• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Shaopeng, Wen Yingyou, Zhao Hong. Similarity Query Processing Algorithm over Data Stream Based on LCSS[J]. Journal of Computer Research and Development, 2015, 52(9): 1976-1991. DOI: 10.7544/issn1000-1239.2015.20140479
Citation: Wang Shaopeng, Wen Yingyou, Zhao Hong. Similarity Query Processing Algorithm over Data Stream Based on LCSS[J]. Journal of Computer Research and Development, 2015, 52(9): 1976-1991. DOI: 10.7544/issn1000-1239.2015.20140479

Similarity Query Processing Algorithm over Data Stream Based on LCSS

More Information
  • Published Date: August 31, 2015
  • Nowadays similarity query about data stream has been essential in many applications, like smart home and environmental monitoring. However, few of the current relevant researches take LCSS (longest common subsequence) as the similarity measurement function. The NAIVE algorithm gets the query results by comparing the threshold and the value of measurement function which is obtained based on the basic dynamic programming method. The similarity query over data stream based on the LCSS is considered in this paper. The D2S-PC algorithm is proposed to overcome the drawback that the query result cannot be gotten until the calculations on all the elements in the full dynamic programming matrix are finished. It defines the PS and CC domains of the matrix over every window, and utilizes the characteristics of the similarity query and matrix members in these two domains effectively. By taking this algorithm, the similarity query results can be obtained before the final length of LCSS is calculated. Compared with the original algorithm, it reduces the computations about the members in the matrix greatly. Extensive experiments on real and synthetic datasets show that the D2S-PC algorithm is effective in handling the similarity query over data stream based on the LCSS in the condition of more precise query results, and can meet the requirements of practical applications.
  • Related Articles

    [1]Duan Zhuohui, Liu Haikun, Zhao Jinwei, Liu Yihang, Liao Xiaofei, Jin Hai. A Reconfigurable Cache Consistency Mechanism for Distributed Memory Pool[J]. Journal of Computer Research and Development, 2023, 60(9): 1960-1972. DOI: 10.7544/issn1000-1239.202330448
    [2]Wei Zheng, Dou Yu, Gao Yanzhen, Ma Jie, Sun Ninghui, Xing Jing. A Consistent Hash Data Placement Algorithm Based on Stripe[J]. Journal of Computer Research and Development, 2021, 58(4): 888-903. DOI: 10.7544/issn1000-1239.2021.20190732
    [3]Zhou Yuxuan, Yang Xu, Qin Chuanyi, Yang Zhiwei, Zhu Yifeng, Duan Jin. HYBRID-D2D-MIMO (HDM) Network Architecture and Hybrid Data Distributing Strategy (HDDS)[J]. Journal of Computer Research and Development, 2020, 57(9): 1911-1927. DOI: 10.7544/issn1000-1239.2020.20190530
    [4]Ling Li, Jiang Jianhui. Power-Constrained SoC Test Scheduling Optimization Using Asynchronous Clock Periods[J]. Journal of Computer Research and Development, 2015, 52(11): 2589-2598. DOI: 10.7544/issn1000-1239.2015.20148145
    [5]Peng Changgen, Liu Hai, Tian Youliang, Lü Zhen, Liu Rongfei. A Distributed Rational Secret Sharing Scheme with Hybrid Preference Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1476-1485.
    [6]Zhou Hangjun, Zhang Wei, Peng Yuxing, Li Sikun. A Lifetime-limited Causal Order Control Method in Asynchronous DVE System[J]. Journal of Computer Research and Development, 2011, 48(9): 1768-1780.
    [7]Jiang Yuncheng, Wang Ju, Zhou Shengming, Tang Yong. Hybrid Reasoning of Terminological Cycles in Description Logic εL[J]. Journal of Computer Research and Development, 2009, 46(1): 15-22.
    [8]Li Zhiqiang, Chen Hanwu, Xu Baowen, Liu Wenjie. Fast Algorithms for Synthesis of Quantum Reversible Logic Circuits Based on Hash Table[J]. Journal of Computer Research and Development, 2008, 45(12): 2162-2171.
    [9]Jiang Yuncheng, Shi Zhongzhi, Tang Yong, Wang Ju. A Distributed Dynamic Description Logic[J]. Journal of Computer Research and Development, 2006, 43(9): 1603-1608.
    [10]Wang Wansen, He Huacan. Research and Analysis of Probability Logic Based on Universal Logics[J]. Journal of Computer Research and Development, 2005, 42(7): 1204-1209.
  • Cited by

    Periodical cited type(15)

    1. 邓可望,赵娟,肖振中,师少光,朱亮. 基于多光谱和面部多区域联合的人脸活体检测算法. 集成技术. 2024(01): 72-81 .
    2. 祁春阳,黄杰,赵翔宇,汪周红. 云边协同的轻量级网络结构人脸识别方法. 东南大学学报(自然科学版). 2023(01): 1-13 .
    3. 谢晓华 ,卞锦堂 ,赖剑煌 . 人脸活体检测综述. 中国图象图形学报. 2022(01): 63-87 .
    4. 陈晋音,吴长安,郑海斌. 基于softmax激活变换的对抗防御方法. 网络与信息安全学报. 2022(02): 48-63 .
    5. 封筠,董祉怡,刘甜甜,韩超群,胡晶晶. 融合DQ_CoALBP和LPQ算子的人脸活体检测. 计算机工程与应用. 2022(14): 134-143 .
    6. 伊力哈木·亚尔买买提,张伟. 一种新的人脸面部表情识别算法研究. 电子器件. 2021(03): 616-623 .
    7. 马思源,郑涵,郭文. 应用深度光学应变特征图的人脸活体检测. 中国图象图形学报. 2020(03): 618-628 .
    8. 颜健. 基于特征融合与支持向量机的人脸活体检测技术. 数字技术与应用. 2020(05): 46-47 .
    9. 束鑫,唐慧,杨习贝,宋晓宁,吴小俊. 基于差分量化局部二值模式的人脸反欺诈算法研究. 计算机研究与发展. 2020(07): 1508-1521 . 本站查看
    10. 黄俊,张娜娜,章惠. 融合头部姿态和面部表情的互动式活体检测. 计算机应用. 2020(07): 2089-2095 .
    11. 唐慧,束鑫,杨习贝,李玥. 基于分块彩色MB_-LBP纹理的人脸反欺诈算法. 江苏科技大学学报(自然科学版). 2020(03): 48-53 .
    12. 吴启群,宋晓宁. 联合多通道特征与最小二乘决策的人脸反欺诈方法. 计算机应用研究. 2020(09): 2847-2850 .
    13. 施新岚,黄俊,黄洋,许二敏. 基于Gabor纹理增强的人脸活体检测算法. 重庆邮电大学学报(自然科学版). 2020(06): 1023-1030 .
    14. 田中可,陈成军,李东年,赵正旭. 基于PX-LBP和像素分类的装配体零件识别研究. 机电工程. 2019(03): 236-243 .
    15. 刘伟,章琬苓,项世军. 基于LBP-MDCT和CNN的人脸活体检测算法. 应用科学学报. 2019(05): 609-617 .

    Other cited types(22)

Catalog

    Article views (1491) PDF downloads (750) Cited by(37)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return