Loading...
首页
期刊介绍
期刊订阅
联系我们
快速检索
引用检索
图表检索
高级检索
最新录用
|
预出版
|
当期目录
|
过刊浏览
|
阅读排行
|
下载排行
|
引用排行
|
百年期刊
ISSN 1000-0585
CN 11-1848/P
Started in 1982
About the Journal
»
About Journal
»
Editorial Board
»
Indexed in
»
Rewarded
Authors
»
Online Submission
»
Guidelines for Authors
»
Templates
»
Copyright Agreement
Reviewers
»
Guidelines for Reviewers
»
Online Peer Review
Office
»
Editor-in-chief
»
Office Work
»
Production Centre
Table of Content
, Volume 58 Issue 12
Previous Issue
Next Issue
For Selected:
View Abstracts
Download Citations
EndNote
Reference Manager
ProCite
BibTeX
RefWorks
Toggle Thumbnails
COMPUTER SCIENCE AND TECHNOLOGY
Select
Survey of structured data cleaning methods
HAO Shuang, LI Guoliang, FENG Jianhua, WANG Ning
Journal of Tsinghua University(Science and Technology). 2018,
58
(12): 1037-1050. DOI: 10.16511/j.cnki.qhdxxb.2018.22.053
Abstract
PDF
(5925KB) (
902
)
Data cleaning is the process of detecting and repairing dirty data which is often needed in data analysis and management. This paper classifies and summarizes the traditional and advanced data cleaning techniques and identifies potential directions for further work. This study first formally defines the cleaning problem for structured data and then describes error detection methods for missing data, redundant data, conflicting data and erroneous data. The data cleaning methods are then summarized based on their error elimination method, including constraint-based data cleaning, rule-based data cleaning, statistical data cleaning and human-in-the-loop data cleaning. Some important datasets and noise injection tools are introduced as well. Open research problems and future research directions are also discussed.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Routing algorithm based on a column-partition turn model for a network-on-chip
CAI Yuan, LUO Wei, XIANG Dong
Journal of Tsinghua University(Science and Technology). 2018,
58
(12): 1051-1058. DOI: 10.16511/j.cnki.qhdxxb.2018.22.043
Abstract
PDF
(3044KB) (
282
)
Existing methods cannot easily determine whether a routing algorithm for a network-on-chip contains a deadlock and the traditional turn model has serious limitations. This paper presents a simple, intuitive algorithm to determine whether the routing algorithm is deadlock-free. This paper gives a proof of the algorithm's correctness. Then, a column-partition turn model is given to implement deadlock-free minimal partially adaptive routing for a virtual cut-through (VCT)-switched 2-D mesh without extra virtual channels. This algorithm avoids deadlocks by restricting the locations for certain turns, which is similar to the odd-even turn method. Simulations show that this routing algorithm reduces the average latency and increases the saturation points compared to routing algorithms based on the odd-even turn model for various traffic patterns. Therefore, this column-partition turn model improves the performance of the whole network.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Performance optimization algorithm for MapReduce based on obtaining frequent keys
LI Jianjiang, HUA Shuiliang, WU Jie, ZHANG Kai
Journal of Tsinghua University(Science and Technology). 2018,
58
(12): 1059-1065. DOI: 10.16511/j.cnki.qhdxxb.2018.21.022
Abstract
PDF
(957KB) (
321
)
MapReduce is getting much attention in academia and industry for use in cloud computing to quickly deal with huge amounts of data. However, when MapReduce deals with text-centric applications, the algorithm generates is large amount of duplicate data in the intermediate results that increases the run time. A frequency buffering (FB) algorithm was used to add a Hash table before the ring memory to store frequent keys in a Hash table. However, since the algorithm is implemented by sampling, the algorithm may not accurately estimate the overhead and the frequent keys. Therefore, this study added a performance optimization algorithm to MapReduce to obtain the frequent keys by adding a counting Bloom filter (CBF) and a Hash table to dynamically filter the frequent keys before storing them in the ring memory. This algorithm more accurately identifies the frequent keys and greatly reduces the data sorting overhead and the disk I/O. Tests show that this performance optimization algorithm for MapReduce for obtaining the frequent keys significantly improves the execution speed by 17.04% compared to the original MapReduce and 9.31% higher than the frequency buffering algorithm.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
SimRank calculations for large temporal graphs
MIAO Zhuang, YUAN Ye, QIAO Baiyou, WANG Yishu, MA Yuliang, WANG Guoren
Journal of Tsinghua University(Science and Technology). 2018,
58
(12): 1066-1071. DOI: 10.16511/j.cnki.qhdxxb.2018.26.050
Abstract
PDF
(1026KB) (
335
)
Similarity calculations have many real life applications. The research on similarity calculations have mainly been focused on static graphs with many similarity calculation models based on SimRank. In real life, many systems, such as communication networks, are modeled by temporal graphs. However, the traditional SimRank algorithm cannot be implemented in temporal graphs. Therefore, this study analyzes the similarity calculation problem for large temporal graphs. A temporal-aware SimRank (TaSimRank) algorithm was developed to compute the node similarity through an efficient iterative method based on the topological structure and time constraints of the graph. An approximate algorithm is then used to implement the similarity calculations using a tree-based index built by a random walk and the Monte Carlo method. The algorithm balances the calculational time and efficiency. Tests on real temporal graphs demonstrate the effectiveness and extensibility of these approaches.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Free-text keystroke continuous authentication using CNN and RNN
LU Xiaofeng, ZHANG Shengfei, YI Shengwei
Journal of Tsinghua University(Science and Technology). 2018,
58
(12): 1072-1078. DOI: 10.16511/j.cnki.qhdxxb.2018.26.048
Abstract
PDF
(2205KB) (
442
)
Personal keystroke input patterns are difficult to imitate and can be used for identity authentication. The personal keystroke input data for a free-text can be used to learn the unique keystroke mode of a person. Detection based on a user's free-text keystrokes can be used for continuous identity authentication without affecting the user input. This paper presents a model that divides the keystroke data into fixed-length keystroke sequences and converts the keystroke time data in the keystroke sequence into a keystroke vector according to the time characteristics of the keystrokes. A convolutional neural network and a recurrent neural network are then used to learn the sequences of the personal keystroke vectors for identity authentication. The model was tested on an open data set with an optimal false rejection rate (FRR) of 1.95%, a false acceptance rate (FAR) of 4.12%, and an equal error rate (EER) of 3.04%.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
From automation to intelligence: Survey of research on vulnerability discovery techniques
ZOU Quanchen, ZHANG Tao, WU Runpu, MA Jinxin, LI Meicong, CHEN Chen, HOU Changyu
Journal of Tsinghua University(Science and Technology). 2018,
58
(12): 1079-1094. DOI: 10.16511/j.cnki.qhdxxb.2018.21.025
Abstract
PDF
(1133KB) (
1996
)
In recent years, the increasing size and complexity of software packages has led to vulnerability discovery techniques gradually becoming more automatic and intelligent. This paper reviews the search characteristics of both traditional vulnerability discovery techniques and learning-based intelligent vulnerability discovery techniques. The traditional techniques include static and dynamic vulnerability discovery techniques which involve model checking, binary comparisons, fuzzing, symbolic execution and vulnerability exploitability analyses. This paper analyzes the problems of each technique and the challenges for realizing full automation of vulnerability discovery. Then, this paper also reviews machine learning and deep learning techniques for vulnerability discovery that include binary function identification, function similarity detection, test input generation, and path constraint solutions. Some challenges are the security and robustness of machine learning algorithms, algorithm selection, dataset collection, and feature selection. Finally, future research should focus on improving the accuracy and efficiency of vulnerability discovery algorithms and improving the automation and intelligence.
Figures and Tables
|
References
|
Related Articles
|
Metrics
THERMAL ENGINEERING
Select
Validation of flow partitioning model for high pressure hydrogen jets through small orifices
LI Xuefang, HE Qian, CHRISTOPHER D M, CHENG Lin
Journal of Tsinghua University(Science and Technology). 2018,
58
(12): 1095-1100. DOI: 10.16511/j.cnki.qhdxxb.2018.21.021
Abstract
PDF
(1883KB) (
567
)
High pressure hydrogen jets are a critical topic in hydrogen safety research. Numerical simulations validated by measurements are an essential way to study high pressure hydrogen jets. However, the complete modeling of high pressure hydrogen jets is inefficient, unstable and difficult to converge, while the existing simplified models are based on non-physical assumptions and result in inaccurate predictions. A flow partitioning model based on quantitative shock structure measurements was developed by combining a real gas equation of state with the flow and energy conservation equations. The flow partitioning model takes into account the different flow conditions in the core flow region and the mixing layer and avoids modeling the shock region where the gas state varies dramatically which significantly simplifies the calculation. The predicted velocity and concentration distributions using the flow partitioning model agree well with the predictions by the complete model and with measurements, with these predictions being superior to predictions using the canonical notional nozzle model. The present study provides a reduced order modeling approach that simplifies the simulations without sacrificing the accuracy which will benefit hydrogen safety research.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Experimental study on the inhibition of heat transfer deterioration of supercritical pressure CO
2
WANG Zhenchuan, XU Ruina, XIONG Chao, JIANG Peixue
Journal of Tsinghua University(Science and Technology). 2018,
58
(12): 1101-1106. DOI: 10.16511/j.cnki.qhdxxb.2018.25.046
Abstract
PDF
(1440KB) (
344
)
The heat transfer can deteriorate with supercritical pressure fluids flowing in vertical tubes due to buoyancy. This study used a helical insert in the tube to change the flow structure and improve fluid heat transfer. Convection heat transfer of supercritical pressure CO
2
in a vertical bare tube and with a helical insert was investigated experimentally to identify the effects of the heat flux, inlet
Re
, and flow direction on the heat transfer for both cases. The wall temperature distribution is nonlinear due to the buoyancy effect with the peak wall temperature gradually moving towards the entrance as the heat flux increases. The helical structure inserted into the bare tube effectively suppresses the heat transfer deterioration caused by the buoyancy effect and significantly increases the convective heat transfer the supercritical pressure CO
2
in vertical tubes. The buoyancy effect can still reduce the heat transfer with supercritical pressure CO
2
upward flow even with the helical insert structure for high heat fluxes.
Figures and Tables
|
References
|
Related Articles
|
Metrics
MECHANICAL ENGINEERING
Select
Load spectrum compilation for machining center spindles based on S-shaped specimens
CHEN Daiwei, WU Jun, ZHANG Binbin, WANG Liping, LIANG Jianhong
Journal of Tsinghua University(Science and Technology). 2018,
58
(12): 1107-1114. DOI: 10.16511/j.cnki.qhdxxb.2018.21.024
Abstract
PDF
(7030KB) (
369
)
Spindle reliability tests characterized by the load spectrum are used to test spindle reliability. This paper presents a spindle load spectrum compilation method based on coefficient identification and cutting simulations. The cutting force coefficient in a cutting force model is identified and the cutting force predicted by the cutting model is compared with the measured cutting force to validate the model. The simulated cutting force on an S-shaped specimen was analyzed to obtain time histories of the cutting parameters. The cutting force model and the cutting parameters were then used to predict the dynamic cutting force with the cycles of the dynamic counted with the rain-flow counting method. Alternative probability distribution models were fit to the counting result with the best model selected based on the multi-fitting curve and the KS (Kolmogorov-Smirnov) test. The load spectrum was then used to guide a spindle loading test. The results show that the dynamic force is accurately predicted and can be used to predict the load spectrum and also guide loading tests. This method will improve spindle test reliability.
Figures and Tables
|
References
|
Related Articles
|
Metrics
BUILDING SCIENCE
Select
Experimental study of the influence of a silent environment on human sleep quality
YAN Xiang, WANG Jianghua, LI Hui, CHEN Yuxiao
Journal of Tsinghua University(Science and Technology). 2018,
58
(12): 1115-1120. DOI: 10.16511/j.cnki.qhdxxb.2018.22.030
Abstract
PDF
(1279KB) (
522
)
The influence of noise on human sleep was studied by comparing people's sleeping quality in a quiet room with close to 0 dB(A) background noise to that in common bedrooms with background noise levels of 22-48 dB(A). 35 subjects of different genders and ages wore sleep evaluation head bands when sleeping in the silent room and in their bedrooms. The results show improved sleeping quality in the silent room compared with the common bedrooms with the total sleep time averagely increased by 11.4%, the deep sleep time averagely increased by 9.3%, and the rapid eye movement (REM) sleep time averagely increased by 12.2%. The improved deep sleep time positively correlates with the background noise for noise levels above 30 dB(A).
Figures and Tables
|
References
|
Related Articles
|
Metrics
News
More
»
2023年度优秀论文、优秀审稿人、优秀组稿人评选结果
2023-12-12
»
2022年度优秀论文、优秀审稿人、优秀组稿人评选结果
2022-12-20
»
2020年度优秀论文、优秀审稿人评选结果
2021-12-01
»
aa
2020-11-03
»
2020年度优秀论文、优秀审稿人评选结果
2020-10-28
»
第十六届“清华大学—横山亮次优秀论文奖”暨2019年度“清华之友—日立化成学术交流奖”颁奖仪式
2020-01-17
»
a
2019-01-09
»
a
2018-12-28
»
a
2018-01-19
»
news2016
2017-01-13
Links
More
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd