The maximum matching graph M(G) of a graph G is a simple graph whose vertices are the maximum matchings of G and where two maximum matchings are adjacent in M(G) if they differ by exactly one edge. In this paper, ...The maximum matching graph M(G) of a graph G is a simple graph whose vertices are the maximum matchings of G and where two maximum matchings are adjacent in M(G) if they differ by exactly one edge. In this paper, we prove that if a graph is isomorphic to its maximum matching graph, then every block of the graph is an odd cycle.展开更多
The maximum matching graph of a graph has a vertex for each maximummatching and an edge for each pair of maximum matchings which differ by exactly oneedge. In this paper, we prove that the connectivity of maximum matc...The maximum matching graph of a graph has a vertex for each maximummatching and an edge for each pair of maximum matchings which differ by exactly oneedge. In this paper, we prove that the connectivity of maximum matching graph of abipartite graph is equal to its minimum degree.展开更多
A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship amon...A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship among the components of a graphic object. Using two kinds of matching constraints dynamically generated in the matching process, the proposed approach can prune most improper mappings between SRGs during the matching process. According to our theoretical analysis in this paper, the time complexity of our approach is O(n 2) in the best case, and O(n!) in the worst case, which occurs infrequently. The spatial complexity is always O(n) for all cases. Implemented in Smart Sketchpad, our proposed strategy is of good performance.展开更多
The maximum matching graph of a graph has a vertex for each maximum matching and an edge for each pair of maximum matchings which differ by exactly one edge. In this paper, we obtain a lower bound of distance between ...The maximum matching graph of a graph has a vertex for each maximum matching and an edge for each pair of maximum matchings which differ by exactly one edge. In this paper, we obtain a lower bound of distance between two vertices of maximum matching graph, and give a necessary and sufficient condition that the bound can be reached.展开更多
Graph pattern matching(GPM)can be used to mine the key information in graphs.Exact GPM is one of the most commonly used methods among all the GPM-related methods,which aims to exactly find all subgraphs for a given qu...Graph pattern matching(GPM)can be used to mine the key information in graphs.Exact GPM is one of the most commonly used methods among all the GPM-related methods,which aims to exactly find all subgraphs for a given query graph in a data graph.The exact GPM has been widely used in biological data analyses,social network analyses and other fields.In this paper,the applications of the exact GPM were first introduced,and the research progress of the exact GPM was summarized.Then,the related algorithms were introduced in detail,and the experiments on the state-of-the-art exact GPM algorithms were conducted to compare their performance.Based on the experimental results,the applicable scenarios of the algorithms were pointed out.New research opportunities in this area were proposed.展开更多
A collection of k-matchings of bipartite graph Kn,n with the property thatevery pair of independent edges lies in exactly λ of the k-matchings is called aBIMATCH(n,k,λ)-design. Existences and constructions for vario...A collection of k-matchings of bipartite graph Kn,n with the property thatevery pair of independent edges lies in exactly λ of the k-matchings is called aBIMATCH(n,k,λ)-design. Existences and constructions for various BIMATCH (n,k,λ)designs are given.展开更多
To satisfy different service requirements of multiple users in the orthogo nal frequency division multiple access wireless local area network OFDMA-WLAN system downlink transmission a resource allocation algorithm bas...To satisfy different service requirements of multiple users in the orthogo nal frequency division multiple access wireless local area network OFDMA-WLAN system downlink transmission a resource allocation algorithm based on fairness and quality of service QoS provisioning is proposed. Different QoS requirements are converted into different rate requirements to calculate the QoSs atisfaction level.The optimization object is revised as a fairness-driven resource optimization function to provide fairness. The complex resource allocation problem is divided into channel allocation and power assignment sub-problems. The sub-problems are solved by the bipartite graph matching and water-filling based method.Compared with other algorithms the proposed algorithm sacrifices less data rate for higher fairnes and QoS satisfaction.The sim ulation results show that the proposed algorithm is capableo fp rovi ding QoS and fairness and performs better in a tradeoff among QoS fairness and data rate.展开更多
For the problem of track correlation failure under the influence of sensor system deviation in wireless sensor networks,a new track correlation method which is based on relative positional relation chart matching is p...For the problem of track correlation failure under the influence of sensor system deviation in wireless sensor networks,a new track correlation method which is based on relative positional relation chart matching is proposed.This method approximately simulates the track correlation determination process using artificial data,and integrally matches the relative position relation between multiple targets in the common measuring space of various sensors in order to fulfill the purpose of multi-target track correlation.The simulation results show that this method has high correlation accuracy and robustness.展开更多
Inexact graph matching algorithms have proved to be useful in many applications,such as character recognition,shape analysis,and image analysis. Inexact graph matching is,however,inherently an NP-hard problem with exp...Inexact graph matching algorithms have proved to be useful in many applications,such as character recognition,shape analysis,and image analysis. Inexact graph matching is,however,inherently an NP-hard problem with exponential computational complexity. Much of the previous research has focused on solving this problem using heuristics or estimations. Unfortunately,many of these techniques do not guarantee that an optimal solution will be found. It is the aim of the proposed algorithm to reduce the complexity of the inexact graph matching process,while still producing an optimal solution for a known application. This is achieved by greatly simplifying each individual matching process,and compensating for lost robustness by producing a hierarchy of matching processes. The creation of each matching process in the hierarchy is driven by an application-specific criterion that operates at the subgraph scale. To our knowledge,this problem has never before been approached in this manner. Results show that the proposed algorithm is faster than two existing methods based on graph edit operations.The proposed algorithm produces accurate results in terms of matching graphs,and shows promise for the application of shape matching. The proposed algorithm can easily be extended to produce a sub-optimal solution if required.展开更多
The research on graph pattern matching(GPM) has attracted a lot of attention. However, most of the research has focused on complex networks, and there are few researches on GPM in the medical field. Hence, with GPM th...The research on graph pattern matching(GPM) has attracted a lot of attention. However, most of the research has focused on complex networks, and there are few researches on GPM in the medical field. Hence, with GPM this paper is to make a breast cancer-oriented diagnosis before the surgery. Technically, this paper has firstly made a new definition of GPM, aiming to explore the GPM in the medical field, especially in Medical Knowledge Graphs(MKGs). Then, in the specific matching process, this paper introduces fuzzy calculation, and proposes a multi-threaded bidirectional routing exploration(M-TBRE) algorithm based on depth first search and a two-way routing matching algorithm based on multi-threading. In addition, fuzzy constraints are introduced in the M-TBRE algorithm, which leads to the Fuzzy-M-TBRE algorithm. The experimental results on the two datasets show that compared with existing algorithms, our proposed algorithm is more efficient and effective.展开更多
A graph G is said to be p-factor-critical if G-u1-u2-···-up has a perfect matching for any u1,u2,···,up∈V(G).The concept of p-factor-critical is a generalization of the concepts of facto...A graph G is said to be p-factor-critical if G-u1-u2-···-up has a perfect matching for any u1,u2,···,up∈V(G).The concept of p-factor-critical is a generalization of the concepts of factor-critical and bicritical for p=1 and p=2,respectively.Heping Zhang and Fuji Zhang[Construction for bicritical graphs and k-extendable bipartite graphs,Discrete Math.,306(2006)1415–1423]gave a concise structure characterization of bicritical graphs.In this paper,we present the characterizations of p-factor-critical graphs and minimal p-factorcritical graphs for p≥2.As an application,we also obtain a class of graphs which are minimal p-factor-critical for p≥1.展开更多
X-ray CT scanners,due to the transmissive nature of X-rays,have enabled the non-destructive evaluation of industrial products,even inside their bodies.In light of its effectiveness,this study introduces a new approach...X-ray CT scanners,due to the transmissive nature of X-rays,have enabled the non-destructive evaluation of industrial products,even inside their bodies.In light of its effectiveness,this study introduces a new approach to accelerate the inspection of many mechanical parts with the same shape in a bin.The input to this problem is a volumetric image(i.e.,CT volume)of many parts obtained by a single CT scan.We need to segment the parts in the volume to inspect each of them;however,random postures and dense contacts of the parts prohibit part segmentation using traditional template matching.To address this problem,we convert both the scanned volumetric images of the template and the binned parts to simpler graph structures and solve a subgraph matching problem to segment the parts.We perform a distance transform to convert the CT volume into a distance field.Then,we construct a graph based on Morse theory,in which graph nodes are located at the extremum points of the distance field.The experimental evaluation demonstrates that our fully automatic approach can detect target parts appropriately,even for a heap of 50 parts.Moreover,the overall computation can be performed in approximately 30 min for a large CT volume of approximately 2000×2000×1000 voxels.展开更多
Privacy preservation is a primary concern in social networks which employ a variety of privacy preservations mechanisms to preserve and protect sensitive user information including age,location,education,interests,and...Privacy preservation is a primary concern in social networks which employ a variety of privacy preservations mechanisms to preserve and protect sensitive user information including age,location,education,interests,and others.The task of matching user identities across different social networks is considered a challenging task.In this work,we propose an algorithm to reveal user identities as a set of linked accounts from different social networks using limited user profile data,i.e,user-name and friendship.Thus,we propose a framework,ExpandUIL,that includes three standalone al-gorithms based on(i)the percolation graph matching in Ex-pand FullName algorithm,(i)a supervised machine learning algorithm that works with the graph embedding,and(ii)a combination of the two,ExpandUserLinkage algorithm.The proposed framework as a set of algorithms is significant as,(i)it is based on the network topology and requires only name feature of the nodes,(i)it requires a considerably low initial seed,as low as one initial seed suffices,(ii)it is iterative and scalable with applicability to online incoming stream graphs,and(iv)it has an experimental proof of stability over a real ground-truth dataset.Experiments on real datasets,Instagram and VK social networks,show upto 75%recall for linked ac-counts with 96%accuracy using only one given seed pair.展开更多
The special characteristics of slowly moving infrared targets, such as containing only a few pixels,shapeless edge, low signal-to-clutter ratio, and low speed, make their detection rather difficult, especially when im...The special characteristics of slowly moving infrared targets, such as containing only a few pixels,shapeless edge, low signal-to-clutter ratio, and low speed, make their detection rather difficult, especially when immersed in complex backgrounds. To cope with this problem, we propose an effective infrared target detection algorithm based on temporal target detection and association strategy. First, a temporal target detection model is developed to segment the interested targets. This model contains mainly three stages, i.e., temporal filtering,temporal target fusion, and cross-product filtering. Then a graph matching model is presented to associate the targets obtained at different times. The association relies on the motion characteristics and appearance of targets,and the association operation is performed many times to form continuous trajectories which can be used to help disambiguate targets from false alarms caused by random noise or clutter. Experimental results show that the proposed method can detect slowly moving infrared targets in complex backgrounds accurately and robustly, and has superior detection performance in comparison with several recent methods.展开更多
Numerous indoor localization techniques have been proposed recently to meet the intensive demand for location- based service (LBS). Among them, the most popular solutions are the Wi-Fi fingerprint-based approaches. ...Numerous indoor localization techniques have been proposed recently to meet the intensive demand for location- based service (LBS). Among them, the most popular solutions are the Wi-Fi fingerprint-based approaches. The core challenge is to lower the cost of fingerprint site-survey. One of the trends is to collect the piecewise data from clients and establish the radio map in crowdsourcing manner. However the low participation rate blocks the practical use. In this work, we propose a passive crowdsourcing channel state information (CSI) based indoor localization scheme, C2IL. Despite a crowdsourcing based approach, our scheme is totally transparent to the client and the only requirement is to connect to our 802.11n access points (APs). C2IL is built upon an innovative method to accurately estimate the moving speed solely based on 802.11n CSI. Knowing the walking speed of a client and its surrounding APs, a graph matching algorithm is employed to extract the received signal strength (RSS) fingerprints and establish the fingerprint map. For localization phase, we design a trajectory clustering based localization algorithm to provide precise real-time indoor localization and tracking. We develop and deploy a practical working system of C2IL in a large office environment. Extensive evaluations indicate that the error of speed estimation is within 3%, and the localization error is within 2 m at 80% time in a very complex indoor environment.展开更多
Network attacks evolved from single-step and simple attacks to complex multistep attacks.Current methods of multistep attack detection usually match multistep attacks from intrusion detection systems(IDS)alarms based ...Network attacks evolved from single-step and simple attacks to complex multistep attacks.Current methods of multistep attack detection usually match multistep attacks from intrusion detection systems(IDS)alarms based on the correlation between attack steps.However,IDS has false negatives and false positives,which leads to incomplete or incorrect multistep attacks.Association based on simple similarity is difficult to obtain an accurate attack cluster,while association based on prior knowledge such as attack graphs is difficult to guarantee a complete attack knowledge base.To solve the above problems,a heuristic multistep attack scenarios construction method based on the kill chain(HMASCKC)model was proposed.The attack model graph can be obtained from dual data sources and heuristic multistep attack scenarios can be obtained through graph matching.The model graph of the attack and the predicted value of the next attack are obtained by calculating the matching value.And according to the purpose of the multistep attack,the kill chain model is used to define the initial multistep attack model,which is used as the initial graph for graph matching.Experimental results show that HMASCKC model can better fit the multistep attack behavior,the effect has some advantages over the longest common subsequence(LCS)algorithm,which can close to or match the prediction error of judge evaluation of attack intension(JEAN)system.The method can make multistep attack model matching for unknown attacks,so it has some advantages in practical application.展开更多
One paper in a preceding issue of this journal has introduced the Bayesian Ying-Yang(BYY)harmony learning from a perspective of problem solving,parameter learning,and model selection.In a complementary role,the paper ...One paper in a preceding issue of this journal has introduced the Bayesian Ying-Yang(BYY)harmony learning from a perspective of problem solving,parameter learning,and model selection.In a complementary role,the paper provides further insights from another perspective that a co-dimensional matrix pair(shortly co-dim matrix pair)forms a building unit and a hierarchy of such building units sets up the BYY system.The BYY harmony learning is re-examined via exploring the nature of a co-dim matrix pair,which leads to improved learning performance with refined model selection criteria and a modified mechanism that coordinates automatic model selection and sparse learning.Besides updating typical algorithms of factor analysis(FA),binary FA(BFA),binary matrix factorization(BMF),and nonnegative matrix factorization(NMF)to share such a mechanism,we are also led to(a)a new parametrization that embeds a de-noise nature to Gaussian mixture and local FA(LFA);(b)an alternative formulation of graph Laplacian based linear manifold learning;(c)a codecomposition of data and covariance for learning regularization and data integration;and(d)a co-dim matrix pair based generalization of temporal FA and state space model.Moreover,with help of a co-dim matrix pair in Hadamard product,we are led to a semi-supervised formation for regression analysis and a semi-blind learning formation for temporal FA and state space model.Furthermore,we address that these advances provide with new tools for network biology studies,including learning transcriptional regulatory,Protein-Protein Interaction network alignment,and network integration.展开更多
基金Supported by National Natural Science of Foundation of China (Grant Nos. 10531070, 10721101)KJCX YW-S7 of CAS
文摘The maximum matching graph M(G) of a graph G is a simple graph whose vertices are the maximum matchings of G and where two maximum matchings are adjacent in M(G) if they differ by exactly one edge. In this paper, we prove that if a graph is isomorphic to its maximum matching graph, then every block of the graph is an odd cycle.
基金This research is suppouted by the National Natural Science Foundation of China(10201019)
文摘The maximum matching graph of a graph has a vertex for each maximummatching and an edge for each pair of maximum matchings which differ by exactly oneedge. In this paper, we prove that the connectivity of maximum matching graph of abipartite graph is equal to its minimum degree.
文摘A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship among the components of a graphic object. Using two kinds of matching constraints dynamically generated in the matching process, the proposed approach can prune most improper mappings between SRGs during the matching process. According to our theoretical analysis in this paper, the time complexity of our approach is O(n 2) in the best case, and O(n!) in the worst case, which occurs infrequently. The spatial complexity is always O(n) for all cases. Implemented in Smart Sketchpad, our proposed strategy is of good performance.
文摘The maximum matching graph of a graph has a vertex for each maximum matching and an edge for each pair of maximum matchings which differ by exactly one edge. In this paper, we obtain a lower bound of distance between two vertices of maximum matching graph, and give a necessary and sufficient condition that the bound can be reached.
文摘Graph pattern matching(GPM)can be used to mine the key information in graphs.Exact GPM is one of the most commonly used methods among all the GPM-related methods,which aims to exactly find all subgraphs for a given query graph in a data graph.The exact GPM has been widely used in biological data analyses,social network analyses and other fields.In this paper,the applications of the exact GPM were first introduced,and the research progress of the exact GPM was summarized.Then,the related algorithms were introduced in detail,and the experiments on the state-of-the-art exact GPM algorithms were conducted to compare their performance.Based on the experimental results,the applicable scenarios of the algorithms were pointed out.New research opportunities in this area were proposed.
文摘A collection of k-matchings of bipartite graph Kn,n with the property thatevery pair of independent edges lies in exactly λ of the k-matchings is called aBIMATCH(n,k,λ)-design. Existences and constructions for various BIMATCH (n,k,λ)designs are given.
基金The National Science and Technology Major Project(No.2012ZX03004005-003)the National Natural Science Foundationof China(No.61171081,61201175)the Science and Technology Support Program of Jiangsu Province(No.BE2011187)
文摘To satisfy different service requirements of multiple users in the orthogo nal frequency division multiple access wireless local area network OFDMA-WLAN system downlink transmission a resource allocation algorithm based on fairness and quality of service QoS provisioning is proposed. Different QoS requirements are converted into different rate requirements to calculate the QoSs atisfaction level.The optimization object is revised as a fairness-driven resource optimization function to provide fairness. The complex resource allocation problem is divided into channel allocation and power assignment sub-problems. The sub-problems are solved by the bipartite graph matching and water-filling based method.Compared with other algorithms the proposed algorithm sacrifices less data rate for higher fairnes and QoS satisfaction.The sim ulation results show that the proposed algorithm is capableo fp rovi ding QoS and fairness and performs better in a tradeoff among QoS fairness and data rate.
基金Supported by the National Basic Research Program of China (973 Program) (2006CB303000)
文摘For the problem of track correlation failure under the influence of sensor system deviation in wireless sensor networks,a new track correlation method which is based on relative positional relation chart matching is proposed.This method approximately simulates the track correlation determination process using artificial data,and integrally matches the relative position relation between multiple targets in the common measuring space of various sensors in order to fulfill the purpose of multi-target track correlation.The simulation results show that this method has high correlation accuracy and robustness.
文摘Inexact graph matching algorithms have proved to be useful in many applications,such as character recognition,shape analysis,and image analysis. Inexact graph matching is,however,inherently an NP-hard problem with exponential computational complexity. Much of the previous research has focused on solving this problem using heuristics or estimations. Unfortunately,many of these techniques do not guarantee that an optimal solution will be found. It is the aim of the proposed algorithm to reduce the complexity of the inexact graph matching process,while still producing an optimal solution for a known application. This is achieved by greatly simplifying each individual matching process,and compensating for lost robustness by producing a hierarchy of matching processes. The creation of each matching process in the hierarchy is driven by an application-specific criterion that operates at the subgraph scale. To our knowledge,this problem has never before been approached in this manner. Results show that the proposed algorithm is faster than two existing methods based on graph edit operations.The proposed algorithm produces accurate results in terms of matching graphs,and shows promise for the application of shape matching. The proposed algorithm can easily be extended to produce a sub-optimal solution if required.
基金supported by the National Natural Science Foundation of China under grants 62076087&61906059the Program for Changjiang Scholars and Innovative Research Team in University(PCSIRT)of the Ministry of Education of China under grant IRT17R32
文摘The research on graph pattern matching(GPM) has attracted a lot of attention. However, most of the research has focused on complex networks, and there are few researches on GPM in the medical field. Hence, with GPM this paper is to make a breast cancer-oriented diagnosis before the surgery. Technically, this paper has firstly made a new definition of GPM, aiming to explore the GPM in the medical field, especially in Medical Knowledge Graphs(MKGs). Then, in the specific matching process, this paper introduces fuzzy calculation, and proposes a multi-threaded bidirectional routing exploration(M-TBRE) algorithm based on depth first search and a two-way routing matching algorithm based on multi-threading. In addition, fuzzy constraints are introduced in the M-TBRE algorithm, which leads to the Fuzzy-M-TBRE algorithm. The experimental results on the two datasets show that compared with existing algorithms, our proposed algorithm is more efficient and effective.
基金Supported by the National Natural Science Foundation of China(No.11401576)。
文摘A graph G is said to be p-factor-critical if G-u1-u2-···-up has a perfect matching for any u1,u2,···,up∈V(G).The concept of p-factor-critical is a generalization of the concepts of factor-critical and bicritical for p=1 and p=2,respectively.Heping Zhang and Fuji Zhang[Construction for bicritical graphs and k-extendable bipartite graphs,Discrete Math.,306(2006)1415–1423]gave a concise structure characterization of bicritical graphs.In this paper,we present the characterizations of p-factor-critical graphs and minimal p-factorcritical graphs for p≥2.As an application,we also obtain a class of graphs which are minimal p-factor-critical for p≥1.
文摘X-ray CT scanners,due to the transmissive nature of X-rays,have enabled the non-destructive evaluation of industrial products,even inside their bodies.In light of its effectiveness,this study introduces a new approach to accelerate the inspection of many mechanical parts with the same shape in a bin.The input to this problem is a volumetric image(i.e.,CT volume)of many parts obtained by a single CT scan.We need to segment the parts in the volume to inspect each of them;however,random postures and dense contacts of the parts prohibit part segmentation using traditional template matching.To address this problem,we convert both the scanned volumetric images of the template and the binned parts to simpler graph structures and solve a subgraph matching problem to segment the parts.We perform a distance transform to convert the CT volume into a distance field.Then,we construct a graph based on Morse theory,in which graph nodes are located at the extremum points of the distance field.The experimental evaluation demonstrates that our fully automatic approach can detect target parts appropriately,even for a heap of 50 parts.Moreover,the overall computation can be performed in approximately 30 min for a large CT volume of approximately 2000×2000×1000 voxels.
文摘Privacy preservation is a primary concern in social networks which employ a variety of privacy preservations mechanisms to preserve and protect sensitive user information including age,location,education,interests,and others.The task of matching user identities across different social networks is considered a challenging task.In this work,we propose an algorithm to reveal user identities as a set of linked accounts from different social networks using limited user profile data,i.e,user-name and friendship.Thus,we propose a framework,ExpandUIL,that includes three standalone al-gorithms based on(i)the percolation graph matching in Ex-pand FullName algorithm,(i)a supervised machine learning algorithm that works with the graph embedding,and(ii)a combination of the two,ExpandUserLinkage algorithm.The proposed framework as a set of algorithms is significant as,(i)it is based on the network topology and requires only name feature of the nodes,(i)it requires a considerably low initial seed,as low as one initial seed suffices,(ii)it is iterative and scalable with applicability to online incoming stream graphs,and(iv)it has an experimental proof of stability over a real ground-truth dataset.Experiments on real datasets,Instagram and VK social networks,show upto 75%recall for linked ac-counts with 96%accuracy using only one given seed pair.
基金the National Natural Science Foundation of China(Nos.61273170 and 61503206)the Zhejiang Provincial Natural Science Foundation of China(Nos.LZ16F030002 and LZ15F030001)
文摘The special characteristics of slowly moving infrared targets, such as containing only a few pixels,shapeless edge, low signal-to-clutter ratio, and low speed, make their detection rather difficult, especially when immersed in complex backgrounds. To cope with this problem, we propose an effective infrared target detection algorithm based on temporal target detection and association strategy. First, a temporal target detection model is developed to segment the interested targets. This model contains mainly three stages, i.e., temporal filtering,temporal target fusion, and cross-product filtering. Then a graph matching model is presented to associate the targets obtained at different times. The association relies on the motion characteristics and appearance of targets,and the association operation is performed many times to form continuous trajectories which can be used to help disambiguate targets from false alarms caused by random noise or clutter. Experimental results show that the proposed method can detect slowly moving infrared targets in complex backgrounds accurately and robustly, and has superior detection performance in comparison with several recent methods.
基金supported by the National Natural Science Foundation of China under Grant Nos.61325013,61190112,61170216,and 61228202the Natural Science Foundation of USA under Grant Nos.CNS-0832120,CNS-1035894,ECCS-1247944,and ECCS-1343306+1 种基金the Fundamental Research Funds for the Central Universities of China under Project No.2012jdgz02(Xi’an Jiaotong University)the Research Fund for the Doctoral Program of Higher Education of China under Project No.20130201120016
文摘Numerous indoor localization techniques have been proposed recently to meet the intensive demand for location- based service (LBS). Among them, the most popular solutions are the Wi-Fi fingerprint-based approaches. The core challenge is to lower the cost of fingerprint site-survey. One of the trends is to collect the piecewise data from clients and establish the radio map in crowdsourcing manner. However the low participation rate blocks the practical use. In this work, we propose a passive crowdsourcing channel state information (CSI) based indoor localization scheme, C2IL. Despite a crowdsourcing based approach, our scheme is totally transparent to the client and the only requirement is to connect to our 802.11n access points (APs). C2IL is built upon an innovative method to accurately estimate the moving speed solely based on 802.11n CSI. Knowing the walking speed of a client and its surrounding APs, a graph matching algorithm is employed to extract the received signal strength (RSS) fingerprints and establish the fingerprint map. For localization phase, we design a trajectory clustering based localization algorithm to provide precise real-time indoor localization and tracking. We develop and deploy a practical working system of C2IL in a large office environment. Extensive evaluations indicate that the error of speed estimation is within 3%, and the localization error is within 2 m at 80% time in a very complex indoor environment.
基金supported by the Science and Technology Project of the Headquarters of State Grid Corporation of China(5700-202152186A-0-0-00)。
文摘Network attacks evolved from single-step and simple attacks to complex multistep attacks.Current methods of multistep attack detection usually match multistep attacks from intrusion detection systems(IDS)alarms based on the correlation between attack steps.However,IDS has false negatives and false positives,which leads to incomplete or incorrect multistep attacks.Association based on simple similarity is difficult to obtain an accurate attack cluster,while association based on prior knowledge such as attack graphs is difficult to guarantee a complete attack knowledge base.To solve the above problems,a heuristic multistep attack scenarios construction method based on the kill chain(HMASCKC)model was proposed.The attack model graph can be obtained from dual data sources and heuristic multistep attack scenarios can be obtained through graph matching.The model graph of the attack and the predicted value of the next attack are obtained by calculating the matching value.And according to the purpose of the multistep attack,the kill chain model is used to define the initial multistep attack model,which is used as the initial graph for graph matching.Experimental results show that HMASCKC model can better fit the multistep attack behavior,the effect has some advantages over the longest common subsequence(LCS)algorithm,which can close to or match the prediction error of judge evaluation of attack intension(JEAN)system.The method can make multistep attack model matching for unknown attacks,so it has some advantages in practical application.
基金supported by the General Research Fund from Research Grant Council of Hong Kong(Project No.CUHK4180/10E)the National Basic Research Program of China(973 Program)(No.2009CB825404).
文摘One paper in a preceding issue of this journal has introduced the Bayesian Ying-Yang(BYY)harmony learning from a perspective of problem solving,parameter learning,and model selection.In a complementary role,the paper provides further insights from another perspective that a co-dimensional matrix pair(shortly co-dim matrix pair)forms a building unit and a hierarchy of such building units sets up the BYY system.The BYY harmony learning is re-examined via exploring the nature of a co-dim matrix pair,which leads to improved learning performance with refined model selection criteria and a modified mechanism that coordinates automatic model selection and sparse learning.Besides updating typical algorithms of factor analysis(FA),binary FA(BFA),binary matrix factorization(BMF),and nonnegative matrix factorization(NMF)to share such a mechanism,we are also led to(a)a new parametrization that embeds a de-noise nature to Gaussian mixture and local FA(LFA);(b)an alternative formulation of graph Laplacian based linear manifold learning;(c)a codecomposition of data and covariance for learning regularization and data integration;and(d)a co-dim matrix pair based generalization of temporal FA and state space model.Moreover,with help of a co-dim matrix pair in Hadamard product,we are led to a semi-supervised formation for regression analysis and a semi-blind learning formation for temporal FA and state space model.Furthermore,we address that these advances provide with new tools for network biology studies,including learning transcriptional regulatory,Protein-Protein Interaction network alignment,and network integration.