Loading...

Table of Content

      
    20 November 2017
    Volume 52 Issue 11
    Individual strength-based multi-objective immune algorithm with adaptive differential evolution
    SHI Pei-yun, GAO Xing-bao
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  1-10.  doi:10.6040/j.issn.1671-9352.0.2017.193
    Abstract ( 240 )   PDF (1955KB) ( 164 )   Save
    References | Related Articles | Metrics
    Considering that some information contained in the dominant solution may be helpful to search for the optimal solution, some nondominated solutions and dominated solutions are selected in the clone phase to enhance the diversity of population and avoid the premature. In the evolutionary phase, crossover and mutation are excuted by an adaptive differential evolution operator and population is perturbed by the polynomial mutation operator to balance effectively global and local search of the algorithm. An archive is built based on individual strength to store a number of good solutions which are evolved and updated at each iteration. The proposed algorithm is compared with five existing evolutionary algorithms on ten standard benchmark functions. Experimental results show that the proposed algorithm has superiority in convergence and distribution.
    Verifiable public key searchable encryption protocol based on biometrics
    YAO Ke, ZHU Bin-rui, QIN Jing
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  11-22.  doi:10.6040/j.issn.1671-9352.0.2017.191
    Abstract ( 271 )   PDF (778KB) ( 179 )   Save
    References | Related Articles | Metrics
    Searchable encryption assures the retrievability of encrypted cloud data. However, the cloud servers are not fully trusted. They may execute search operation unfaithfully or conceal the data storage accidents for higher profit. So it is necessary to verify for the search results of searchable encryption. This paper proposed a verifiable public key encryption with keyword search procotol model based on the known results. According to the model, we establish the search structure using the Bloom filter, establish the access control using the biometric-based cryptography, and establish the authentication using the bilinear-pairing-based signature. Thus, the verifiability of the public key encryption with keyword search based biometric protocol is achieved. Finally, the correctness and security of this scheme are proved. The verification results show that the scheme can ensure the security of the encrypted search and the verifiability of the search results to a certain extent.
    gOMP reconstruction algorithm based on generalized Jaccard coefficient for compressed sensing
    ZHANG Xiao-dong, DONG Wei-guang, TANG Min-an, GUO Jun-feng, LIANG Jin-ping
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  23-28.  doi:10.6040/j.issn.1671-9352.0.2017.093
    Abstract ( 368 )   PDF (683KB) ( 191 )   Save
    References | Related Articles | Metrics
    In order to solve the problem such as low reconstruction performance of the signal, we propose a generalized orthogonal matching pursuit(gOMP)reconstruction algorithm based on generalized Jaccard coefficient. The improved gOMP algorithm replaces matching criterion of inner product by similarity matching criterion of generalized Jaccard coefficient, and selects the most matching atom from projection matrix and residual signal. Experimental results show that the reconstruction success rate of proposed algorithm is much better than other algorithms, such as gOMP, OMP, StOMP and so on.
    Speech recognition of Russian short instructions based on DTW
    WANG Tong, MA Yan-zhou, YI Mian-zhu
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  29-36.  doi:10.6040/j.issn.1671-9352.0.2017.253
    Abstract ( 404 )   PDF (1883KB) ( 155 )   Save
    References | Related Articles | Metrics
    Focus on speech recognition task with limited training corpus, this paper makes research of Russian speech recognition based on DTW(dynamic time warping)algorithm. Firstly, we study methods for combining speech recognition and machine translation with the speech corpus which annotating tags of cross language text. Secondly, based on the characteristics of Russian speech, in order to detected syllable endpoint, we set dynamic threshold according to the central vowel, which increased the speed by 34.4% and increased the accuracy by 14%. Finally, we extract the parameters of the static and dynamic characteristics by analyzing speech features of time domain and frequency domain. In addition, the DTW algorithm is improved to overcome the ill condition and reduce the computation scale with global restrictions and early discard strategies, which increased the speed by 4.8% and increased the accuracy by 19.7%. Experiments on the Russian short instruction set with 5 fold cross validation, and the accuracy of speech recognition reached 74.9%.
    User similarity calculation method based on probabilistic matrix factorization and its recommendation application
    HUANG Shu-qin, XU Yong, WANG Ping-shui
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  37-43.  doi:10.6040/j.issn.1671-9352.0.2017.326
    Abstract ( 363 )   PDF (931KB) ( 370 )   Save
    References | Related Articles | Metrics
    The rationality of user similarity computation directly affects the effect of collaborative filtering. A method is proposed to construct a user consumption network and a calculation formula of asymmetric user similarity was defined. The initial user similarity matrix is set up based on the user asymmetric similarity values and reconstructed via probabilistic matrix factorization. And then, potential nearest neighbor mined is applied to personalized recommendation of the target user. Meanwhile, a collaborative filtering recommendation framework is put forward based on sequential behavior and probabilistic matrix factorization. The actual parameters are experimented on real-world dataset and compared with other methods. Experimental results show that the proposed method can improve the effect of collaborative filtering recommendation.
    Random number extraction mechanism based on quantum measurement
    LIU Ge, LIU Qing-qing, ZHANG Jian-zhong
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  44-48.  doi:10.6040/j.issn.1671-9352.0.2017.236
    Abstract ( 268 )   PDF (417KB) ( 163 )   Save
    References | Related Articles | Metrics
    After analysing the common random numbers(RNs)producing scheme based on John von Neumann random extraction mechanism, this paper proposes an improved effective RNs producing scheme. It just need to prepare one type of single photons and measure them, then, RNs can be get by processing the data in John von Neumann algorithm. Compared with the scheme before, this improved scheme is more concise and the photons in initial phase simplified to single photons. Furthermore, based on the statistic of RNs and error estimation, a simple method is proposed to generate unbalanced random numbers.
    Novel USRP-based fast channel handoff scheme in wireless LAN
    RAO Xu-li, HUANG Chuan, LIN Hui
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  49-53.  doi:10.6040/j.issn.1671-9352.0.2017.263
    Abstract ( 353 )   PDF (2120KB) ( 136 )   Save
    References | Related Articles | Metrics
    In order to mitigate the latency for channel handoff in wireless LAN, a novel channel handoff scheme named FCH-USRP is proposed. The FCH-USRP was based on the USRP equipped to provide timely and accurate wireless channel information for channel scan in wireless environment, thereby reducing the users channel switching delay. The experimental results show that the proposed scheme can effectively mitigate the delay of channel handoff and recover the interrupt data transmission in short time.
    Consistencies of recursive estimator of a probability density for extended negatively dependent samples
    LI Yong-ming, DENG Shao-jian, JIANG Wei-hong
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  54-59.  doi:10.6040/j.issn.1671-9352.0.2017.138
    Abstract ( 354 )   PDF (359KB) ( 191 )   Save
    References | Related Articles | Metrics
    This paper considers an identically distributed and extended negatively dependent random variable sequence with a common unknown density. Under suitable conditions, we obtaine the strong consistency and moment consistency for a kind of recursive kernel estimator of density.
    Delay margin of linear multi-input multi-output system
    JU Pei-jun, WANG Wei
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  60-64.  doi:10.6040/j.issn.1671-9352.0.2017.110
    Abstract ( 320 )   PDF (374KB) ( 152 )   Save
    References | Related Articles | Metrics
    Previous research works of linear multi-input and multi-output system were based on one unstable pole. We study the system with two unstable poles and give some upper bounds of the delay margin. By constructing some suitable bilinear transforms and using the frequency domain method, we obtain some estimations of the delay margin of systems for the two cases with two unstable real poles and a pair of unstable conjugate complex poles. Our results are of considerable generality, including the known results as particular cases. The results of calculated example show the effectiveness of the proposed method.
    Properties of residuated lattice of deduction systems set algebra in BL system
    LIANG Ying, CUI Yan-li, WU Hong-bo
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  65-70.  doi:10.6040/j.issn.1671-9352.0.2017.058
    Abstract ( 339 )   PDF (352KB) ( 248 )   Save
    References | Related Articles | Metrics
    Firstly, the concept of deduction system of the basic propositional logic system BL is defined, and the method generating deduction system from a subset of formula set F(S)is obtained, and the identity of deduction system and conclusions set is proved. Secondly, in propositional logic system BL the existence of supremum and infimum is proved in family D(F )consisting of all deductive systems with partial order relation of ⊆; Moreover, binary operations *,→ are defined in family D(F ), and it is proved that set algebra(D(F ),∧,∨,*,→,⊥, F(S))is a complete residuated lattice satisfying divisibility.
    (T,N)-implication and its basic properties
    YU Jun-hong, ZHOU Hong-jun
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  71-81.  doi:10.6040/j.issn.1671-9352.0.2017.164
    Abstract ( 374 )   PDF (451KB) ( 170 )   Save
    References | Related Articles | Metrics
    Fuzzy implications play a fundamental role in fuzzy logic and approximate reasoning. According to construction methods, there are mainly four classes of fuzzy implications, namely,(S,N)-implications, R-implications, QL-implications and Yagers generated implications. We introduce a new class of implications, called(T,N)-implications, generated from t-norms T and fuzzy negations N inspired by the classical tautology p→q≡(p∧q). We discuss the properties of(T,N)-implications and study some classical logic tautologies(e.g., law of importation and distributivity over t-norms or t-conorms)for (T,N)-implications. And the relationships of (T,N)-implications to f-implications, g-implications,(S,N)-implications and R-implications are investigated.
    A note on the Gc-injective dimension of a complex
    YANG Chun-hua
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  82-86.  doi:10.6040/j.issn.1671-9352.0.2017.091
    Abstract ( 250 )   PDF (293KB) ( 141 )   Save
    References | Related Articles | Metrics
    Let R be a commutative ring and C be a semidualizing R-module. It is proved that if a complex X with finite Gc-injective dimension then X admitted a strict Gc-injective coresolution.
    Ding gr-injective and gr-flat modules
    LUO Xiao-qiang, XING Jian-min
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  87-91.  doi:10.6040/j.issn.1671-9352.0.2017.140
    Abstract ( 280 )   PDF (326KB) ( 214 )   Save
    References | Related Articles | Metrics
    The notions of Ding gr-injective and Ding gr-flat modules are introduced, and the relations between Ding gr-injective modules and Ding injective modules as well as the relations between Ding gr-injective modules and Ding gr-flat modules are investigated.
    Strongly cotorsion modules under faithfully flat co-base change
    WANG Xiao-qing, LIANG Li
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  92-94.  doi:10.6040/j.issn.1671-9352.0.2017.008
    Abstract ( 398 )   PDF (294KB) ( 200 )   Save
    References | Related Articles | Metrics
    Strongly cotorsion modules under faithfully flat co-base change are investigated. Let R be a commutative noetherian ring and S be a faithfully flat R-algebra. It is proved, under some extra assumptions, that an R-module G is strongly cotorsion if and only if HomR(S,G) is a strongly cotorsion R-module and Ext>0R(S,G)=0 if and only if HomR(S,G) is a strongly cotorsion S-module and Ext>0R(S,G)=0.
    Characterizations and properties of triple-δ-derivation in Boolean algebra
    LIU Li-jun
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  95-99.  doi:10.6040/j.issn.1671-9352.0.2017.035
    Abstract ( 338 )   PDF (316KB) ( 138 )   Save
    References | Related Articles | Metrics
    The concept of triple-δ-derivation in the Boolean algebra is introduced, and some properties and characteristies of triple-δ-derivation are obtained. Especially, the characterization theorem for the isotone triple-δ-derivation is given in the Boolean algebra. The results of this study not only enrich the derivation theory of Boolean algebra, but also provide a theoretical basis for the study of derivations on lattices.
    Commutators of fractional integrals on Herz-Morrey spaces with variable exponent
    YAO Jun-qing, ZHAO Kai
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  100-105.  doi:10.6040/j.issn.1671-9352.0.2017.010
    Abstract ( 424 )   PDF (336KB) ( 192 )   Save
    References | Related Articles | Metrics
    By the boundedness of variable fractional integral operators on Morrey spaces with variable exponent, based on the properties of Lipschitz functions, the boundedness of the commutators generated by variable fractional integral operators and Lipschitz functions are obtained.
    Boundedness of commutators of the fractional Hardy operators on weighted spaces with variable exponent
    MA Xiao-jie, ZHAO Kai
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2017, 52(11):  106-110.  doi:10.6040/j.issn.1671-9352.0.2017.006
    Abstract ( 338 )   PDF (315KB) ( 235 )   Save
    References | Related Articles | Metrics
    Based on the boundedness of the n-dimensional fractional Hardy operators on Lebesgue spaces, the properties of Lipschitz functions and the estimates of the classical inequalities, the boundedness of the commutators generated by n-dimensional fractional Hardy operators and Lipschitz functions on weighted Herz-Morrey spaces with variable exponent are obtained.