Apr 2020, Volume 21 Issue 4
    

  • Select all
  • Orginal Article
    Jia-cheng PAN, Dong-ming HAN, Fang-zhou GUO, Da-wei ZHOU, Nan CAO, Jing-rui HE, Ming-liang XU, Wei CHEN

    A dynamic network refers to a graph structure whose nodes and/or links dynamically change over time. Existing visualization and analysis techniques focus mainly on summarizing and revealing the primary evolution patterns of the network structure. Little work focuses on detecting anomalous changing patterns in the dynamic network, the rare occurrence of which could damage the development of the entire structure. In this study, we introduce the first visual analysis system RCAnalyzer designed for detecting rare changes of sub-structures in a dynamic network. The proposed system employs a rare category detection algorithm to identify anomalous changing structures and visualize them in the context to help oracles examine the analysis results and label the data. In particular, a novel visualization is introduced, which represents the snapshots of a dynamic network in a series of connected triangular matrices. Hierarchical clustering and optimal tree cut are performed on each matrix to illustrate the detected rare change of nodes and links in the context of their surrounding structures. We evaluate our technique via a case study and a user study. The evaluation results verify the effectiveness of our system.

  • Orginal Article
    Jia-zhi XIA, Yu-hong ZHANG, Hui YE, Ying WANG, Guang JIANG, Ying ZHAO, Cong XIE, Xiao-yan KUI, Sheng-hui LIAO, Wei-ping WANG

    Cryptocurrencies represented by Bitcoin have fully demonstrated their advantages and great potential in payment and monetary systems during the last decade. The mining pool, which is considered the source of Bitcoin, is the cornerstone of market stability. The surveillance of the mining pool can help regulators effectively assess the overall health of Bitcoin and issues. However, the anonymity of mining-pool miners and the difficulty of analyzing large numbers of transactions limit in-depth analysis. It is also a challenge to achieve intuitive and comprehensive monitoring of multi-source heterogeneous data. In this study, we present SuPoolVisor, an interactive visual analytics system that supports surveillance of the mining pool and de-anonymization by visual reasoning. SuPoolVisor is divided into pool level and address level. At the pool level, we use a sorted stream graph to illustrate the evolution of computing power of pools over time, and glyphs are designed in two other views to demonstrate the influence scope of the mining pool and the migration of pool members. At the address level, we use a force-directed graph and a massive sequence view to present the dynamic address network in the mining pool. Particularly, these two views, together with the Radviz view, support an iterative visual reasoning process for de-anonymization of pool members and provide interactions for cross-view analysis and identity marking. Effectiveness and usability of SuPoolVisor are demonstrated using three cases, in which we cooperate closely with experts in this field.

  • Orginal Article
    Mohammad CHEGIN, Jürgen BERNARD, Jian CUI, Fatemeh CHEGINI, Alexei SOURIN, Keith Keith, Tobias SCHRECK

    Methods from supervised machine learning allow the classification of new data automatically and are tremendously helpful for data analysis. The quality of supervised maching learning depends not only on the type of algorithm used, but also on the quality of the labelled dataset used to train the classifier. Labelling instances in a training dataset is often done manually relying on selections and annotations by expert analysts, and is often a tedious and time-consuming process. Active learning algorithms can automatically determine a subset of data instances for which labels would provide useful input to the learning process. Interactive visual labelling techniques are a promising alternative, providing effective visual overviews from which an analyst can simultaneously explore data records and select items to a label. By putting the analyst in the loop, higher accuracy can be achieved in the resulting classifier. While initial results of interactive visual labelling techniques are promising in the sense that user labelling can improve supervised learning, many aspects of these techniques are still largely unexplored. This paper presents a study conducted using the mVis tool to compare three interactive visualisations, similarity map, scatterplot matrix (SPLOM), and parallel coordinates, with each other and with active learning for the purpose of labelling a multivariate dataset. The results show that all three interactive visual labelling techniques surpass active learning algorithms in terms of classifier accuracy, and that users subjectively prefer the similarity map over SPLOM and parallel coordinates for labelling. Users also employ different labelling strategies depending on the visualisation used.

  • Orginal Article
    Meng-qi CAO, Jing LIANG1, Ming-zhao LI, Zheng-hao ZHOU, Min ZHU

    The study of tourism destination images is of great significance in the tourism discipline. Tourism user-generated content (UGC), i.e., the feedback on tourism websites, provides rich information for constructing a destination image. However, it is difficult for tourism researchers to obtain a relatively complete and intuitive destination image due to the unintuitive destination image display, the significant variance in departure time and data length, and the destination type in UGC. We propose TDIVis, a carefully designed visual analytics system, aimed at obtaining a relatively comprehensive destination image. Specifically, a keyword-based sentiment visualization method is proposed to associate the cognitive image with the emotional image, and by this method, both time evolution analysis and classification analysis are considered; a multi-attribute association double sequence visualization method is proposed to associate two different types of text sequences and provide a dynamic visual encoding interaction method for the multi-attribute characteristics of sequences. The effectiveness and usability of TDIVis are demonstrated through four cases and a user study.

  • Orginal Article
    Lei XU

    There has been a framework sketched for learning deep bidirectional intelligence. The framework has an inbound that features two actions: one is the acquiring action, which gets inputs in appropriate patterns, and the other is A-S cognition, derived from the abbreviated form of words abstraction and self-organization, which abstracts input patterns into concepts that are labeled and understood by self-organizing parts involved in the concept into structural hierarchies. The top inner domain accommodates relations and a priori knowledge with the help of the A-I thinking action that is responsible for the accumulation-amalgamation and induction-inspiration. The framework also has an outbound that comes with two actions. One is called I-S reasoning, which makes inference and synthesis (I-S) and is responsible for performing various tasks including image thinking and problem solving, and the other is called the interacting action, which controls, communicates with, and inspects the environment. Based on this framework, we further discuss the possibilities of design intelligence through synthesis reasoning.

  • Orginal Article
    Raheel Ahmed MEMON, Jian Ping LI, Junaid AHMED, Muhammad Irshad NAZEER, Muhammad ISMAIL, Khursheed ALI
  • Orginal Article
    Lei GUAN, Tao SUN, Lin-bo QIAO, Zhi-hui YANG, Dong-sheng LI, Ke-shi GE, Xi-cheng LU

    Support vector machines (SVMs) have been recognized as a powerful tool to perform linear classification. When combined with the sparsity-inducing nonconvex penalty, SVMs can perform classification and variable selection simultaneously. However, the nonconvex penalized SVMs in general cannot be solved globally and efficiently due to their nondifferentiability, nonconvexity, and nonsmoothness. Existing solutions to the nonconvex penalized SVMs typically solve this problem in a serial fashion, which are unable to fully use the parallel computing power of modern multi-core machines. On the other hand, the fact that many real-world data are stored in a distributed manner urgently calls for a parallel and distributed solution to the nonconvex penalized SVMs. To circumvent this challenge, we propose an efficient alternating direction method of multipliers (ADMM) based algorithm that solves the nonconvex penalized SVMs in a parallel and distributed way. We design many useful techniques to decrease the computation and synchronization cost of the proposed parallel algorithm. The time complexity analysis demonstrates the low time complexity of the proposed parallel algorithm. Moreover, the convergence of the parallel algorithm is guaranteed. Experimental evaluations on four LIBSVM benchmark datasets demonstrate the efficiency of the proposed parallel algorithm.

  • Orginal Article
    Yu-jia ZANG, Yan-hu CHEN, Can-jun YANG, De-jun LI, Ze-jian CHEN, Gul MUHAMMAD

    The effect of a constant current (CC) power supply on the CC ocean observation system is a problem that once was neglected. The dynamic characteristics of the CC power supply may have great influence on the whole system, especially the voltage behavior in the event of load change. This needs to be examined. In this paper, a method is introduced to check whether the CC power supply can satisfy the dynamic requirements of the CC ocean observation system. An equivalent model to describe the non-ideal CC power supply is presented, through which the dynamic characteristics can be standardized. To verify the feasibility of this model, a minimum system of a single node in the CC ocean observation system is constructed, from which the model is derived. Focusing on the power failure problem, the output voltage responses are performed and the models are validated. Through the model, the dynamic behavior of the CC power supply is checked in a practical design.

  • Orginal Article
    Vijay DAHIPHALE, Gaurav BANSOD, Ankur ZAMBARE, Narayan PISHAROTY

    Since the dawn of the Internet of Things (IoT), data and system security has been the major concern for developers. Because most IoT devices operate on 8-bit controllers with limited storage and computation power, encryption and decryption need to be implemented at the transmitting and receiving ends, respectively, using lightweight ciphers. We present novel architectures for hardware implementation for the ANU cipher and present results associated with each architecture. The ANU cipher is implemented at 4-, 8-, 16-, and 32-bit datapath sizes on four different field-programmable gate array (FPGA) platforms under the same implementation condition, and the results are compared on every performance metric. Unlike previous ANU architectures, the new architectures have parallel substitution boxes (S-boxes) for high throughput and hardware optimization. With these different datapath designs, ANU cipher proves to be the obvious choice for implementing security in extremely resourceconstrained systems.

  • Orginal Article
    Cem CİVELEK, Özge CİHANBEĞENDİ

    In a dissipative gyroscopic system with four degrees of freedom and tensorial variables in contravariant (right upper index) and covariant (right lower index) forms, a Lagrangian-dissipative model, i.e., {L, D}-model, is obtained using second-order linear differential equations. The generalized elements are determined using the {L, D}-model of the system. When the prerequisite of a Legendre transform is fulfilled, the Hamiltonian is found. The Lyapunov function is obtained as a residual energy function (REF). The REF consists of the sum of Hamiltonian and losses or dissipative energies (which are negative), and can be used for stability by Lyapunov’s second method. Stability conditions are mathematically proven.

  • Orginal Article
    Yu-xian LIU, Ronald ROUSSEAU

    A dynamic quantitative theory and measurement of power or dominance structures are proposed. Such power structures are represented as directed networks. A graph somewhat similar to the Lorenz curve for inequality measurement is introduced. The changes in the graph resulting from network dynamics are studied. Dynamics are operationalized in terms of added nodes and links. Study of dynamic aspects of networks is essential for potential applications in many fields such as business management, politics, and social interactions. As such, we provide examples of a dominance structure in a directed, acyclic network. We calculate the change in the D-measure, which is a measure expressing the degree of dominance in a network when nodes are added to an existing simple network.