Computer Journal最新文献

筛选
英文 中文
A Unified Framework to Discover Permutation Generation Algorithms 发现排列生成算法的统一框架
IF 1.4 4区 计算机科学
Computer Journal Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab181
Pramod Ganapathi;Rezaul Chowdhury
{"title":"A Unified Framework to Discover Permutation Generation Algorithms","authors":"Pramod Ganapathi;Rezaul Chowdhury","doi":"10.1093/comjnl/bxab181","DOIUrl":"https://doi.org/10.1093/comjnl/bxab181","url":null,"abstract":"We present two simple, intuitive and general algorithmic frameworks that can be used to design a wide variety of permutation generation algorithms. The frameworks can be used to produce 19 existing permutation algorithms, including the well-known algorithms of Heap, Wells, Langdon, Zaks, Tompkins and Lipski. We use the frameworks to design two new sorting-based permutation generation algorithms, one of which is optimal.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"603-614"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49977703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hybrid Strategy Improved Whale Optimization Algorithm for Web Service Composition Web服务组合的混合策略改进鲸鱼优化算法
IF 1.4 4区 计算机科学
Computer Journal Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab187
Chuanxiang Ju;Hangqi Ding;Benjia Hu
{"title":"A Hybrid Strategy Improved Whale Optimization Algorithm for Web Service Composition","authors":"Chuanxiang Ju;Hangqi Ding;Benjia Hu","doi":"10.1093/comjnl/bxab187","DOIUrl":"https://doi.org/10.1093/comjnl/bxab187","url":null,"abstract":"With the rapid growth of the number of web services on the Internet, various service providers provide many similar services with the same function but different quality of service (QoS) attributes. It is a key problem to be solved urgently to select the service composition quickly, meeting the users’ QoS requirements from many candidate services. Optimization of web service composition is an NP-hard issue and intelligent optimization algorithms have become the mainstream method to solve this complex problem. This paper proposed a hybrid strategy improved whale optimization algorithm, which is based on the concepts of chaos initialization, nonlinear convergence factor and mutation. By maintaining a balance between exploration and exploitation, the problem of slow or early convergence is overcome to a certain extent. To evaluate its performance more accurately, the proposed algorithm was first tested on a set of standard benchmarks. After, simulations were performed using the real quality of web service dataset. Experimental results show that the proposed algorithm is better than the original version and other meta-heuristic algorithms on average, as well as verifies the feasibility and stability of web service composition optimization.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"662-677"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49977704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Pattern Matching Model for Recognition of Stone Inscription Characters 石刻文字识别的模式匹配模型
IF 1.4 4区 计算机科学
Computer Journal Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab177
K Durga Devi;P Uma Maheswari;Phani Kumar Polasi;R Preetha;M Vidhyalakshmi
{"title":"Pattern Matching Model for Recognition of Stone Inscription Characters","authors":"K Durga Devi;P Uma Maheswari;Phani Kumar Polasi;R Preetha;M Vidhyalakshmi","doi":"10.1093/comjnl/bxab177","DOIUrl":"https://doi.org/10.1093/comjnl/bxab177","url":null,"abstract":"As there are countless significant works done for handwritten character recognition, very meager effort has been reported for inscription characters especially for Tamil stone inscriptions. The real challenge faced in handling stone inscription is dataset collection and foreground and background discrimination. Till present days, the archeological department follows traditional way of capturing, preserving and deciphering stone inscriptions which is manual, more time consuming and need expert assistance. Hence digitized recognition is essential and efficient pattern matching algorithm is needed to be developed to deal with variations in shape and size of complex structured characters present in Tamil stone inscriptions. In this paper, an automated character recognition by pattern matching approach is developed, where character features were extracted by using pattern matching algorithm that helps achieving good recognition rate. Recognition of ancient Tamil stone inscriptions characters and finding their corresponding contemporary Tamil character is done by Image-based Character Pattern Identification (ICPI) system. Modified Speeded Up Robust Feature with Bag of Grapheme (MSURF-BoG) algorithm is implemented to detect the strongest key points from the input character with different orientations. These key point features were created for training the image as a model called Bag of Grapheme (BoG) with code word creation. Hence unsupervised key point features were extracted and pattern matching is performed. 11\u0000<sup>th</sup>\u0000 century Tamil stone inscriptions were taken as samples which has 7 vowels and 17 consonants, totally 24 characters were used. Here samples with different orientation from each 24 character were used for training the system. The proposed system is evaluated by recognition accuracy which is reported for character wise at the maximum of 96%.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"554-564"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49946834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Generation Method for Diverse Privacy Image Based on Machine Learning 一种基于机器学习的多种隐私图像生成方法
IF 1.4 4区 计算机科学
Computer Journal Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab176
Weina Niu;Yuheng Luo;Kangyi Ding;Xiaosong Zhang;Yanping Wang;Beibei Li
{"title":"A Novel Generation Method for Diverse Privacy Image Based on Machine Learning","authors":"Weina Niu;Yuheng Luo;Kangyi Ding;Xiaosong Zhang;Yanping Wang;Beibei Li","doi":"10.1093/comjnl/bxab176","DOIUrl":"https://doi.org/10.1093/comjnl/bxab176","url":null,"abstract":"In recent years, deep neural networks have been extensively applied in various fields, and face recognition is one of the most important applications. Artificial intelligence has reached or even surpassed human capabilities in many fields. However, while artificial intelligence application provides convenience to the human lives, it also leads to the risk of privacy leaking. At present, the privacy protection technology for human faces has received extensive attention. Research goals of face privacy protection technology mainly include providing face anonymization and data availability protection. Existing methods usually have insufficient anonymity and they are not easy to control the degree of image distortion, which makes it difficult to achieve the purpose of privacy protection. Moreover, they do not explicitly perform diversity preservation of attributes such as emotions, expressions and ethnicities, so they cannot perform data analysis tasks on non-identity attributes. This paper proposes a diverse privacy face image generation algorithm based on machine learning, called DIVFGEN. This algorithm comprehensively considers image distortion, identity mapping distance loss and emotion classification loss; transforms the privacy protection target into the problem of generating adversarial examples based on the recognition model; and uses an adaptive optimization algorithm to generate anonymity and diversity of privacy images. The experimental results show that on the Cohn-Kanade+ dataset, our algorithm can reduce the probability of facial recognition by the neural network when it accurately classifies sentiment, from 98.6% to 4.8%.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"540-553"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49946835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Caviar-Sunflower Optimization Algorithm-Based Deep Learning Classifier for Multi-Document Summarization 基于鱼子酱-向日葵优化算法的多文档摘要深度学习分类器
IF 1.4 4区 计算机科学
Computer Journal Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab193
Sheela J;Janet B
{"title":"Caviar-Sunflower Optimization Algorithm-Based Deep Learning Classifier for Multi-Document Summarization","authors":"Sheela J;Janet B","doi":"10.1093/comjnl/bxab193","DOIUrl":"https://doi.org/10.1093/comjnl/bxab193","url":null,"abstract":"This paper proposes a multi-document summarization model using an optimization algorithm named CAVIAR Sun Flower Optimization (CAV-SFO). In this method, two classifiers, namely: Generative Adversarial Network (GAN) classifier and Deep Recurrent Neural Network (Deep RNN), are utilized to generate a score for summarizing multi-documents. Initially, the simHash method is applied for removing the duplicate/real duplicate contents from sentences. Then, the result is given to the proposed CAV-SFO based GAN classifier to determine the score for individual sentences. The CAV-SFO is newly designed by incorporating CAVIAR with Sun Flower Optimization Algorithm (SFO). On the other hand, the pre-processing step is done for duplicate-removed sentences from input multi-document based on stop word removal and stemming. Afterward, text-based features are extracted from pre-processed documents, and then CAV-SFO based Deep RNN is introduced for generating a score; thereby, the internal model parameters are optimally tuned. Finally, the score generated by CAV-SFO based GAN and CAV-SFO based Deep RNN is hybridized, and the final score is obtained using a multi-document compression ratio. The proposed TaylorALO-based GAN showed improved results with maximal precision of 0.989, maximal recall of 0.986, maximal F-Measure of 0.823, maximal Rouge-Precision of 0.930, and maximal Rouge-recall of 0.870.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"727-742"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49977710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Incremental Hierarchical Clustering Based System For Record Linkage In E-Commerce Domain 电子商务领域中基于增量层次聚类的记录链接系统
IF 1.4 4区 计算机科学
Computer Journal Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab179
Furkan Gözükara;Selma Ayşe Özel
{"title":"An Incremental Hierarchical Clustering Based System For Record Linkage In E-Commerce Domain","authors":"Furkan Gözükara;Selma Ayşe Özel","doi":"10.1093/comjnl/bxab179","DOIUrl":"https://doi.org/10.1093/comjnl/bxab179","url":null,"abstract":"In this study, a novel record linkage system for E-commerce products is presented. Our system aims to cluster the same products that are crawled from different E-commerce websites into the same cluster. The proposed system achieves a very high success rate by combining both semi-supervised and unsupervised approaches. Unlike the previously proposed systems in the literature, neither a training set nor structured corpora are necessary. The core of the system is based on Hierarchical Agglomerative Clustering (HAC); however, the HAC algorithm is modified to be dynamic such that it can efficiently cluster a stream of incoming new data. Since the proposed system does not depend on any prior data, it can cluster new products. The system uses bag-of-words representation of the product titles, employs a single distance metric, exploits multiple domain-based attributes and does not depend on the characteristics of the natural language used in the product records. To our knowledge, there is no commonly used tool or technique to measure the quality of a clustering task. Therefore in this study, we use ELKI (Environment for Developing KDD-Applications Supported by Index-Structures), an open-source data mining software, for performance measurement of the clustering methods; and show how to use ELKI for this purpose. To evaluate our system, we collect our own dataset and make it publicly available to researchers who study E-commerce product clustering. Our proposed system achieves 96.25% F-Measure according to our experimental analysis. The other state-of-the-art clustering systems obtain the best 89.12% F-Measure.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"581-602"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49946837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Parameter Server Placement for Distributed Deep Learning in Edge Computing 边缘计算中分布式深度学习的高效参数服务器配置
IF 1.4 4区 计算机科学
Computer Journal Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab188
Yalan Wu;Jiaquan Yan;Long Chen;Jigang Wu;Yidong Li
{"title":"Efficient Parameter Server Placement for Distributed Deep Learning in Edge Computing","authors":"Yalan Wu;Jiaquan Yan;Long Chen;Jigang Wu;Yidong Li","doi":"10.1093/comjnl/bxab188","DOIUrl":"https://doi.org/10.1093/comjnl/bxab188","url":null,"abstract":"Parameter servers (PSs) placement is one of the most important factors for global model training on distributed deep learning. This paper formulates a novel problem for placement strategy of PSs in the dynamic available storage capacity, with the objective of minimizing the training time of the distributed deep learning under the constraints of storage capacity and the number of local PSs. Then, we provide the proof for the NP-hardness of the proposed problem. The whole training epochs are divided into two parts, i.e. the first epoch and the other epochs. For the first epoch, an approximation algorithm and a rounding algorithm are proposed in this paper, to solve the proposed problem. For the other epochs, an adjustment algorithm is proposed, by continuously adjusting the decisions for placement strategy of PSs to decrease the training time of the global model. Simulation results show that the proposed approximation algorithm and rounding algorithm perform better than existing works for all cases, in terms of the training time of global model. Meanwhile, the training time of global model for the proposed approximation algorithm is very close to that for optimal solution generated by the brute-force approach for all cases. Besides, the integrated algorithm outperforms the existing works when the available storage capacity varies during the training.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"678-691"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49977708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepSTF: A Deep Spatial–Temporal Forecast Model of Taxi Flow 出租车流量的深度时空预测模型
IF 1.4 4区 计算机科学
Computer Journal Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab178
Zhiqiang Lv;Jianbo Li;Chuanhao Dong;Zhihao Xu
{"title":"DeepSTF: A Deep Spatial–Temporal Forecast Model of Taxi Flow","authors":"Zhiqiang Lv;Jianbo Li;Chuanhao Dong;Zhihao Xu","doi":"10.1093/comjnl/bxab178","DOIUrl":"https://doi.org/10.1093/comjnl/bxab178","url":null,"abstract":"Taxi flow forecast is significant for planning transportation and allocating basic transportation resources. The flow forecast in the urban adjacent area is different from the fixed-point flow forecast. Their data are more complex and diverse, which make them more challenging to forecast. This paper introduces a deep spatial–temporal forecast (DeepSTF) model for the flow forecasting of urban adjacent area, which divides the urban into grids and makes it have a graph structure. The model builds a spatial–temporal calculation block, which uses graph convolutional network to extract spatial correlation feature and uses two-layer temporal convolutional networks to extract time-dependent feature. Based on the theory of dilation convolution and causal convolution, the model overcomes the under-fitting phenomenon of other models when calculating with rapidly changing data. In order to improve the accuracy of prediction, we take weather as an implicit factor and let it participate in the feature calculation process. A comparison experiment is set between our model and the seven existing traffic flow forecast models. The experimental results prove that the model has better the capabilities of long-term traffic prediction and performs well in various evaluation indicators.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"565-580"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49946836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Declarative Programming with Intensional Sets in Java Using JSetL 使用JSetL在Java中使用内涵集进行声明式编程
IF 1.4 4区 计算机科学
Computer Journal Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab195
Maximiliano Cristiá;Andrea Fois;Gianfranco Rossi
{"title":"Declarative Programming with Intensional Sets in Java Using JSetL","authors":"Maximiliano Cristiá;Andrea Fois;Gianfranco Rossi","doi":"10.1093/comjnl/bxab195","DOIUrl":"https://doi.org/10.1093/comjnl/bxab195","url":null,"abstract":"Intensional sets are sets given by a property rather than by enumerating their elements. In a previous work, we have proposed a decision procedure for a first-order logic language which provides restricted intensional sets (RISs), i.e. a sub-class of intensional sets that are guaranteed to denote finite—though unbounded—sets. In this paper, we show how RIS can be exploited as a convenient programming tool also in a conventional setting, namely the imperative O-O language Java. We do this by considering a Java library, called JSetL, that integrates the notions of logical variable, (set) unification and constraints that are typical of constraint logic programming languages into the Java language. We show how JSetL is naturally extended to accommodate for RIS and RIS constraints and how this extension can be exploited; on the one hand, to support a more declarative style of programming and, on the other hand, to effectively enhance the expressive power of the constraint language provided by the library.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"763-784"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49946839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning 防范数据中毒攻击:从分布式学习到联邦学习
IF 1.4 4区 计算机科学
Computer Journal Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab192
Yuchen Tian;Weizhe Zhang;Andrew Simpson;Yang Liu;Zoe Lin Jiang
{"title":"Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning","authors":"Yuchen Tian;Weizhe Zhang;Andrew Simpson;Yang Liu;Zoe Lin Jiang","doi":"10.1093/comjnl/bxab192","DOIUrl":"https://doi.org/10.1093/comjnl/bxab192","url":null,"abstract":"Federated learning (FL), a variant of distributed learning (DL), supports the training of a shared model without accessing private data from different sources. Despite its benefits with regard to privacy preservation, FL's distributed nature and privacy constraints make it vulnerable to data poisoning attacks. Existing defenses, primarily designed for DL, are typically not well adapted to FL. In this paper, we study such attacks and defenses. In doing so, we start from the perspective of DL and then give consideration to a real-world FL scenario, with the aim being to explore the requisites of a desirable defense in FL. Our study shows that (i) the batch size used in each training round affects the effectiveness of defenses in DL, (ii) the defenses investigated are somewhat effective and moderately influenced by batch size in FL settings and (iii) the non-IID data makes it more difficult to defend against data poisoning attacks in FL. Based on the findings, we discuss the key challenges and possible directions in defending against such attacks in FL. In addition, we propose detect and suppress the potential outliers(DSPO), a defense against data poisoning attacks in FL scenarios. Our results show that DSPO outperforms other defenses in several cases.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"711-726"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49977709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信