Abstract: Focusing on the complexity of network structure and the indeterminacy of community partition, this paper puts forward a novel fuzzy clustering method for uncovering community structures. In contrast to previous studies, the proposed method disposes t...
Abstract: With the expanding scale of social networks, the label classification of nodes in the network is no longer single but various, which prompts the multi-label classification in social networks to become an important research area. The previous research...
Abstract: This paper presents a Deep Belief Nets (DBN) model and a multi-modality feature extraction method to extend features, dimensionalities of short text for Chinese microblogging sentiment classification. Besides traditional features sets for document cl...
Abstract: It is an important measure to utilize the topic model to recognize the users focuses on social networks, such as blog, online community, and microblog. Considering the particularity of topic recognizing of short texts on the social network platform, ...
Abstract: Influence blocking maximization is currently a focused issue in the research area of social networks. This paper considers the issue of influence blocking maximization with uncertain negative influence sources. First, in order to increase efficiency ...
Abstract: Community detection method is significant to character statistics of complex network. Community detection in directed structured network is an attractive research problem while most previous approaches attempt to divide undirected networks into commu...
Abstract: To explore the distribution and correlation from massive Twitter data helps the accurate personalized recommendation. On-Line Analytical Processing (OLAP) provides an intuitive form that is suitable for people to explore the Twitter data. The key of ...
Abstract: Sybil attackers can improve their own influence in social networks by creating a large number of illegal illusive identities then affect the social individuals choice of relays and steal individuals privacy, which seriously threatens the interests of...
Abstract: Groups are important mesoscopic organizations of Online Social Networks (OSNs). Group detection not only has important theoretical significance, but also has a wide range of applications. It promotes the application and development of online social n...
Abstract: Recently, social network applications develop dramatically. Social network related social behaviors are one of the most important areas, which receive broadly attentions from researchers in academics. This survey paper analyzes the social behaviors c...
Abstract: Wide-width bit permutation is a very commonly used operation in symmetric cryptographic algorithms. However, current word-oriented general microprocessors are inefficient to cope with the complex bit-level permutation operations. To solve this proble...
Abstract: In order to ensure the confidentiality and authentication in different network environments, the security model of IDPKC-to-CLPKC heterogeneous signcryption is defined from IDentity-based Public Key Cryptography (IDPKC) to CertificateLess Public Key ...
Abstract: In order to solve the load imbalance problem caused by uncertainty of traffic in heterogeneous dense cellular networks, this paper proposes a load balance algorithm through small cell range expansion. The proposed algorithm is based on Partially Obse...
Abstract: In order to solve the problem of unhomogeneities of estimation error and expensive computing of existing algorithms, an iterative frequency estimation algorithm based on interpolated zoom spectrum is proposed. Firstly, fast Fourier transform algorith...
Abstract: Depth information is proved to be an important part of human vision. However, most saliency detection methods based on 2D images do not make good use of depth information, thus an effective saliency detection method for RGB-D image is presented. It e...
Abstract: In order to solve the defects of poor error tolerance and large calculation amount in current Turbo-code encoder recognition algorithms, a new algorithm based on conformity of parity-check equation is proposed. Firstly, according to small code constr...
Abstract: To overcome the shortcoming of Intuitionistic Fuzzy C-Means (IFCM) that it does not take into account the spatial information, a new Kernel-based algorithm with Weighted Spatial Information (KWSI_IFCM) is proposed. Firstly, the constraint of weighted...
Abstract: Owing to its flexible frequency decomposition ability, nonuniform filter banks are widely applied to speech and image signal processing. However, the nonuniform Discrete Fourier Transform (DFT) modulated filter bank can not be constructed by directly...
Abstract: In order to solve the problem that traditional uniform FFT beamforming algorithm reduces the resolution of 3-D sonar imaging, this paper presents a sub-region FFT beamforming algorithm. In the far field, the imaging area is partitioned into multiple ...
Abstract: As a new high resolution ground imaging technique, Circular Synthetic Aperture Radar (CSAR) is capable of long time observation and retrieving the information of the targets. By taking the long time observation advantage, a new moving target detectin...
Abstract: Based on a two-dimensional phase coding, a novel range ambiguity suppression method is proposed. By transmitting two-dimensional phase coded signals and demodulating the received signals, the two-dimensional spectrum of the range ambiguity is shifted...
Abstract: In the image sequence obtained by the high frame rate Video Synthetic Aperture Radar (VideoSAR) mode, the Doppler shift results in some shadows of the moving targets in their actual position, and a strong correlation exists between adjacent frames. B...
Abstract: The three-dimensional (3D) imaging of airborne sparse array SAR is studied. In order to avoid data redundancy, high Pulse Repetition Frequency (PRF) and motion compensation caused by aperture synthesis, the Modified Uniformly Redundant Arrays (MURA) ...
Abstract: In radar system, the target-induced interference often arises due to multipath effect or non-ideal transmit waveform of Multiple-Input Multiple-Output (MIMO) radar. For the issue of detecting a target with target-induced interference, the detectors a...
Abstract: For calibration of direction-dependent gain-phase errors, with a few precisely calibrated instrumental sensors, a method that jointly estimates the direction-dependent gain-phase errors and the target azimuth by spatial sparsity of the signal is prop...
Abstract: A new feature extraction method based on time-frequency analysis is proposed for aircraft targets classification under low signal-to-noise ratio. This method uses the variances of time-domain modulation periods of jet aircraft, propeller aircraft and...
Abstract: The key invoation technology of Synthetic Aperture Radar ALtimeter (SARAL) are Doppler-beam sharppen and delay/doppler range compensation. The combination of these two technologies makes it has high along-track resolution and high precision in height...
Abstract: Angular glints are the main error sources for radar angular measurement in the terminal guidance, which may result larger tracking error or even lead to losses of the tracking if mishandled. Although the angle glint can be suppressed to some extent t...
Abstract: The large scale parallel electromagnetic computation based on the supercomputer is of great significance for solving complicate electromagnetic problems in practical engineering. However, the probability of the process crash event caused by node fail...
Abstract: The accuracy of three dimensional electric field measurement is greatly influenced by the coupling interference between components of Three Dimension (3D) electric field applied to the electric field sensor. In order to reduce the coupling interferen...
Abstract: Truth table reduction is one of the key problems in the analysis and design of digital logic circuits, FCA (Formal Concept Analysis) is a tool for data analysis and rule extraction from formal contexts. In this paper, MIMO (Multiple-Input Multiple-Ou...
Abstract: A mixed-mode Test-Per-Clock Built In Self Test (BIST) scheme is proposed. The test consists of two parts: the free Linear Feedback Shift Register (LFSR) pseudo-random test mode and the deterministic test pattern based on controlled LFSR. Pseudo rando...
Abstract: To achieve intelligent and autonomous positioning for the vehicle, this paper presents a location estimation model based on the transformation from grid cells to place cells. Combining with the firing characteristic of the grid cells, place cells, an...
Abstract: A unified construction of Guassian integer sequence sets with Zero Correlation Zone (ZCZ) is presented. Based on difference sets, optimal or almost optimal ZCZ Gaussian integer sequence sets are constructed using shift sequences, whose ZCZ length and...
Abstract: The spectral subtraction speech enhancement is extensively used due to its simplicity and easy to implement. The principle of this method is to subtract the estimated magnitude of the noise from the magnitude of the noisy signal, but the phase of the...