JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (7): 65-74.doi: 10.6040/j.issn.1671-9352.2.2017.304
Previous Articles Next Articles
LIU Li-zhao1,2, YU Jia-ping2, LIU Jian3, LI Jun-yi2,4, HAN Shao-bing5, XU Hua-rong1, LIN Huai-chuan6, ZHU Shun-zhi1*
CLC Number:
[1] 刘利钊,洪江水,刘莉莉,等.面向大数据图像处理的尺度空间挖掘算法及应用[J].上海交通大学学报,2015,49(11):1731-1735. LIU Lizhao, HONG Jiangshui, LIU Lili, et al. Scale space mining algorithm for large data image processing and its application[J]. Journal of Shanghai Jiaotong University, 2015, 49(11):1731-1735. [2] 严霄凤,张德馨.大数据研究[J].计算机技术与发展, 2013, 23(4):168-172. YAN Xiaofeng, ZHANG Dexin. Big data research [J]. Computer Technology and Development, 2013, 23(4): 168-172. [3] 孟小峰,慈祥. 大数据管理:概念、技术与挑战[J].计算机研究与发展, 2013,50(1):146-169. MENG Xiaofeng, CI Xiang. Big data management: concepts, technology and challenges [J]. Computer Research and Development, 2013, 50(1):146-169. [4] LIU Lizhao, LIU Jian. Design and implementation of verification code identificationbased on anisotropic heat kernel[J]. China Communications, 2016, 13(1):100-112. [5] 王珊, 王会举, 覃雄派, 等. 架构大数据: 挑战、现状与展望[J].计算机学报,2011,34(10):1741-1752. WANG Shan, WAND Huiju, QIN Xiongpai, et al. Architecture big data: challenges, current situation and prospects [J]. Chinese Journal of Computers, 2011, 34(10):1741-1752. [6] TANG Y, LEE P P, LUI J C, et al. Secure overlay cloud storage with access control and assured deletion[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(6):903-916. [7] TANG Y, LEE P P, LUI J, et al. Secure overlay cloud storage with file assured deletion[M] //JAJODIA S, ZHOU J. Security and Privacy in Communication Networks, Vol. 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Berlin: Springer, 2010:380-397. [8] LEI Zhen, LIAO Shengcai, PIETIKÄINEN M, et al. Face recognition by exploring information jointly in space, scale and orientation[J]. IEEE Transactions on Image Processing, 2011, 20(1):247-256. [9] 冯登国, 张敏, 张妍,等. 云计算安全研究[J]. 软件学报, 2011, 22(1): 71-83. FENG Dengguo, ZHANG Min, ZHANG Yan, et al. Cloud computing security[J]. Software Journal, 2011, 22(1): 71-83. [10] LIU Lizhao, LIU Jian, ZHANG Xiaoyun, et al. Multi-embed nonlinear scale space for image trust root generation[J]. China Communications, 2016, 13(11):170-179. [11] LIU Lizhao, LIU Jian, ZHU Shunzhi, et al. Gridservices trusted authentication algorithm based on image trustedroot in scale space[J]. Wuhan Univerisity Journal of Natural Sciences,2012, 17(6): 521-530. [12] HAN K H, KIM J H. Quantum-inspired evolutionary algorithm for a class of combinatorial optimization[J]. IEEE Transactions on Evolutionary Computation, 2002(6):580-593. [13] QIN A K, HUANG V L, SUGANTHAN P N, et al. Differential evolution algorithm with strategy adaptation for global numerical optimization[J]. IEEE Transactions on Evolutionary Computation, 2009(2):398-417. [14] JIN Y, OLHOFER M, SENDHOFF B. A framework for evolutionary optimization with approximate fitness functions[J]. IEEE Transactions on Evolutionary Computation, 2002(5):481-494. [15] 王宇平, 李英华. 求解TSP的量子遗传算法[J]. 计算机学报, 2007, 30(5):748-755. WANG Yuping, LI Yinghua. Quantum genetic algorithm for TSP[J]. Chinese Journal of Computers, 2007, 30(5): 748-755. [16] 刘芳, 王爽, 柳莹莹,等. 基于改进量子旋转门的量子进化数据聚类[J]. 电子学报, 2011, 39(9):2008-2013. LIU Fang, WANG Shuang, LIU Yingying, et al. Based on the quantum evolutionary data clustering[J]. Electronic Journal, 2011, 39(9):2008-2013. [17] RAY T, LIEW K M. Society and civilization: an optimization algorithm based on the simulation of social behavior[J]. IEEE Transactions on Evolutionary Computation, 2003(4):386-396. [18] 杨俊安, 庄镇泉, 史亮. 多宇宙并行量子遗传算法[J]. 电子学报, 2004, 32(6):923-928. YANG Junan, ZHUANG Zhenquan, SHI Liang. Multi-universe parallel quantum genetic algorithm[J]. Acta Electronic, 2004, 32(6): 923-928. [19] FARMANI R, WRIGHT J A. Self-adaptive fitness formulation for constrained optimization[J]. IEEE Transactions on Evolutionary Computation, 2003(5):445-455. [20] 陈辉, 张家树, 张超. 实数编码混沌量子遗传算法[J]. 控制与决策, 2005, 20(11):1300-1303. CHEN Hui, ZHANG Jiashu, ZHANG Chao. Real-coded chaotic quantum genetic algorithm[J]. Control and Decision, 2005, 20(11): 1300-1303. [21] 张莎莎, 谷延锋, 张钧萍,等. 一种基于量子遗传算法的红外图像分割方法[J]. 哈尔滨工业大学学报, 2007, 39(9):1427-1430. ZHANG Shasha, GU Yanfeng, ZHANG Junping, et al. An infrared image segmentation method based on quantum genetic algorithm [J]. Journal of Harbin Institute of Technology, 2007, 39(9):1427-1430. [22] DEB K, PRATAP A, AGARWAL S, et al. A fast and elitist multiobjective genetic algorithm: NSGA-II[J]. IEEE Transactions on Evolutionary Computation, 2002(2):182-197. [23] RAYMER M L, PUNCH W F, GOODMAN E D, et al. Dimensionality reduction using genetic algorithms[J]. IEEE Transactions on Evolutionary Computation, 2002(2):164-171. [24] ZHAO Z, PENG Z, ZHENG S, et al. Cognitive radio spectrum allocation using evolutionary algorithms[J]. IEEE Transactions on Wireless Communications, 2009, 8(9):4421-4425. [25] JIN Y, BRANKE J. Evolutionary optimization in uncertain environments—a survey[J]. IEEE Transactions on Evolutionary Computation, 2005(3):303-317. [26] LEUNG Y W, WANG Y. An orthogonal genetic algorithm with quantization for global numerical optimization[J]. IEEE Transactions on Evolutionary Computation, 2002(1):41-53. [27] CHANG W A, RAMAKRISHNA R S. A genetic algorithm for shortest path routing problem and the sizing of populations[J]. IEEE Transactions on Evolutionary Computation, 2003(6):566-579. [28] REEVES C R. Genetic algorithms and grouping problems[J]. IEEE Transactions on Evolutionary Computation, 2001(3):297-298. [29] GEAMBASU R, KOHNO T, LEVY A A, et al. Vanish:increasing data privacy with self-destructing data[C] // Proceedings of the 18th USENIX Security Symposium.[S.l.] : [s.n.] , 2009:299-316. [30] WOLCHOK S, HOFMANN O S, HENINGER N, et al. Defeating vanish with low-cost sybil attacks against large dhts[C] //17th Network and Distributed System Security Symposium. [S.l.] :[s.n.] , 2010. [31] WANG Guojun, YUE Fengshun, LIU Qin, A secure self-destructing scheme for electronic data[J].Journal of Computer and System Sciences, 2013, 79(2):279-290. |
[1] | TAI Li-ting, SONG Han-feng, WANG Jiang-tao, ZHAN Qiong. The investigation of the gravity darkening and evolution in rotating star [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 48-60. |
|