Journal of China Universities of Posts and Telecommunications最新文献

筛选
英文 中文
Collaborative recommendation based on social community detection 基于社会社区检测的协同推荐
Journal of China Universities of Posts and Telecommunications Pub Date : 2014-07-01 DOI: 10.1016/S1005-8885(14)60517-3
Xin LIU , Hai-hong E , Jun-jie TONG , Mei-na SONG
{"title":"Collaborative recommendation based on social community detection","authors":"Xin LIU ,&nbsp;Hai-hong E ,&nbsp;Jun-jie TONG ,&nbsp;Mei-na SONG","doi":"10.1016/S1005-8885(14)60517-3","DOIUrl":"10.1016/S1005-8885(14)60517-3","url":null,"abstract":"<div><p>Collaborative filtering algorithms have become one of the most used approaches to provide personalized services for users to deal with abundance of information. The traditional algorithms just use the explicit user-item rating matrix to find similar users or items. To improve the accuracy of the ratings predicted by the collaborative filtering algorithms, social information is widely incorporated into the traditional ones. Different with the existed works focus on directly connected neighbors, we consider the community between the users. We design the algorithms in two aspects: one is that the members in the same community have similar tastes and preferences, the other is that the member's taste is affected by the other members. We simplify these two factors as community similarity and community affection. Community similarity is incorporated into modifying the model-based collaborative filtering algorithm as the social community-based regularization (SCR), which improves 6.2% in mean absolute error (MAE) and 6.1% in root mean square error (RMSE) compared to the existed social recommendation algorithm. Community affection is incorporated into modifying the neighborhood-based collaborative filtering algorithm as the neighbor-based collaborative filtering based on community detection (NCFC) which improve 14.8% in MAE and 8.1% in RMSE compared to user-based collaborative filtering (UCF).</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"21 ","pages":"Pages 20-25, 45"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(14)60517-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88111785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An algorithm for friend-recommendation of social networking sites based on SimRank and ant colony optimization 基于simmrank和蚁群优化的社交网站好友推荐算法
Journal of China Universities of Posts and Telecommunications Pub Date : 2014-07-01 DOI: 10.1016/S1005-8885(14)60508-2
Lian-ju NING, Hai-yan DUAN
{"title":"An algorithm for friend-recommendation of social networking sites based on SimRank and ant colony optimization","authors":"Lian-ju NING,&nbsp;Hai-yan DUAN","doi":"10.1016/S1005-8885(14)60508-2","DOIUrl":"10.1016/S1005-8885(14)60508-2","url":null,"abstract":"<div><p>We put forward an algorithm on friend-recommendation of social networking sites based on SimRank and ant colony optimization, which broadens the appliance of the algorithm in this academic question. The algorithm focuses on the existing relationships between the members as the initial measurement and constructs artificial ants’ completed routing graph. Finally, an ordered and limited list of personalized recommendations through recursive optimization is produced. In the end, we verify the algorithm's rationality and validity through simulation and the result shows that it can improve the precision of friend-recommendation.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"21 ","pages":"Pages 79-87"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(14)60508-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80860057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Endpoint-agnostic address hopping communication — a network-based design by fully exploiting IPv6 huge space superiority 端点不可知地址跳变通信——一种充分利用IPv6巨大空间优势的基于网络的设计
Journal of China Universities of Posts and Telecommunications Pub Date : 2014-07-01 DOI: 10.1016/S1005-8885(14)60513-6
Shen YAN , Pei ZHANG , Yan MA , Tian-le YANG
{"title":"Endpoint-agnostic address hopping communication — a network-based design by fully exploiting IPv6 huge space superiority","authors":"Shen YAN ,&nbsp;Pei ZHANG ,&nbsp;Yan MA ,&nbsp;Tian-le YANG","doi":"10.1016/S1005-8885(14)60513-6","DOIUrl":"10.1016/S1005-8885(14)60513-6","url":null,"abstract":"<div><p>Network address hopping (NAH) proposed a mechanism to enhance data protection in communications across untrusted networks. It spread the data stream of a communication session across multiple channels, which tried to obstruct information interception in the first place by obscuring the fact that communication takes place between certain end-points. However, the time-stamped packets between two peers would provide a hint for correlating the intercepted packets in case the encryption of the counter got compromised. Furthermore, due to synchronization, the Internet Protocol version 6 (IPv6) addresses pair of the channel ends would appear and disappear strictly, which would perform time-relevance character. A Network-based hopping communication mechanism (NetHop) is proposed in this paper. The address hopping function is deployed on the network side instead of endpoint, which can support secure hopping communication function for universal endpoints without any restriction of Operating System or hardware. By using IPv6 to IPv6 network address translation (NAT), NetHop fully exploits the superiority of IPv6 huge address space. The hopping addresses are generated by hash function and the hopping addresses pair can be chosen randomly. Consequently, NetHop performs better on randomness and concealment than channel-rule NAH.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"21 ","pages":"Pages 46-51, 58"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(14)60513-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73526819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on hybrid pattern recognition algorithm for modulated signals 调制信号混合模式识别算法研究
Journal of China Universities of Posts and Telecommunications Pub Date : 2014-07-01 DOI: 10.1016/S1005-8885(14)60504-5
Hong-da LIU , Hong-xin ZHANG , Peng-fei HE
{"title":"Study on hybrid pattern recognition algorithm for modulated signals","authors":"Hong-da LIU ,&nbsp;Hong-xin ZHANG ,&nbsp;Peng-fei HE","doi":"10.1016/S1005-8885(14)60504-5","DOIUrl":"10.1016/S1005-8885(14)60504-5","url":null,"abstract":"<div><p>A combined feature extraction and recognition method is proposed based on higher-order spectrum, cyclic spectrum and time-frequency characteristics. In the application of this method, α-dimensional features, quadratic spectral characteristics and Fourier transform spectral characteristics of the signal are used to extract three characteristic values including the envelope means (EM) of α plane, the recursive normalized frequency component detection value (RNFCDV) and the quadratic spectrum normalized frequency component detection value (QSNFCDV), which have the merits of less identification parameters, insensitive to noise, less computation, high recognition rate, and multi-species identification. With this method, simulation results show that the recognition rate is more the 98% with the signal to noise rate (SNR) not less than 6 dB. And the performance of this method is better than the common recognition algorithms. There are eight types of signal, such as amplitude modulation (AM), phase modulation (PM), amplitude shift keying (ASK), frequency shift keying (FSK), phase shift keying (PSK), minimum shift keying (MSK), quadrature amplitude modulation (QAM) and direct sequence spread spectrum (DSSS), have been used to validate the feasibility of the method.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"21 ","pages":"Pages 106-109"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(14)60504-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73249988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Influences of finite gain bandwidth on dissipative solitons in passively mode-locked Er-doped fiber laser 有限增益带宽对被动锁模掺铒光纤激光器耗散孤子的影响
Journal of China Universities of Posts and Telecommunications Pub Date : 2014-07-01 DOI: 10.1016/S1005-8885(14)60502-1
Bo GAO , Jia-yu HUO , Ge WU , Xiao-jian TIAN
{"title":"Influences of finite gain bandwidth on dissipative solitons in passively mode-locked Er-doped fiber laser","authors":"Bo GAO ,&nbsp;Jia-yu HUO ,&nbsp;Ge WU ,&nbsp;Xiao-jian TIAN","doi":"10.1016/S1005-8885(14)60502-1","DOIUrl":"10.1016/S1005-8885(14)60502-1","url":null,"abstract":"<div><p>Dissipative solitons in the passively mode-locked fiber lasers based on the gain medium of erbium-doped (Er-doped) fiber have attracted a lot of interest in recent years. In this paper, we study the influences of finite gain bandwidth on dissipative solitons in passively mode-locked Er-doped fiber laser. We investigate the influences of the finite gain bandwidth on pulse duration, pulse peak power and single pulse energy of dissipative solitons. The results show that gain bandwidth of the gain medium has influence on dissipative soliton characteristics in passively mode-locked Er-doped fiber laser. The research in this paper has important theoretical and practical significance.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"21 ","pages":"Pages 115-118"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(14)60502-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78464518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPK-based login authentication for electricity operation information system 基于cpp的电力运营信息系统登录认证
Journal of China Universities of Posts and Telecommunications Pub Date : 2014-07-01 DOI: 10.1016/S1005-8885(14)60507-0
Xiao-jia ZOU, Xiang-dong YOU, Hao PAN, Zhi-yuan ZHANG, Xiao-lei WANG
{"title":"CPK-based login authentication for electricity operation information system","authors":"Xiao-jia ZOU,&nbsp;Xiang-dong YOU,&nbsp;Hao PAN,&nbsp;Zhi-yuan ZHANG,&nbsp;Xiao-lei WANG","doi":"10.1016/S1005-8885(14)60507-0","DOIUrl":"10.1016/S1005-8885(14)60507-0","url":null,"abstract":"<div><p>Login authentication security is indispensable to applications of client/server (C/S) structure. Although some security technology in login authentication is relatively mature after years of development, it cannot meet high security requirements for the system in the case of limited resources. To deal with it, this paper proposes a new login authentication solution and applies it in electricity operation information system (EOIS), an application aiming at electrical equipment overhaul and report. The authors firstly discuss the reason why combined public key (CPK) is adopted as the key technology instead of the common one public key infrastructure (PKI). Secondly, they expatiate on CPK generation mechanism and the realizing process of login authentication, including local authentication using CPK-based digital signature and remote authentication using web service. Then, some results from three encryption methods (message-digest algorithm 5(MD5), secure hash algorithm (SHA-1) and CPK-based digital signature) to test EOIS are given, which show that the new solution builds its security on Hash function chosen and protection of combined private key. Finally, the security analysis reveals that CPK-based login authentication is safer to ensure the certainty of user identity, the integrality and non-repudiation of messages, and the confidentiality of transmission.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"21 ","pages":"Pages 88-93, 114"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(14)60507-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88355323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on concurrency control algorithm for real-time collaborative editing systems 实时协同编辑系统的并发控制算法研究
Journal of China Universities of Posts and Telecommunications Pub Date : 2014-07-01 DOI: 10.1016/S1005-8885(14)60519-7
Jun-hui LIU , Geng-yu WEI , Cong WANG
{"title":"Research on concurrency control algorithm for real-time collaborative editing systems","authors":"Jun-hui LIU ,&nbsp;Geng-yu WEI ,&nbsp;Cong WANG","doi":"10.1016/S1005-8885(14)60519-7","DOIUrl":"10.1016/S1005-8885(14)60519-7","url":null,"abstract":"<div><p>Real-time collaborative editing systems are important groupware tools in the computer supported cooperative work (CSCW) field. They support geographically dispersed users to edit shared files, graphics, etc. simultaneously. Currently popular real-time collaborative editing systems mostly use plain text data for edit and synchronization, and the corresponding operations are deleting, adding or modifying characters. The data acquisition system's metadata in this article is the module, such as deleting, adding or modifying a certain question. On the basis of differential synchronization algorithms and generic operation transformation (GOT) algorithm, this paper proposes a new concurrency control algorithm differential synchronization and generic operation transformation control algorithm (DSGOT).</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"21 ","pages":"Pages 6-11"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(14)60519-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75223718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dissipative Solitons characteristics in passively mode-locked Yb-doped fiber laser under limitation of gain saturation energy 增益饱和能量限制下被动锁模掺镱光纤激光器的耗散孤子特性
Journal of China Universities of Posts and Telecommunications Pub Date : 2014-07-01 DOI: 10.1016/S1005-8885(14)60503-3
Ge WU, Yue-ming WU, Xiao-jian TIAN
{"title":"Dissipative Solitons characteristics in passively mode-locked Yb-doped fiber laser under limitation of gain saturation energy","authors":"Ge WU,&nbsp;Yue-ming WU,&nbsp;Xiao-jian TIAN","doi":"10.1016/S1005-8885(14)60503-3","DOIUrl":"10.1016/S1005-8885(14)60503-3","url":null,"abstract":"<div><p>This paper is devoted to research the characteristics of the dissipative solitons formed in a passively mode-locked Yb-doped fiber (YDF) laser under limitation of the gain saturation energy. The parabolic shape dissipative solitons with linear chirps are observed in the fiber laser. The influences of the gain saturation energy on pulse duration, peak power and single pulse energy of the dissipative solitons are investigated in-depth.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"21 ","pages":"Pages 110-114"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(14)60503-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81401003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flexible user-centric service selection algorithm for Internet of Things services 灵活的以用户为中心的物联网服务选择算法
Journal of China Universities of Posts and Telecommunications Pub Date : 2014-07-01 DOI: 10.1016/S1005-8885(14)60510-0
Nwe Htay Win NWE , Jian-min BAO , Gang CUI
{"title":"Flexible user-centric service selection algorithm for Internet of Things services","authors":"Nwe Htay Win NWE ,&nbsp;Jian-min BAO ,&nbsp;Gang CUI","doi":"10.1016/S1005-8885(14)60510-0","DOIUrl":"10.1016/S1005-8885(14)60510-0","url":null,"abstract":"<div><p>In Internet of Things (IoT), the similar functional services are evolving in different quality of services (QoS) due to the widespread deployment of spatially distributed things on dynamic networks through the web. Therefore, the user involvement in service selection systems becomes a vital role to enhance the system performance by taking into account of subjective factors. This paper proposes a flexible QoS-based service selection algorithm (FQSA) which mainly targets to the users to be able to give their subjective preferences in an easy and friendly manner. The FQSA algorithm selects the services based on subjective information provided by the service consumers and objective information supported by the service providers. It adopts artificial neural network backpropagation algorithm to find the objective factors and applies similarity aggregation method to evaluate the creditability of the user subjective factors which have already been evaluated by ontological reasoning with the help of proposed QoS ontology. The comparative study and experimental results show that our FQSA algorithm is superior to other service selection approaches.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"21 ","pages":"Pages 64-70"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(14)60510-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81586350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Study on parameter optimization in a passively mode-locked Erbium-doped fiber laser 被动锁模掺铒光纤激光器参数优化研究
Journal of China Universities of Posts and Telecommunications Pub Date : 2014-07-01 DOI: 10.1016/S1005-8885(14)60500-8
Bo GAO , Ge WU , Jia-yu HUO , Xiao-jian TIAN
{"title":"Study on parameter optimization in a passively mode-locked Erbium-doped fiber laser","authors":"Bo GAO ,&nbsp;Ge WU ,&nbsp;Jia-yu HUO ,&nbsp;Xiao-jian TIAN","doi":"10.1016/S1005-8885(14)60500-8","DOIUrl":"10.1016/S1005-8885(14)60500-8","url":null,"abstract":"<div><p>Optical soliton communication is the frontier research topic of optical fiber communication. In this paper, we study optical solitons generated by passively mode-locked Erbium-doped (Er-doped) fiber (EDF) laser. We analyze the variation of nonlinear equilibrium point parameter <em>N</em> of the passively mode-locked EDF laser in the role of group-velocity dispersion (GVD) and small-signal gain, and adjusting system parameter N is as close as to possible to 1. The ground state first-order optical soliton which generated through system parameter optimization of the passively mode-locked EDF laser will improve the efficiency and stability of optical soliton communication system. The research of this paper will have provided the theoretical foundation of parameter optimization in a passively mode-locked EDF laser. And it will be possible for the passively mode-locked fiber laser in optical fiber communication system to be applied from the laboratory stage to the practical application.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"21 ","pages":"Pages 125-128"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(14)60500-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76117515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信