320","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p18.13101320","url":null,"abstract":"","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114313000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incremental Data Mining-based Software Failure Detection","authors":"Pan Liu, Wulan Huang","doi":"10.23940/ijpe.20.08.p15.12791288","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p15.12791288","url":null,"abstract":"It has been proved by practice that mining weblogs to detect software errors is an effective software testing method. This paper presents a software failure detection method based on the incremental mining weblog strategy and gives data mining steps for the implementation of this method. A case is studied for the proposed test method. In this case, we use Splunk, a data analysis tool, to analyze some weblogs that record some linked information of mobile applications for android. The result of the data analysis shows that the proposed method can effectively detect the software failure problem in the download process of mobile applications. Therefore, the proposed method can be used for software reliability assessment.","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124703837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ran Zhang, Min Liu, Yifeng Yin, Qikun Zhang, Zengyu Cai
{"title":"Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA","authors":"Ran Zhang, Min Liu, Yifeng Yin, Qikun Zhang, Zengyu Cai","doi":"10.23940/ijpe.20.08.p4.11711182","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p4.11711182","url":null,"abstract":"","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115661890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bei-yi Wang, Xiaohong Zhang, Haibin Wu, Wang Qi, Hu Lijuan
{"title":"Estimation of Motion Blurred Direction for Video Monitor Image","authors":"Bei-yi Wang, Xiaohong Zhang, Haibin Wu, Wang Qi, Hu Lijuan","doi":"10.23940/ijpe.20.08.p12.12541261","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p12.12541261","url":null,"abstract":"","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhifeng Zhang, Xiao Cui, Pu Li, Jintao Jiang, Xiaohui Ji
{"title":"Hyperspectral Data Analysis based on Integrated Deep Learning","authors":"Zhifeng Zhang, Xiao Cui, Pu Li, Jintao Jiang, Xiaohui Ji","doi":"10.23940/ijpe.20.08.p9.12251234","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p9.12251234","url":null,"abstract":"","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133866338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visual Tracking based on Moving Monocular Camera","authors":"Kan Xiu, He Jia, X. Zhenghao","doi":"10.23940/ijpe.20.08.p8.12151224","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p8.12151224","url":null,"abstract":"","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Privacy Spatial Decomposition via Flattening Kd-Tree","authors":"Guoqiang Gong, Cedric Lessoy, Chuan Lu, Ke Lv","doi":"10.23940/ijpe.20.07.p8.10581066","DOIUrl":"https://doi.org/10.23940/ijpe.20.07.p8.10581066","url":null,"abstract":"The key problem of using differential privacy is controlling sensitivity. Almost all papers focus on processing sensitivity, but the efficiency of the algorithm is also very important. Therefore, this paper hopes to improve efficiency as much as possible under the premise of ensuring utility. In this paper, decomposition and reconstruction via flattening kd-tree (DRF) is proposed based on differential privacy, which applies a flattening kd-tree to process the adjacency matrix. Firstly, by adjusting the vertex labeling, the set of labeling form dense areas and sparse areas as much as possible in the adjacency matrix. The adjacency matrix is then decomposed by flattening kd-tree, and each sub-region is anonymously operated using differential privacy. Finally, each subregion is reconstructed to obtain a complete anonymous graph. At the end of the article, experiments are conducted over real-world datasets. According to the results, DRF has a significant improvement in efficiency, the time complexity of DRF is O(|V|), and DRF has a good performance in degree distribution, degree centrality and cutting query.","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115923884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-Domain Relationship Prediction by Efficient Block Matrix Completion for Social Media Applications","authors":"Lizhi Xiao, Zheng Zhang, Peng Sun","doi":"10.23940/ijpe.20.07.p11.10871094","DOIUrl":"https://doi.org/10.23940/ijpe.20.07.p11.10871094","url":null,"abstract":"The online social media has experienced vigorous evolution. Diversified needs of information acquisition and retrieval on social media platforms have been evoked by massive users. While all sorts of application demands meet with explosive data growth, the development of effective methodologies has become emergent. By taking full advantage of rich context, we propose a heterogeneous object relation matrix completion approach (EBMC) which jointly complements the relationship between the heterogeneous data objects. Specifically, we detect the Place-of-Interest (POI) with mean shift algorithm on the GPS information of the social image collection. Then, a batch matrix completion and learning method is developed by optimizing a unified objective function to learn the POI-specific user-image, image-tag and user-tag relationships. Finally, we decompose the whole learning problem into a set of POI-specific subtasks, which corresponding to the relation data blocks separated by the POI structure. Through experiments on tasks of image annotation and user retrieval based on image similarity of real-world social media datasets, we found that our proposed method achieved good performance.","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133244853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical Study on the Impact of Code Contributor on Code Smell","authors":"Junpeng Jiang, Can Zhu, Xiaofang Zhang","doi":"10.23940/ijpe.20.07.p9.10671077","DOIUrl":"https://doi.org/10.23940/ijpe.20.07.p9.10671077","url":null,"abstract":"Code smells refer to poor designs that are considered to have negative impacts on the readability and maintainability during software evolution. Much research has been conducted to study the effects and correlations between them. However, software is a product of human intelligence, and the fundamental cause of code smell is developers. As a result, the research on the impact of code contributors on code smell appears vital in particular. In this paper, on 8 popular Java projects with 994 versions, we investigate the impact on code smells from the novel perspective of code contributors on five features. The empirical study indicated that the greater number of contributors involved, the more likely it is to introduce code smell. Having more mature contributors, who participate in more versions, can avoid the introduction of code smell. These findings are helpful for developers to optimize team structure and improve the quality of products.","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}