Please wait a minute...
, No 7
 ■ Cover Page (PDF 4,744 KB) ■ Editorial Board (PDF 144 KB)  ■ Table of Contents, July 2018 (303 KB)
  • Original articles
    Data Packet Processing Model based on Multi-Core Architecture
    Xian Zhang, Dong Yin, Taiguo Qu, Jia Liu, and Yiwen Liu
    2018, 14(7): 1383-1390.  doi:10.23940/ijpe.18.07.p1.13831390
    Abstract    PDF (711KB)   
    References | Related Articles

    According to the characteristics of pipeline structure and multi-core processor structure for packet processing in network detection applications, the horizontal-based parallel architecture model and tree-based parallel architecture model are proposed for packet processing of Snort application. The principle of a tree-based parallel architecture model is to use pipelining and flow-pinning technology to design a processor that is specifically used to capture data packets, and other processors are responsible for other stages of parallel processing of the data packets. The experimental comparison and analysis show that the tree-based parallel architecture model has higher performance on the second-level cache hit ratio, throughput, CPU utilization, and inter-core load balancing compared to the horizontal-based parallel architecture model for packet processing of Snort application.

    Submitted on March 20, 2018; Revised on April 12, 2018; Accepted on June 23, 2018
    References: 12
    Mixed Weighted KNN for Imbalanced Datasets
    Qimin Cao, Lei La, Hongxia Liu, and Si Han
    2018, 14(7): 1391-1400.  doi:10.23940/ijpe.18.07.p2.13911400
    Abstract    PDF (348KB)   
    References | Related Articles

    It is well known that imbalanced datasets are a common phenomenon and will reduce the accuracy of classification. For solving the class imbalance problem, this paper proposed the mixed weighted KNN algorithm. According to the imbalance between the classes, this algorithm assigns each sample of datasets an inverse proportion weight, and then it combines with the distance weight, making the weight of the training sample close to the test sample greater. In order to improve the operating efficiency and make it easy to handle massive datasets, we implemented the parallelism of MW-KNN based on the Hadoop framework. Experimental results show that the proposed algorithm is simple and effective.

    Submitted on April 13, 2018; Revised on May 25, 2018; Accepted on June 25, 2018
    References: 21
    A Personalized Recommendation Algorithm based on Text Mining
    Ningbin Zhang
    2018, 14(7): 1401-1410.  doi:10.23940/ijpe.18.07.p3.14011410
    Abstract    PDF (656KB)   
    References | Related Articles

    The recommendation system is a new technology used to recommend products for customers from huge amounts of products by inferring objective users’ preferences based on their personal information or online behavior. This paper studied the main personalized recommendation technology for current e-commerce. It proposed a hybrid recommendation algorithm based on opinion mining. This system combines web data mining technology, i.e., takes advantage of user-generated content by mining customers’ online reviews. It is well known that online reviews can directly reflect a customer’s real emotions and expectations, so it is appropriate to extract a customer’s latent interest and preference from his/her reviews, thus refining recommendations and improving accuracy. Meanwhile, an experiment was conducted and the result demonstrated that our system could generate a reliable and realistic recommendation.

    Submitted on March 29, 2018; Revised on May 3, 2018; Accepted on June 19, 2018
    References: 15
    Discriminative Image Representation based on Multi-Cues for Computational Advertising
    Zhize Wu, Shouhong Wan, and Ming Tan
    2018, 14(7): 1411-1420.  doi:10.23940/ijpe.18.07.p4.14111420
    Abstract    PDF (800KB)   
    References | Related Articles

    Image representation is a key step in image advertising recommendations. Traditional image representation methods, based on the local description, generate a histogram of visual words to represent images. However, it is very difficult to establish a discriminative and descriptive codebook with the local description only. Therefore, we propose a novel image representation method by integrating visual saliency, color feature and local description. Moreover, the proposed multi-cues image representation has been applied to a new image advertising scenario, i.e., delivering image advertisements in a list of images, such as the results of an image search. To evaluate our proposal, we have crawled a dataset, named Pop2016, which consists of image lists and advertising images with 31 pop labels. The performance of the advertising recommendations is measured in terms of the precision@n and the mean average precision. Experimental results show that the proposed algorithm outperforms several traditional methods.

    Submitted on April 13, 2018; Revised on May 25, 2018; Accepted on June 16, 2018
    References: 18
    Query Expansion based on Naive Bayes and Semantic Similarity
    Zhiyun Zheng, Mengyao Yu, Ning Wang, Xingjin Zhang, Chunyang Ruan, and Dun Li
    2018, 14(7): 1421-1430.  doi:10.23940/ijpe.18.07.p5.14211430
    Abstract    PDF (1144KB)   
    References | Related Articles

    A semantic query expansion method is put forward based on the comprehensive weighted algorithm of semantic similarity. We combine the ontology-based query expansion and corpus-based query expansion. If the query term matches the concept, we calculate the similarity between concepts, construct the connected graph of correlation among the ontology concepts, and expand the semantic query according to the threshold value. Otherwise, we adopt the Naive Bayes algorithm to calculate the co-occurrence probability between the word set and concepts as the relevancy of semantic query expansion. The experimental results show that this method can improve the retrieval performance effectively, with the Pr@30 index being improved by 41.97% compared to the traditional non-extensible query method.

    Submitted on March 28, 2018; Revised on May 5, 2018; Accepted on June 21, 2018
    References: 16
    Automated Collaborative Analysis System of Rockburst Mechanism based on Big Data
    Yu Zhang, Hongwei Ding, Yange Wang, Fuqiang Ren, Yongzhen Li, and Zhaoyong Lv
    2018, 14(7): 1431-1438.  doi:10.23940/ijpe.18.07.p6.14311438
    Abstract    PDF (669KB)   
    References | Related Articles

    In recent years, with the increase of the resource exploitation, mining depth is getting deeper and deeper. Meanwhile, the lives of mining workers have been threatened strongly. In order to reduce the probability of rockburst, researchers have carried out in-depth research on rockburst. He Manchao, the academician of the State Key Laboratory for GeoMechanics and Deep Underground Engineering, has initially simulated the occurrence of rockburst in the laboratory as well as studied the mechanism of rockburst. Because the amount of data accumulated in the experiment is as large as 1000T, using these valuable experimental data becomes a difficult problem. Therefore, we have introduced big data technology into the field of rockburst. We have designed and realized the automated collaborative analysis system of the rockburst mechanism based on big data. We have used acoustic emission sensors as data collection methods and selected the multi-task online learning algorithm for data processing and analyzing. We have achieved the selection of the inflection point in the process of force changes using Matlab. In addition, the inflection point to be checked in the system can obtain the corresponding part of analysis diagrams. The theoretical analyses and experimental studies show that the automated collaborative analysis system can have an obvious influence on rockburst data processing, which provides a good foundation for the study of the rockburst mechanism.

    Submitted on April 12, 2018; Revised on May 29, 2018; Accepted on June 19, 2018
    References: 15
    An Improved Multicast Routing Algorithm based on ADHOC Network
    Yanhua Wang Yaqiu Liu
    2018, 14(7): 1439-1448.  doi:10.23940/ijpe.18.07.p7.14391448
    Abstract    PDF (1377KB)   
    References | Related Articles

    After studying the topological structure of neighboring nodes in the WSN, this paper presents a local Combination Location (LCL) algorithm by combining principal manifold learning and the nonlinear dimension algorithm. This algorithm is particularly suitable for determining the relative locations of sensor nodes in large-scale, low-density WSNs, where the low connectivity between nodes and the large ranging error between long-distance nodes usually make accurate localization quite difficult. In this algorithm, based on the pair-wise distance between each node and its neighbour nodes within a certain communication range, the local geometry of the global structure is firstly obtained by constructing a local subspace for each node, and those subspaces are then aligned to give the internal global coordinates of all nodes. Combined with the global structure and the anchor node information, we can finally calculate the absolute coordinates of all unknown nodes by the least squares algorithm.

    Submitted on April 7, 2018; Revised on May 20, 2018; Accepted on June 29, 2018
    References: 11
    A Playfield Detection Algorithm based on Local Consistency in Sports Videos
    Dawei Dong
    2018, 14(7): 1449-1458.  doi:10.23940/ijpe.18.07.p8.14491458
    Abstract    PDF (781KB)   
    References | Related Articles

    A playfield detection method exploiting both color and local consistency features are proposed. Color feature is used in existing playfield detection, which does not effectively remove green pixels that do not belong in the playfield. To solve this problem, local consistency feature is introduced, and the playfield is detected using both color feature and local consistency feature. To determine the detection threshold of local consistency, a two-dimensional histogram based method and a color constrained Otsu (cOtsu) based method are proposed, which are based on the principle of color characteristic and local entropy characteristic of playfield pixels, respectively. Experiments show that the proposed method is more effective and is able to detect playfield in several typical environments.

    Submitted on March 28, 2018; Revised on May 15, 2018; Accepted on June 19, 2018
    References: 12
    Concept Meaning Acquisition based on HowNet and Its Application in the Construction of Taxonomy
    Jian Xu, Jianhou Gan, Xianming Yao, and Liming Zhang
    2018, 14(7): 1459-1467.  doi:10.23940/ijpe.18.07.p9.14591467
    Abstract    PDF (458KB)   
    References | Related Articles

    In studies related to the construction of domain ontology, the acquisition of concept meaning has not received enough attention. According to the definition of the concept, the acquisition of concept meaning is a requisite task in the process of ontology construction. This paper studied the automatic acquisition of concept meaning based on HowNet and researched the problem of meaning acquisition for complex terms and synonym removal. Grounded on concept meaning, this paper put forward a sememe suffix tree algorithm and applied it to the construction of ontology taxonomy. Compared to traditional algorithms, this method is more efficient and comprehensible. This paper implemented the methods to the domain of ethnic minorities, and the experimental results showed that this paper is referable.

    Submitted on April 2, 2018; Revised on May 13, 2018; Accepted on June 11, 2018
    References: 21
    A Two-Stage Feature Weighting Method for Naive Bayes and Its Application in Software Defect Prediction
    Haijin Ji, Song Huang, Xuewei Lv, Yaning Wu, and Zhanwei Hui
    2018, 14(7): 1468-1480.  doi:10.23940/ijpe.18.07.p10.14681480
    Abstract    PDF (850KB)   
    References | Related Articles

    Software defect prediction (SDP) models facilitate software practitioners to find out defect-prone software modules in software. Software practitioners can then test these defect-prone software modules with limited testing resources to minimize software defects. Among various SDP models, Naive Bayes (NB) has been widely used in SDP because of its simplicity, effectiveness and robustness. The NB classifier is an effective classification approach, especially for data sets with discrete attributes. In NB, the attributes are assumed to be independent and thus equally important. However, in common practice, the attributes of software defect data sets are usually continuous or numeric, and because they are designed for different purposes, their contributions to prediction are different. Therefore, this paper proposes a new NB method called TSWNB, which contains two stages: feature (i.e. attribute) discretization and feature weighting. More specifically, for the stage of feature discretization, we make the comparison between two discretization methods i.e. equal-width discretization method and equal-frequency discretization method, and identify the most appropriate one. For the stage of feature weighting, we use the feature weighting technique to alleviate the equal importance assumption, which combines the obtained feature weights into the NB formula and its likelihood estimations. To evaluate the proposed method, we carry out experiments on 5 software defect data sets of NASA MDP provided by PROMISE repository. Three well-known classification algorithms and two feature weighting techniques are included for comparison. The experimental results reveal the effectiveness and practicability of the two-stage feature weighting method TSWNB.

    Submitted on April 5, 2018; Revised on May 23, 2018; Accepted on June 20, 2018
    References: 24
    Metamorphic Testing for Oracle Problem in Integer Bug Detection
    Yi Yao Jialuo Liu
    2018, 14(7): 1481-1486.  doi:10.23940/ijpe.18.07.p11.14811486
    Abstract    PDF (488KB)   
    References | Related Articles

    Integer defects are an important cause of software quality degradation. An explicit expected output plays an important role in the traditional theory of software testing, but it is very difficult for much software to get the expected output since ascertaining the validity of the actual output is very hard. Integer bugs are always ignored because of the Test Oracle problem. A metamorphic relationship that can find out the potential error is presented. The experimental results show that the mean of integer bugs detection based on the metamorphosis relation can detect the invisible unexpected output, which is unable to get in traditional means. In addition, the effectiveness of detecting integer defects is improved.

    Submitted on March 25, 2018; Revised on May 11, 2018; Accepted on June 25, 2018
    References: 10
    Reliability Evaluation of a Parallel Job with Real-Time Redundant Computing
    Xiwei Qiu, Liang Luo, Sa Meng, and Han Xu
    2018, 14(7): 1487-1492.  doi:10.23940/ijpe.18.07.p12.14871492
    Abstract    PDF (494KB)   
    References | Related Articles

    In network systems, a job with a large amount of work-requirement is usually divided into multiple tasks to achieving parallel computing. However, if any task is failed due to random task failures or server failures, the entire job cannot be complete. In traditional redundant computing, copies of tasks are initiated whenever the tasks are found to be failed. This is not an efficient approach from the perspective of the performance. Real-time parallel computing is more high-efficient, which makes tasks and their copies run simultaneously. In this paper, to evaluating the reliability of such a job, we first describe a complicated parallel and redundant computing environment as multiple minimal-job spanning trees (MJST) consisting of tasks and servers. Then, we design two operators of MJSTs to systemically analyze complicated failure correlations among multiple MJSTs. Finally, an algorithm based on the Bayesian theorem is presented to evaluate the reliability of a parallel job with real-time parallel computing. Illustrative examples are provided.

    Submitted on April 14, 2018; Revised on May 23, 2018; Accepted on June 22, 2018
    References: 11
    Context-Aware Automatic Code Segment Extraction and Refactoring in Object-Oriented Systems
    Wei Liu, Xindi Huang, Zhigang Hu, and Hong Phong Nguyen
    2018, 14(7): 1493-1502.  doi:10.23940/ijpe.18.07.p13.14931502
    Abstract    PDF (806KB)   
    References | Related Articles

    Refactoring is a very important technology to improve the reusability and maintainability of existing code, and it is widely used in software development. In order to extract the code segment into a new method easily and cover the shortage of Eclipse in refactoring, the method of Context-Aware Automatic Code Segment Extraction and Refactoring (CAACSER) is proposed. By analyzing the context of the code, the input parameter class, and the output parameter class are introduced to handle complex code segments. The experimental results show that the CAACSER effectively solves some problems and drawbacks of many existing tools in code segment extraction, which acts as a basic step for realizing automatic and semi-automatic refactoring methods. The visualization tool of CAACSER can also carry out reasonable optimizations of the code without changing the systems’ behaviors.

    Submitted on March 29, 2018; Revised on April 27, 2018; Accepted on May 23, 2018
    References: 16
    3D Convolutional Neural Network for Semantic Scene Segmentation based on Unstructured Point Clouds
    Rui Zhang, Yan Wang, Guangyun Li, Zhen Han, Junpeng Li, and Chunying Li
    2018, 14(7): 1503-1512.  doi:10.23940/ijpe.18.07.p14.15031512
    Abstract    PDF (982KB)   
    References | Related Articles

    The use of point cloud datasets is an inevitable trend in the analysis of natural scenes. In this paper, we propose a semantic segmentation network architecture that consumes 3D point clouds directly, which can efficiently avoid mapping 3D point clouds to 2D images. Experimental results indicate strong performance that is on par with or even better than state-of-the-art methods for semantic segmentation on the Stanford semantic parsing dataset.

    Submitted on March 19, 2018; Revised on April 23, 2018; Accepted on June 13, 2018
    References: 38
    A Novel Underwater Image Restoration Algorithm
    Yongxin Wang Ming Diao
    2018, 14(7): 1513-1520.  doi:10.23940/ijpe.18.07.p15.15131520
    Abstract    PDF (784KB)   
    References | Related Articles

    This paper proposes a novel image restoration algorithm to eliminate light attenuation in underwater environments. The proposed algorithm employs the distance-dependent formation to model the degradation process where light travels in underwater. We use a homomorphic filter to get rid of the non-linear in the distance-dependent model. The restoration underwater image is then obtained by solving a Poisson equation that is derived based on the similar distance of neighbourhood pixels. The experiments show that the restoration image reveals improved contrast and clear details.

    Submitted on March 19, 2018; Revised on May 4, 2018; Accepted on June 7, 2018
    References: 12
    EOR of Spontaneous Imbibition by Surfactant Solution for Tight Oil Reservoirs
    Anqi Shen, Yikun Liu, Shuang Liang, Fengjiao Wang, Bo Cai, and Yuebin Gao
    2018, 14(7): 1521-1529.  doi:10.23940/ijpe.18.07.p16.15211529
    Abstract    PDF (752KB)   
    References | Related Articles

    Spontaneous imbibition has been well investigated due to its impacts on oil recovery in conventional and fractured reservoirs. Differentiated in relation to the conventional reservoir, the tight reservoir is characterized by its ultra-low porosity and permeability. The scope of current research is to study the mechanism of imbibition under conditions of tight cores and surfactant solution. A series of experiments was conducted to determine the effects of tight core imbibition including three kinds of common surfactant solutions. The main factors of low IFT (interfacial tension) and wettability alteration are examined. The experimental results indicate that the original wettability affects the imbibition oil recovery, since low IFT and wettability alteration constitute beneficial parameters for imbibition as it concerns adhesive work reduction. The parameter of NBm-1 was not applied for optimal IFT or CA (contact angle) calculation concerning porous media with reduced capillary scale. Future research concerning the imbibition mechanism should take the property of surfactant into account.

    Submitted on March 13, 2018; Revised on April 29, 2018; Accepted on June 3, 2018
    References: 28
    Automatic Fault Diagnosis Method for Wind Turbine Generator Systems Driven by Vibration Signals
    Yu Pang, Limin Jia, Zhan Liu, and Qianyun Gao
    2018, 14(7): 1530-1541.  doi:10.23940/ijpe.18.07.p17.15301541
    Abstract    PDF (536KB)   
    References | Related Articles

    An automatic fault diagnosis method for the wind turbine generator system (WTGS) driven by vibration signal is proposed in this paper. In this method, the vibration signal is used to drive the notch filter network directly, and the frequency selection characteristics of the notch filter are used to extract the fault feature frequency of WTGS components. Then, the extracted fault feature frequency is encoded and a neural network classifier is used to achieve the automatic fault diagnosis of WTGS. In addition, the vibration intensity is calculated to evaluate the fault degree of the WTGS. The innovation of this paper is that the fault feature frequency of the WTGS is derived from parameters of the notch filter rather than the vibration signal itself. The practical on-site application shows the effectiveness of the proposed method, which is of great significance for improving the efficiency of fault diagnosis of WTGS and realizing the batch diagnosis of the fault of WTGS.

    Submitted on March 8, 2018; Revised on April 12, 2018; Accepted on May 2, 2018
    References: 10
    Analysis of Stochastic Model in GEO/IGSO/MEO based on Triple-Frequency Observations
    Xinjian Fang, Xuexiang Yu, and Chao Yan
    2018, 14(7): 1542-1549.  doi:10.23940/ijpe.18.07.p18.15421549
    Abstract    PDF (1849KB)   
    References | Related Articles

    Focusing on the complex constellation of the BeiDou satellite navigation positioning system in China, this article analyzes the relationship between zero baseline and ultrashort baseline according to the residual value of carrier observation, signal to noise ratios, and elevation angles of different constellation satellites. A stochastic model based on the distance between the satellite and Earth, signal-to-noise ratio and elevation angle was proposed, which applied to the baseline solution of the Beidou triple-frequency single epoch. Analysis of measured data shows that compared with the traditional sinusoidal trigonometric function model, although the proposed model has no obvious effect on improving the positioning accuracy, the success rate of the ambiguity resolution of 4.2m, 4.17km and 8.84km are effectively improved by 0.1%, 4.7% and 1.1%, which enhanced the stability of calculation results.

    Submitted on April 8, 2018; Revised on May 20, 2018; Accepted on June 11, 2018
    References: 12
    Predicting and Analysing E-Logistics Demand in Urban and Rural Areas: An Empirical Approach on Historical Data of China
    Lijuan Huang, Guojie Xie, Dahao Li, and Chunfang Zou
    2018, 14(7): 1550-1559.  doi:10.23940/ijpe.18.07.p19.15501559
    Abstract    PDF (605KB)   
    References | Related Articles

    With the rapid development of the e-commerce economy in urban and rural areas, China's logistics industry has entered a stage of transformation and upgrade. First, this paper introduces the Supply-Chain Operations Reference-model as a theoretical reference for index selection. Then, after comparing the BP neural network and linear regression analysis, we chose the BP neural network analysis method, which is more stable and accurate in forecasting e-logistics demand scale in urban and rural areas. Finally, according to the results of the data analysis, this paper divides the development of e-logistics demand in urban and rural areas into two stages and discusses the reasons for the formation of these two stages in detail. This job not only provides a new perspective for the study of rural e-commerce and urban and rural e-logistics demand prediction, but also provides a theoretical reference for the formulation of government policies and farmers’ participation in rural e-commerce.

    Submitted on March 30, 2018; Revised on May 2, 2018; Accepted on June 9, 2018
    References: 20
    Mining Method of Recessive Lineage Relationship between Policies
    Gang Liu, Hefei Wang, and Honglei Zhang
    2018, 14(7): 1560-1569.  doi:10.23940/ijpe.18.07.p20.15601569
    Abstract    PDF (946KB)   
    References | Related Articles

    Based on summarising and analyzing the research status of policy research and the technology of concept description, this paper proposes an effective mining method of recessive lineage relationship between policies. This method introduces the theory of factor space and gives a method for decomposing concept factor. We introduce the recessive gene as a new "synonym" and calculate the fitting degree of policy texts to reveal the recessive lineage relationship, which cannot be reflected through the direct calculation of similarity. Finally, we use the articles of law as the set of policy texts to carry out a large number of experiments. The comparison and analysis of the experimental results verify the effectiveness of the proposed method.

    Submitted on April 3, 2018; Revised on May 1, 2018; Accepted on June 20, 2018
    References: 15
    Automatic Generation of Comparative Summary for Scientific Literature
    Yao Liu, Yuqing Yang, and Yi Huang
    2018, 14(7): 1570-1579.  doi:10.23940/ijpe.18.07.p21.15701579
    Abstract    PDF (762KB)   
    References | Related Articles

    In this paper, we propose a comparative summary generation method and conduct key technologies research. We collect prior knowledge from the Internet via a light knowledge structure, extract core information from original literature, divide subtopics of two major topics with AGNES clustering to get the common and independent subtopics, and get comparative information with subtopics alignment and property alignment. We test the performance of each module to prove the validity of the proposed methods. Finally, we design and develop a comparative summary generation system, and the application in the nursing field shows that it can present users with useful information to facilitate the scientific research process.

    Submitted on April 1, 2018; Revised on May 11, 2018; Accepted on June 25, 2018
    References: 11
    A Mongolian Language Model based on Recurrent Neural Networks
    Zhiqiang Ma, Li Zhang, Rui Yang, and Tuya Li
    2018, 14(7): 1580-1589.  doi:10.23940/ijpe.18.07.p22.15801589
    Abstract    PDF (1158KB)   
    References | Related Articles

    In view of data sparsity and long-range dependence when training the N-Gram Mongolian language model, a Mongolian Language Model based on Recurrent Neural Networks (MLMRNN) is proposed. The Mongolian classified word vector is designed and used as the input word vector of MLMRNN in the pre-training phase, and the Skip-Gram word vector with context information is used at the input layer so that the input contains not only semantic information, but also rich context information. It effectively avoids the problem of data sparsity and long-range dependence. Finally, the training algorithm of MLMRNN is designed and the perplexity is used as the evaluation index of the language model to test the perplexity of N-Gram, RNNLM and MLMRNN on the training set and test set, respectively. The experimental results show that the perplexity of using MLMRNN is lower than that of other language models, and the performance of the language model is improved.

    Submitted on April 9, 2018; Revised on May 21, 2018; Accepted on June 23, 2018
    References: 23
    Dynamic Community Mining based on Behavior Prediction
    Xiao Chen, Xinzhuan Hu, Xiao Pan, and Jingfeng Guo
    2018, 14(7): 1590-1599.  doi:10.23940/ijpe.18.07.p23.15901599
    Abstract    PDF (516KB)   
    References | Related Articles

    Dynamic network research has been a new trend in recent years. Based on the influence of vertex behavior on community structure, this paper studies signed network dynamic community mining. Firstly, the set pair connection degree is introduced to describe the relation between vertices, and the edge prediction model of signed network is proposed by taking into account the variability of the relation between vertices. Secondly, based on the prediction model, a set pair signed networks dynamic model is proposed by adding time axis T to the signed network. Then, based on the dynamic model, the evolution of signed networks and community discovering are studied. Finally, network evolution law and community stability are analyzed by using the connection trend and connection entropy in set pair theory, and the accuracy and validity of the dynamic community mining algorithm are verified by experiments.

    Submitted on March 29, 2018; Revised on May 5, 2018; Accepted on June 8, 2018
    References: 23
    Group Behavior Recognition in Videos based on Cam-Shift Tracking and Histogram Changing Rate
    Shuang Liu, Peng Chen, Yanli Yu, Xing Cui, and Denis Špelič
    2018, 14(7): 1600-1608.  doi:10.23940/ijpe.18.07.p24.16001608
    Abstract    PDF (625KB)   
    References | Related Articles

    With more and more cameras installed in public places, video surveillance systems play an increasingly important role in public safety. Research on intelligent video monitoring, especially activity recognition, is attracting increasing attention in the field of image processing. Unlike activity recognition of a single tracking object, group activity is more complex and difficult to recognize. To design a fast real-time group activity recognition algorithm without other auxiliary data, low computational cost is our focus. There are four steps for our group activity recognition system: preprocessing the captured videos, extracting foregrounds from backgrounds, tracking multiple objects and recognizing group activity. To remove noise in each frame image, the combination of the Gaussian filter algorithm and median filter algorithm is used in the preprocessing step. Then, the Gaussian mixture model is adopted to extract the foreground image. To ensure low computational cost, real-time Cam-Shift is chosen to track group activity with morphological operations in the tracking step. In the recognition step, the changing histogram rate is defined as the measure of identifying group behavior. Here, the changing histogram rate refers to the number of changing histograms and changing proportions. Experimental results show that the group activity recognition algorithm proposed in this paper is effective with low computational cost.

    Submitted on March 11, 2018; Revised on April 24, 2018; Accepted on June 6, 2018
    References: 13
    Evaluation of Construction Supply Chain using Preference Restraint Cone DEA Model
    Shi Li
    2018, 14(7): 1609-1617.  doi:10.23940/ijpe.18.07.p25.16091617
    Abstract    PDF (467KB)   
    References | Related Articles

    The internal pressure and external incentive of construction area contributed to the study of supply chain management, construction calls for the construction supply chain management’s (CSC) research and practice. Combining with features of Data Envelope Analysis (DEA) and CSC, the basic framework of CSC comprehensive performance evaluation was built from the aspect of consumption and output. Under such framework, the indicator system for comprehensive evaluation was also constructed. Because traditional methods of DEA do not consider the impact of preferences of the input and output indicators for decision makers, an improved preference restraint cone DEA model was presented; an example was given for analysis. The results show that the DEA with the preferred model omissions the pseudo-effective construction supply chain and reflects the subjective preferences of decision makers. It is an improvement from past research of the model.

    Submitted on March 30, 2018; Revised on April 26, 2018; Accepted on June 16, 2018
    References: 17
    Lithium-ion Power Batteries SOC Estimation based on PCA
    Haiying Wang, Yuran Wang, Zhilin Yao, and Zhilong Yu
    2018, 14(7): 1618-1627.  doi:10.23940/ijpe.18.07.p26.16181627
    Abstract    PDF (583KB)   
    References | Related Articles

    SOC is an important parameter of power batteries of electric vehicles. Its accurate estimation is vital to the correct implementation of the control strategy of the whole vehicle. It is strait to estimate SOC of the battery accurately using existing estimation methods. Aiming at the shortcomings in these methods, we proposed to establish an estimation model for battery SOC using principal component analysis (PCA) algorithm in this study. However, unable to extract non-linear factors in parameters, PCA algorithm would bring about an estimation error of battery SOC; thus, we proposed to establish an estimation model for battery SOC using kernel principal component analysis (KPCA) algorithm. The model was simulated and verified through experiments. After simulation, it shows that the improved model may adapt to a more complicated environment, meet the requirements of promptness and reliability, and has higher estimation accuracy with an average estimation error of 1.46%, which is better than that of Ah measurement method.

    Submitted on April 1, 2018; Revised on May 15, 2018; Accepted on June 20, 2018
    References: 12
    A Novel Multi-Label Predictor for Identifying Multi-Functional Classes of Human Membrane Proteins
    Xiao Wang, Guoqing Li, Weiwei Zhang, Hongwei Tao, and Yinghui Meng
    2018, 14(7): 1628-1634.  doi:10.23940/ijpe.18.07.p27.16281634
    Abstract    PDF (447KB)   
    References | Related Articles

    Knowing which types of functionality that human membrane proteins belong to is very helpful for understanding their functions. However, most existing online prediction methods have some disadvantages, including: 1) they obtain very low prediction accuracy, and 2) they can only predict single-functional classes of cytomembrane proteins in humans. To overcome the drawbacks, a new multi-label predictor, namely mMem-Hum, is proposed. In addition to predicting types of single-function membrane proteins, it can also predict multi-functional types. Specifically, discriminative features of membrane proteins are generated by using amino acid sequence information and evolutionary information, and then they are classified by a new multi-label classifier that utilizes label correlations. Experimental results reveal that the performance of mMem-Hum is significantly better than other existing forecasting methods. This indicates that mMem-Hum may become a promising prediction tool for classifying functional classes of cytomembrane proteins in humans.

    Submitted on April 4, 2018; Revised on May 17, 2018; Accepted on June 23, 2018
    References: 10
    Enhancing Subcellular Localization Prediction of Apoptosis Proteins by Ensemble SVMs with Random Under-Sampling
    Xiao Wang, Xiaohe Li, Hui Li, Hongwei Tao, Rong Wang, and Yinghui Meng
    2018, 14(7): 1635-1640.  doi:10.23940/ijpe.18.07.p28.16351640
    Abstract    PDF (835KB)   
    References | Related Articles

    The locations of apoptosis proteins in the cell determine their biological functions. So firstly, it is necessary to identify the subcellular locations of these proteins. In recent years, researchers have proposed a large number of prediction methods, specifically for apoptosis proteins. However, the vast majority of the methods have the following problems: (1) they utilize sequence-based methods rather than annotation-based methods for feature representation; (2) they ignore the negative impact of the imbalanced training dataset. In the work, a balanced predictor, GOIL-Apo, is proposed for dealing with the issues, which yields balanced solutions for predicting locations of apoptosis proteins. Firstly, by using gene ontology (GO) based methods, apoptosis proteins are represented as GO feature vectors. Subsequently, an ensemble classifier that fuses multiple SVMs with random under-sampling is proposed to deal with the data imbalance problem. Rigorous cross-validations show that the accuracy of GOIL-Apo is much better than the up-to-date predictors.

    Submitted on April 11, 2018; Revised on May 21, 2018; Accepted on June 16, 2018
    References: 8
    Solution Generation through Hybrid Intelligence and Creativity based on Investment Portfolio
    Qinyun Liu, Hua Zhou, Hongji Yang, and William Cheng Chung Chu
    2018, 14(7): 1641-1650.  doi:10.23940/ijpe.18.07.p29.16411650
    Abstract    PDF (774KB)   
    References | Related Articles

    Artificial Intelligence (AI) has been developed to be robust on computing. Learning can be achieved by connecting to heterogeneous data using AI algorithms, such as the Artificial Neural Network. Knowledge can be learned, and rules in the database can be discovered by machines through heuristic algorithms. However, creativity has not been achieved by computers like the human brain by using AI algorithms individually. This research serves to explore a method to achieve creative solution generation by utilizing a relationship between intelligence and creativity, assuming intelligence is the subset of creativity. Under this relationship, the computing can be fulfilled using AI algorithms. The theories of achieving creativity is the guidance of this method.

    Submitted on April 16, 2018; Revised on May 19, 2018; Accepted on June 16, 2018
    References: 32
ISSN 0973-1318