Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
大数据与数据科学 养
计算机科学
(JISUANJI KEXUE)
第 46 卷第 2 期 2019 年 2 月
目次
1 供应链金融大数据分布特征的分析与洞见
11 质量嵌入的大数据产 品 生产系统超图模型及其生产线决策研究
18 BioPW+ : 基于 Linked Data 的生物途径数据可视化系统
24 一种基于混合布局策略的高校教师业绩数据可视化方法
30 重复数据中关键属性值缺失填补的改进 ROUSTIDA 算法
35 基于城市安全知识图谱的多关键词流式并行检索算法
42 大数据环境下基于公共服务平台 的资源多级智能寻租与匹配策略和价值创造
50 一种基于质心空间的不均衡数据欠采样方法
56 基于知识图谱和频繁序列挖掘的旅游路线推荐
62 基于核函数的稀疏属性选择算法
网络与通信
68 F-OFDM 系统 中的自 适应 EM相位噪声抑制算法
76 基于网络捕的域内节能路由方案
81 移动社会网络中基于多维上下文匹配的数据转发算法
88 无线车载网络中一种基于跨层优化的网络编码 TCP 协议
信息安全
95 多 维敏感特征的 Android 恶意应用检测
102 一种针对无线传感网中黑洞攻击的检测与 防御方法
109 一种基于特征提取的访 问控制方法
115 基于密钥共享的分层混合认证模型
120 面向差分隐私保护的聚类算法
127 基于符号执行的 Return-to-dl-resolve 利用代码自 动生成方法
133 云环境下 SNS 隐私保护方案
13 9 信息流格模型的非法流分析
145 基于 N-gram 的 Android 恶意检测
将 2018 年度重庆市出版专项资金资助项目 ,栏 目策划 :李亚辉
刘 颖
王 肠蔡淑琴 邹新文等
刘 源 五 鑫 甘 流 等
丁维龙 薛莉莉 陈婉君等
樊哲宁杨秋猝程宁鹏 等
管 健汪瑕汾 -t倚虹
毕娅原惠群 初叶萍等
全旭 王 磊孙国梓等
孙文平 常 亮宾辰忠 等
张善文文国秋张乐园等
陈大央李英善吴 虹
张举耳大海军刘洁琦
徐方邓 敏熊曾刚等
陈杰谢显中 黄倩等
谢念念曾凡乎 周明松等
王 王若朱志伟刘俊杰
黄美蓉欧博何思源
赵支支马文平罗 维等
胡闯杨 庚 白云璐
方特 吴礼发吴志勇
刘胜杰 王 静
王雪健 赵国磊 常朝稳 等
幸宗美桂盛霖 任飞
软件与数据库技术
152 Github 中开发人员的行为特征分析
159 基于梦境粒子群优化的类集成测试序列生成方法
166 软件网络分形结构特征研究
171 基于 CAN 的地理语义数据存储与检索机制
人工智能
178 因果信息在不同粒度上的迁移性
187 求解 Web 服务组合 QoS 优化的多属性决策及自适应遗传算法
196 基于类别随机化的随机森林算法
202 基于子组与社会行为的缩小群组推荐列表方法
210 融合 Jensen-Shannon 散度的推荐算法
215 基于综合优先度和主机信息的暴雨灾害主题退火爬虫算法
223 面向大坝变形监测的时空一体化预测算法
230 新型软粗糙集:软粗糙半群
236 一种新的基于粒度重要度的三支决策模型
242 优势等价关系下序贯三支决策的属性约简
图形图像与模式识别
249 基于多源特征后融合的分层目标检测算法
255 基于视觉特性的手机屏幕亮度自适应调节算法
261 基于线性判别分析的 Choquet 积分的符号模糊测度提取
266 自适应邻域选择的 FPFH 特征提取算法
271 基于 HEVC压缩域的镜头边界检测方法
279 基于深度学习的交互似然目标跟踪算法
286 点线特征融合的误匹配剔除算法
交叉与前沿
294 一种基于同配性的重叠蛋白质复合体检测算法
301 基于彩色编码技术的准种重建算法
306 面向 GPU 计算平台的归约算法的性能优化研究
315 模糊多 目标进化的社会团队形成方法
321 基于 Petri 网行为 紧密度的有效低频行为模式分析
327 迭代学习控制的最优学习律和简化学习律的频域研究
李存燕洪玫
张悦宁姜淑娟张艳梅
潘浩郑巍张紫枫等
卢海川符海东刘宁
姚宁苗夺谦张志飞
鲁域华寇纪常
关晓蔷庞继芳梁吉业
毛宇佳刘学军徐新艳等
王永王永东 邓江洲等
刘景发李帆蒋盛益
毛莺池曹海何进锋
路怡瑶孔祥智
薛占熬韩丹杰 吕敏杰等
李艳张丽王雪静 等
盛雷卫志华张鹏宇
李孟君黎文伟
王灯桂杨蓉
吴飞赵新灿展鹏磊等
朱威商明将荣意等
张明月王静
魏玉慧王永军王国东等
王杰梁吉业赵兴旺等
黄丹吴璋莉
张选然陈龙安向哲等
金婷谭文安孙勇等
都患晶方贤文王丽丽等
刘加存赵桂艳梅其祥
Big Data & Data Science
COMPUTER SCIENCE Vol. 46 No.2 Feb. 2019
CONTENTS
1 Big Data Analytics and Insights in Distribution Characteristics of Supply Chain Finance LIU Ying
11 Quality-embedded Hypergraph Model for Big Data Product Manufacturing System and Decision
for Production Lines W ANG Yang et al.
18 BioPW + : Biological Pathway Data Visualization System Based on Linked Data LIU Yuan et al.
24 Visualization Method for University Teachers少 Performance Data Based on Mixed Layout Strategy
DING Wei-long et al.
30 Improved ROUSTIDA Algorithm for Missing Data Imputation with Key Attribute in Repetitive Data
F AN Zhe-ning et al.
35 Multi-keyword Streaming Parallel Retrieval AIgorithm Based on Urban Security Knowledge Graph
GUAN ]ian et al.
42 Multilevel and Intelligent Rent-seeking and Matching Resource Strategy and Value Creation of
Public Service Platform in Big Data Environment BI Ya et al.
50 Under-sampling Method for Unbalanced Data Based on Centroid Space ]IN Xu et al.
56 Travel Route Recommendation Based on Knowledge Graph and Frequent Sequence Mining
SUN Wen-ping et al.
62 Sparse Feature Selection Algorithm Based on Kernel Function ZHANG Shan-wen et al.
Network & Cornmunication
68 SeH-adaptive EM Phase Noise Suppression Algorithm in F-OFDM System CHEN Da-shuang et al.
76 Intra-domain Energy Efficiency Routing Scheme Based on Network Entropy ZHANG ] u et al.
81 Data Forwarding Algorithm Based on Multidimensional Context Matching in Mobile Social Networks
XU Fang et al.
88 Network Coding TCP Protocol Based on Cross-layer Optimization in Wireless Vehicle Networks
CHEN ]ie et al.
Information Security
95 Android Malware Detection with Multi-dimensional Sensitive Features XIE Nian-nian et al.
102 Detection and Defense Method for Blackhole Attacks in Wireless Sensor Networks WANG ]un et al.
109 Access Control Method Based on Feature Extraction HUANG Mei-rong et al.
115 Hierarchical Hybrid Authentication Model Based on Key Sharing ZHAO ]iao-jiao et al.
120 Clustering Algorithm in Differential Privacy Preserving HU Chuang et al.
127 Automatic Return-tσdl-resolve Exploit Generation Method Based on Symbolic Execution FANG Hao et al.
133 Privacy Preserving Scheme for SNS in Cloud Environment LIU Sheng-jie et al.
139 Illegal Flow Analysis for Lattice Model of Information Flow
145 Android Malware Detection Based on N-gram
W ANG Xue-jian et al.
ZHANG Zong-mei et al.
Software & Database Technology
152 Analysis on Behavior Characteristics of Developers in Github LI Cun-yan et al.
159 Approach for Generating Class Integration Test Sequence Based on Dream Particle Swarm
Optimization Algorithm ZHANG Yue-ning et al.
166 Study on Fractal Features of Software Networks PAN Hao et al.
171 Geo-semantic Data Storage and Retrieval Mechanism Based on CAN LU Hai-chuan et al.
Artificial Intelligence
178 Transportability of Causal Information Across Different Granularities YAO Ning et al.
187 Multi-attribute Decision Making and Adaptive Genetic Algorithm for Solving QoS Optimization
of Web Service Composition LU Cheng-hua et al.
196 Randomiza tion of Class巳s Based Random Forest Algorithm GUAN Xiaσqiang et al.
202 Method Based on Sub-group and Social Behavior for Narrowing Recomrnended List for Groups
MAO Yu-jia et al.
210 Recommendation Algorithm Based on Jensen-Shannon Divergence W ANG Yong et al.
215 Focused Annealing Crawler Algorithm for Rainstorm Disasters Based on Comprehensive
Priority and Host Information
223 Spatio-Temporal Integrated Forecasting Algorithm for Dam Deformation
230 Novel Soft Rough Set:Soft Rough Semigroups
236 New Three-way Decisions Model Based on Granularity Importance Degree
LIU Jing-fa et al.
MAO Ying-chi et al.
LU Yi-yao et al.
XUE Zhan-ao et al.
242 Attribute Reduction for Sequential Three-way Decisions Under Dominanc巳-Equivalence Relations
LI Yan et al.
Graphics ,Image & Pattern Recognition
249 Multi-layer Object Detection Algorithm Based on Multi-source Feature Late Fusion SHENG Lei et al.
255 Adaptive Adjustment Algorithm of Mobile Phone Screen Brightness Based on Visual Characteristics
LI Meng-jun et al.
261 Retrieving Signed Fuzzy Measure of Choquet lntegral Based on Linear Discriminant Analysis
266 FPFH Feature Extraction Algorithm Based on Adaptive Neighborhood Selection
271 Shot Boundary Detection Method Based on HEVC Compressed Domain
279 Interactive Likelihood Target Tracking Algorithm Based on Deep Learning
286 Mismatch Elimination Algorithm Based on Point Line Feature Fusion
Interdiscipline & Frontier
W ANG Deng-gui et al.
WU Fei et al.
ZHU Wei et al.
ZHANG Ming-yue et al.
WEI Yu-hui et al.
294 Overlapping Protein Complexes Detection Algorithm Based on Assortativity in PPI Networks W ANG Jie et al.
301 Quasispecies Reconstruction Algorithm Based on Color Coding Technology HUANG Dan et al.
306 Study on Performance Optimization of Reduction Algorithm Targeting GPU Computing Platform
ZHANG Yi-ran et al.
315 Social Team Formation Method Based on Fuzzy Multi-objective Evolution JIN Ting et al.
321 Analysis of Effective Low-frequency Behavioral Patterns Based on Petri Net Behavior Closeness
HAO Hui-jing et al.
327 Study of Optimal Learning Law and Simplified Learning Law of Iterative Learning Control in
Frequency Domain LIU Jia-cun et al.