This paper describes a novel method of online composite shape recognition interms of the relevance feedback technology to capture a user's intentions incrementally, and adynamic user modeling method to adapt to va...This paper describes a novel method of online composite shape recognition interms of the relevance feedback technology to capture a user's intentions incrementally, and adynamic user modeling method to adapt to various users' styles. First, the relevance feedback isadapted to refine the recognition results and reduce the ambiguity incrementally based on theestablishment of a feature-based vector model of a user's sketches. Secondly, a dynamic usermodeling is introduced to model the user's sketching habits based on recording and analyzinghistorical information incrementally. A model-based matching strategy is also employed in the methodto recognize sketches dynamically. Experiments prove that the proposed method is both effective andefficient.展开更多
The eXtreme gradient boosting(XGBoost)algorithm is used to identify abnormal users.Firstly,the raw data were cleaned.Then user power characteristics were extracted from different aspects.Finally,the XGBoost classifier...The eXtreme gradient boosting(XGBoost)algorithm is used to identify abnormal users.Firstly,the raw data were cleaned.Then user power characteristics were extracted from different aspects.Finally,the XGBoost classifier was used to identify the abnormal users respectively in the balanced sample set and the unbalanced sample set.In contrast,under the same characteristics,the k-nearest neighbor(KNN)classifier,back-propagation(BP)neural network classifier and random forest classifier were used to identify the abnormal users in the two samples.The experimental results show that the XGBoost classifier has higher recognition rate and faster running speed.Especially in the imbalanced data sets,the performance improvement is obvious.展开更多
Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network....Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network.There is also a trend towards the personalization of web applications;to do this,the applications need to acquire information about the particular user.To maximise the use of the various sets of user information distributed on the web,this paper proposes a method to support the reuse and sharing of user profiles by different applications,and is based on user profile integration.To realize this goal,the initial task is user identification,and this forms the focus of the current paper.A new user identification method based on Multiple Attribute Decision Making(MADM) is described in which a subjective weight-directed objective weighting,which is obtained from the Similarity Weight method,is proposed to determine the relative weights of the common properties.Attribute Synthetic Evaluation is used to determine the equivalence of users.Experimental results show that the method is both feasible and effective despite the incompleteness of the candidate user dataset.展开更多
Security video communication is a challenging task,especially for wireless video applications.An efficient security multimedia system on embedded platform is designed.By analyzing the hardware architecture and resourc...Security video communication is a challenging task,especially for wireless video applications.An efficient security multimedia system on embedded platform is designed.By analyzing the hardware architecture and resource,the efficient DSP-based H.264/AVC coding is studied by efficient video coding techniques and system optimizing implementation.To protect the confidentiality and integrity of media information,a novel security mechanism is presented,which includes user identify authentication and a perceptual video encryption algorithm based on exploiting the special feature of entropy coding in H.264.Experimental results show that the proposed hardware framework has high performance and achieves a better balance between security and efficiency.The proposed security mechanism can achieve high security and low complexity cost,and has a little effect on the compression ratio and transmission bandwidth.What’s more,encoding and encryption at the same time,the performance of data process can meet real-time application.展开更多
The staggered-grid finite-difference (SGFD) method has been widely used in seismic forward modeling. The precision of the forward modeling results directly affects the results of the subsequent seismic inversion and...The staggered-grid finite-difference (SGFD) method has been widely used in seismic forward modeling. The precision of the forward modeling results directly affects the results of the subsequent seismic inversion and migration. Numerical dispersion is one of the problems in this method. The window function method can reduce dispersion by replacing the finite-difference operators with window operators, obtained by truncating the spatial convolution series of the pseudospectral method. Although the window operators have high precision in the low-wavenumber domain, their precision decreases rapidly in the high-wavenumber domain. We develop a least squares optimization method to enhance the precision of operators obtained by the window function method. We transform the SGFD problem into a least squares problem and find the best solution iteratively. The window operator is chosen as the initial value and the optimized domain is set by the error threshold. The conjugate gradient method is also adopted to increase the stability of the solution. Approximation error analysis and numerical simulation results suggest that the proposed method increases the precision of the window function operators and decreases the numerical dispersion.展开更多
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S...Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.展开更多
Nowadays,mobile operators in China mainland are facing fierce competition from one to another,and their focus of customer competition has,in general,shifted from public to corporate customers.One big challenge in corp...Nowadays,mobile operators in China mainland are facing fierce competition from one to another,and their focus of customer competition has,in general,shifted from public to corporate customers.One big challenge in corporate customer management is how to identify fake corporate members and potential corporate members from corporate customers.In this study,we have proposed an identification method that combines the rule-based and probabilistic methods.Through this method,fake corporate members can be eliminated and external potential members can be mined.The experimental results based on the data obtained from a local mobile operator revealed that the proposed method can effectively and efficiently identify fake and potential corporate members.The proposed method can be used to improve the management of corporate customers.展开更多
文摘This paper describes a novel method of online composite shape recognition interms of the relevance feedback technology to capture a user's intentions incrementally, and adynamic user modeling method to adapt to various users' styles. First, the relevance feedback isadapted to refine the recognition results and reduce the ambiguity incrementally based on theestablishment of a feature-based vector model of a user's sketches. Secondly, a dynamic usermodeling is introduced to model the user's sketching habits based on recording and analyzinghistorical information incrementally. A model-based matching strategy is also employed in the methodto recognize sketches dynamically. Experiments prove that the proposed method is both effective andefficient.
基金National Natural Science Foundation of China(No.61262044)
文摘The eXtreme gradient boosting(XGBoost)algorithm is used to identify abnormal users.Firstly,the raw data were cleaned.Then user power characteristics were extracted from different aspects.Finally,the XGBoost classifier was used to identify the abnormal users respectively in the balanced sample set and the unbalanced sample set.In contrast,under the same characteristics,the k-nearest neighbor(KNN)classifier,back-propagation(BP)neural network classifier and random forest classifier were used to identify the abnormal users in the two samples.The experimental results show that the XGBoost classifier has higher recognition rate and faster running speed.Especially in the imbalanced data sets,the performance improvement is obvious.
基金supported in part by the Natural Science Basic Research Plan in Shaanxi Province of China under Grant No.2013JM8021the National Natural Science Foundation of China under Grant No.61272458
文摘Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network.There is also a trend towards the personalization of web applications;to do this,the applications need to acquire information about the particular user.To maximise the use of the various sets of user information distributed on the web,this paper proposes a method to support the reuse and sharing of user profiles by different applications,and is based on user profile integration.To realize this goal,the initial task is user identification,and this forms the focus of the current paper.A new user identification method based on Multiple Attribute Decision Making(MADM) is described in which a subjective weight-directed objective weighting,which is obtained from the Similarity Weight method,is proposed to determine the relative weights of the common properties.Attribute Synthetic Evaluation is used to determine the equivalence of users.Experimental results show that the method is both feasible and effective despite the incompleteness of the candidate user dataset.
基金supported by the Project (No.2005CB321902) of Major State Basic Research Development (973)Project (No.yzdj0705) of Information Security Key Laboratory of the General Office of CPC Central Committee of China
文摘Security video communication is a challenging task,especially for wireless video applications.An efficient security multimedia system on embedded platform is designed.By analyzing the hardware architecture and resource,the efficient DSP-based H.264/AVC coding is studied by efficient video coding techniques and system optimizing implementation.To protect the confidentiality and integrity of media information,a novel security mechanism is presented,which includes user identify authentication and a perceptual video encryption algorithm based on exploiting the special feature of entropy coding in H.264.Experimental results show that the proposed hardware framework has high performance and achieves a better balance between security and efficiency.The proposed security mechanism can achieve high security and low complexity cost,and has a little effect on the compression ratio and transmission bandwidth.What’s more,encoding and encryption at the same time,the performance of data process can meet real-time application.
基金jointly supported by the NSF(No.41720104006)the Strategic Priority Research Program of the Chinese Academy of Sciences(A)(No.XDA14010303)+2 种基金the National Oil and Gas Project(Nos.2016ZX05002-005-007HZ and 2016ZX05014-001-008HZ)the Shandong Innovation Project(No.2017CXGC1602)the Qingdao Innovation Project(Nos.16-5-1-40-jch and 17CX05011)
文摘The staggered-grid finite-difference (SGFD) method has been widely used in seismic forward modeling. The precision of the forward modeling results directly affects the results of the subsequent seismic inversion and migration. Numerical dispersion is one of the problems in this method. The window function method can reduce dispersion by replacing the finite-difference operators with window operators, obtained by truncating the spatial convolution series of the pseudospectral method. Although the window operators have high precision in the low-wavenumber domain, their precision decreases rapidly in the high-wavenumber domain. We develop a least squares optimization method to enhance the precision of operators obtained by the window function method. We transform the SGFD problem into a least squares problem and find the best solution iteratively. The window operator is chosen as the initial value and the optimized domain is set by the error threshold. The conjugate gradient method is also adopted to increase the stability of the solution. Approximation error analysis and numerical simulation results suggest that the proposed method increases the precision of the window function operators and decreases the numerical dispersion.
基金supported by the Foundation for Key Program of Ministry of Education, China under Grant No.311007National Science Foundation Project of China under Grants No. 61202079, No.61170225, No.61271199+1 种基金the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-09-015Athe Fundamental Research Funds in Beijing Jiaotong University under Grant No.W11JB00630
文摘Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.
基金supported by the Youth Research and Innovation Program in Beijing University of Posts and Telecommunications under Grants No. 2012RC1006,No. 2012RC1008the National Key Basic Research Program of China (973 Program) under Grant No.2012CB315805and the National Natural Science Foundation of China under Grant No.71172135
文摘Nowadays,mobile operators in China mainland are facing fierce competition from one to another,and their focus of customer competition has,in general,shifted from public to corporate customers.One big challenge in corporate customer management is how to identify fake corporate members and potential corporate members from corporate customers.In this study,we have proposed an identification method that combines the rule-based and probabilistic methods.Through this method,fake corporate members can be eliminated and external potential members can be mined.The experimental results based on the data obtained from a local mobile operator revealed that the proposed method can effectively and efficiently identify fake and potential corporate members.The proposed method can be used to improve the management of corporate customers.