Select
The Application of the Adjustable Multitimes Clustering Algorithm in Telecom Data
TENG Shao-Hua, WU Hao, LI Ri-Gui, ZHANG Wei, LIU Dong-Ning, LIANG Lu
Journal of Guangdong University of Technology. 2014, 31 (3): 1-7.
DOI: 10.3969/j.issn.1007-7162.2014.03.001
Huge amounts of telecom data are generated every day, so how to extract useful information from the data is one of the data mining problems. Because different applications need different clusters, sometimes a single K-means cluster algorithm cannot generate userspecified K-clusters. An adjustable multitimes clustering mining method is proposed. A big value K was used in the K-means clustering algorithm for the first time, and K clusters were obtained. They were used to select the number of the clusters and the initial centers of the clusters for the second time. The experimental results show that our method is effective, and it can be applied to mining different amounts of clusters and big data analysis.
Related Articles |
Metrics
Select
Privacy-preserving Algorithm for Cross-organizational Collaborative
LIU Hong-Wei, LIU Zhi-Hui, ZHU Hui, LU Tao
Journal of Guangdong University of Technology. 2014, 31 (3): 21-26.
The cross-organizational data has the typical characteristics of big data in collaborative optimization decision-making, such as distributedness, heterogeneity, and privacy etc. Secure multiparty computation(SMC) is a privacy-preserving algorithm, based on collaborative mechanisms or protocols. However, the methods typically used, such as monotone span program, cannot get rid of the computational complexity. It discussed two kinds of problems in collaborative optimization decision, and proposed secure multi-party computation protocols for the privacy-preserving of constraint parameters and decision variables. Then, it gave security proof. The results show that the SMC protocols can reduce the computational complexity of collaborative optimization decisions, and computation of some private information can be completed without transferred processing.
Related Articles |
Metrics
Select
Some Challenges in Clustering Analysis
JIANG Sheng-Yi, WANG Lian-Xi
Journal of Guangdong University of Technology. 2014, 31 (3): 32-38.
DOI: 10.3969/j.issn.1007-7162.2014.03.006
The aim of clustering is to help people find and recognize the unknown world, so as to accumulate knowledge for us in real life. Clustering analysis is an important part for the majority of researchers in unsupervised leaning, and is usually used as an analysis tool to explore the unknown data and its regularity for many cross subjects. It analyzed the procedure of clustering, and briefly surveyed the related achievements. Moreover, the problems of clustering algorithms in processing various data types, high dimensional data, unbalanced data were concluded, and the expansibility and the selection of evaluation index for algorithms were also discussed in detail. At last, some directions for future research were proposed. The above work can give valuable reference to further studies of clustering and data mining.
Related Articles |
Metrics
Select
Hybrid Dynamic Collaborative Filtering Algorithm Based on Big Data Sets
WANG Ling, FU Xiu-Fen, WANG Xiao-Mu
Journal of Guangdong University of Technology. 2014, 31 (3): 44-48.
DOI: 10.3969/j.issn.10077162.2014.03.008
Collaborative filtering has been widely used in the recommendation system, but the traditional algorithm has some limitations, such as inability to adapt to the sparsity of user-item rating matrix data sets well, failure to consider the classification of item, users-scores, interest change over time and other factors when calculating the similarity of the items. Regarding these limitations, it proposed a big data set hybrid dynamic collaborative filtering algorithm, based on the traditional collaborative filtering algorithm. When calculating the similarity of items, time decay functions were introduced in the algorithm, which considered both the similarity of items, scores and items classified. The weights of project integrated similarity could be adjusted automatically. In the algorithm, some improvements have also been made in similarity computing and the selection of the neighboring items. To verify the effectiveness of the algorithm, experiments were done on movielens data sets. Experimental results show that the algorithm is better than the traditional recommendation algorithms.
Related Articles |
Metrics
Select
Research on Intrusion Prevention Based on Trust in Cloud Environments
WANG Shuang-Tu, HAN Jian-Hua, LUO Jun
Journal of Guangdong University of Technology. 2014, 31 (3): 55-61.
DOI: 10.3969/j.issn.10077162.2014.03.010
Cloud computing has the nature of being dynamic, virtual and open since it was used, and all kinds of largescale cloud security incidents make the safety of cloud environments frequently questioned. To ensure the security of cloud environments, it proposed an intrusion prevention framework model, based on trusted computing in cloud environments, by combining intrusion prevention technologies and trusted computing ideas. The model began with the principle of intrusion prevention with access to behavioral characteristics. Then, these features were gradually normalized, and the weight of each feature was determined to obtain user nodes' credibility. Next, it used a variety of cloud cluster server engines to detect defense and make integrated decision analysis and cluster analysis, enabling the cloud to make timely fast intrusion prevention, which avoids the drawbacks of the traditional intrusion prevention, such as minding only their own business, lagging behind in detecting and preventing attacks. The model provides cloud users with the maximum intrusion prevention services, and ensures that the cloud can withstand attacks, making the cloud and cloud users secure.
Related Articles |
Metrics
Select
An Improved RFID Mutual Authentication Protocol Based on Hash Function
XIE Jin-Biao, OU Yu-Yi , LING Jie
Journal of Guangdong University of Technology. 2014, 31 (3): 62-66.
DOI: 10.3969/j.issn.1007-7162.2014.03.011
In view of the existing defects of RFID authentication protocol, based on the Hash function, and the low efficiency of the security protocol authentication in the application of the Internet of Things, it proposed an improved RFID security mutual authentication protocol, based on the Hash function. This protocol can protect data privacy, and prevent replay attack, privacy track, and spoofing attack. Compared with other protocols of this kind in security and performance, this protocol, which uses Label certification mark Tuse, Tstore and dynamic secret value S, can prevent desynchronization attack, has higher efficiency, and is suitable for low-cost RFID systems.
Related Articles |
Metrics
Select
Clusterhead Selection Mechanism Based on Energy Ratio in Wireless Sensor Networks
LI He, LIU Guang-Cong, HU Die
Journal of Guangdong University of Technology. 2014, 31 (3): 83-87.
DOI: 10.3969/j.issn.1007-7162.2014.03.015
Regarding energy consumption for different degrees of nodes in a wireless sensor network, it proposed the energy cluster head selection mechanism, based on the cost of energy. In this mechanism, the first common node was seen as the cluster head node. Nodes, necessary node energy consumption, and the current energy surplus value were computed. With the proposed concepts and formulas, the above energyrelated value was converted into the value of energy loss speed of the selected clusters at measurable sensor nodes. Simulation results show that the algorithm has a better cluster head selection, and it can effectively extend the network life cycle.
Related Articles |
Metrics
Select
Research on the Strategy for Temporal Information Index Based on HBase
CHEN Lei, FENG Chao-Yong
Journal of Guangdong University of Technology. 2014, 31 (3): 102-108.
DOI: 10.3969/j.issn.1007-7162.2014.03.018
To meet the needs for storing and quick retrieving mass unstructured temporal information, it proposed using the distributed and unstructured database HBase, which was on the Hadoop platform, to store temporal data. Then, it built the temporal data storage model with the store unit as the temporal set, and designed a Multi level indexed Distributed Hash Table (tDHT) algorithm to realize the retrieval for the temporal attribute value of temporal column quickly and efficiently. By mapping from temporal attribute value to the twodimensional space, the conversion from temporal data to space object was achieved, the temporal data area was divided by using the processing method for spatial data, Multi level temporal data subareas were generated, and the Multi level indexed DHT directory was constructed, which was stored by HBase, using the methodology of DHT. The experiment results show that the index strategy can achieve a good performance, and it can be used to accelerate temporal data retrieval in the HBase table to a certain extent.
Related Articles |
Metrics
Select
K Nearest Neighbor Query Based on Improved KdTree Construction Algorithm
CHEN Xiao-Kang, LIU Zhu-Song
Journal of Guangdong University of Technology. 2014, 31 (3): 119-123.
DOI: 10.3969/j.issn.1007-7162.2014.03.021
K nearest neighbor query algorithm is one of the commonly used algorithms in massive spatial data query. First, it construct an index of largescale spatial data by Kd-Tree, and hierarchical division of the search space. Then, it used the k nearest neighbor query to ensure the efficiency of the search. However, the traditional Kd-Tree construction has two drawbacks: the use of test data points are required for each k nearest neighbor query back to the root, thus affecting the efficiency of the query; Kd-Tree uses the splitlevel domain for the space division of space into cubes (twodimensional data are rectangular), extra space appears in polygonal space at the intersection of judgment, making the comparison of data unnecessary, thus affecting the efficiency of the query. Regarding these two shortcomings, it proposed the corresponding improved algorithmRB algorithm. Experimental results show that the algorithm has a higher query efficiency than the traditional KD algorithm.There are two main contribution from this paper: (1) This paper construct a quickly create Kd-Tree indexes to support queries KNN akgorithm to classify largescale data. (2) RB algorithm is proposed to improve the traditional Kd-Tree index construction method,and improving query efficiency for KNN algorithm.
Related Articles |
Metrics
Select
Power Efficient Bimodal Electronic Shelf Label System
LI Zheng, FENG Yong-Jin, JIANG Zhi-Wen
Journal of Guangdong University of Technology. 2014, 31 (3): 124-129.
DOI: 10.3969/j.issn.1007-7162.2014.03.022
To replace traditional paper shelf labels, it proposes a power efficient bimodal electronic shelf label system, based on the technologies of the Internet of Things and wireless sensor networks. Focusing on the power efficiency, the proposed electronic shelf label adopts an electrophoretic electronic paper display and a Bluetooth module as the display and communication modules respectively. Moreover, this label has two working states: wake-up state and sleep state, enabling it to switch the working state under the server commands, to report label status, and to update display contents with low power consumption. The experimental results show that this system can meet the basic requirements of application scenarios. It has an advantage of comparatively low running costs over traditional paper labels.
Related Articles |
Metrics
Select
Sleep Method of Wireless Electronic Shelf Labels Using Relative Time
FENG Yong-Jin, LI Zheng, ZHANG Hai-Xiao
Journal of Guangdong University of Technology. 2014, 31 (3): 130-136.
DOI: 10.3969/j.issn.1007-7162.2014.03.023
It proposes a sleep method of the wireless electronic shelf label system using relative time, based on the Internet of Things. Then, it provides a device model for electronic shelf labels controlled by relative time, the system workflow, a timesharing queuing algorithm, and a relativetime sleep algorithm. The experimental results show that the effective use of relative time helps to manage a large number of asynchronous electronic shelf labels working together. The working status of each label is accurately and simply controlled via a server that commands the time of sleep, wakeup, and communication of each label, thus increasing each label's power efficiency.
Related Articles |
Metrics