Feb 2016, Volume 17 Issue 2
    

  • Select all
  • Orginal Article
    Hui-zong LI, Xue-gang HU, Yao-jin LIN, Wei HE, Jian-han PAN

    Social tagging systems are widely applied in Web 2.0. Many users use these systems to create, organize,manage, and share Internet resources freely. However, many ambiguous and uncontrolled tags produced by social tagging systems not only worsen users’ experience, but also restrict resources’ retrieval efficiency. Tag clustering can aggregate tags with similar semantics together, and help mitigate the above problems. In this paper, we first present a common co-occurrence group similarity based approach, which employs the ternary relation among users,resources, and tags to measure the semantic relevance between tags. Then we propose a spectral clustering method to address the high dimensionality and sparsity of the annotating data. Finally, experimental results show that the proposed method is useful and efficient.

  • Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

    Identity-based signature has become an important technique for lightweight authentication as soon as it was proposed in 1984. Thereafter, identity-based signature schemes based on the integer factorization problem and discrete logarithm problem were proposed one after another. Nevertheless, the rapid development of quantum computers makes them insecure. Recently,many efforts have been made to construct identity-based signatures over lattice assumptions against attacks in the quantum era.However, their efficiency is not very satisfactory. In this study, an efficient identity-based signature scheme is presented over the number theory research unit (NTRU) lattice assumption. The new scheme is more efficient than other lattice- and identity-based signature schemes. The new scheme proves to be unforgeable against the adaptively chosen message attack in the random oracle model under the hardness of the γ-shortest vector problem on the NTRU lattice.

  • Mohammad ALSHAYEB,Nasser KHASHAN,Sajjad MAHMOOD

    The unified modeling language (UML) is one of the most commonly used modeling languages in the software industry.It simplifies the complex process of design by providing a set of graphical notations, which helps express the objectoriented analysis and design of software projects. Although UML is applicable to different types of systems, domains, methods,and processes, it cannot express certain problem domain needs. Therefore, many extensions to UML have been proposed. In this paper, we propose a framework for integrating the UML extensions and then use the framework to propose an integrated unified modeling language-graphical (iUML-g) form. iUML-g integrates the existing UML extensions into one integrated form. This includes an integrated diagram for UML class, sequence, and use case diagrams. The proposed approach is evaluated using a case study. The proposed iUML-g is capable of modeling systems that use different domains.

  • Xin LI,Jin SUN,Fu XIAO,Jiang-shan TIAN
    2016, 17(2): 160-172.

    With shrinking technology, the increase in variability of process, voltage, and temperature (PVT) parameters significantly impacts the yield analysis and optimization for chip designs. Previous yield estimation algorithms have been limited to predicting either timing or power yield. However, neglecting the correlation between power and delay will result in significant yield loss. Most of these approaches also suffer from high computational complexity and long runtime. We suggest a novel bi-objective optimization framework based on Chebyshev affine arithmetic (CAA) and the adaptive weighted sum (AWS) method.Both power and timing yield are set as objective functions in this framework. The two objectives are optimized simultaneously to maintain the correlation between them. The proposed method first predicts the guaranteed probability bounds for leakage and delay distributions under the assumption of arbitrary correlations. Then a power-delay bi-objective optimization model is formulated by computation of cumulative distribution function (CDF) bounds. Finally, the AWS method is applied for power-delay optimization to generate a well-distributed set of Pareto-optimal solutions. Experimental results on ISCAS benchmark circuits show that the proposed bi-objective framework is capable of providing sufficient trade-off information between power and timing yield.

  • Yin ZHAO,Hong-guang XU,Qin-yu ZHANG
    2016, 17(2): 173-184.

    We employ nondestructive evaluation involving AC field measurement in detecting and identifying metal barcode labels, providing a reference for design. Using the magnetic scalar potential boundary condition at notches in thin-skin field theory and 2D Fourier transform, we introduce an analytical model for the magnetic scalar potential induced by the interaction of a high-frequency inducer with a metal barcode label containing multiple narrow saw-cut notches, and then calculate the magnetic field in the free space above the metal barcode label. With the simulations of the magnetic field, qualitative analysis is given for the effects on detecting and identifying metal barcode labels, which are caused by metal material, notch characteristics, exciting inducer properties, and other factors that can be used in metal barcode label design as reference. Simulation results are in good accordance with experiment results.