Please wait a minute...

Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Current Issue

    • Data Verify algorithm research on P2P specific information monitoring
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 0-0.
    • Abstract ( 959 )     HTML       
    • The traditional passive monitoring model cannot monitor P2P specific information, so, passive monitoring model based on data verify algorithm has been raised. Taking P2P specific information as the center and data verify algorithm as the judgment reference, this model passively monitors P2P network. Because the traditional data verify algorithm takes more memory space and with low efficiency, two-dimensional Bloom Filter algorithm has been raised to verify data; finally, analyzes the time performance, space performance, misjudgment rate and relative parameters to two-dimensional Bloom Filter algorithm. As the test indicates, compared with the traditional data verify algorithm, two-dimensional Bloom Filter algorithm operation efficiency is higher and with small memory space, which can fully meet the performance requirement of passive monitoring model to data verify algorithm.
    • Supplementary Material | Related Articles

    Papers

    • A Sub-Optimal Sub-Carrier and Power Allocation for  the Downlink Multi-User CoMP in Multi-Cell Systems
    • ZHANG Xiao-liang,JI Hong
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 1-5. DOI:10.13190/jbupt.201204.1.zhangxl
    • Abstract ( 2129 )     HTML       
    • In traditional subcarrier allocation algorithms, the problem of unfairness between the celledge users and cellcenter users and varying power allocation in downlink coordinated multiple point transmission/reception (CoMP) system is ignored. To solve this problem, a suboptimal subcarrier and power allocation algorithm to maximize all the users throughput in one sector is proposed. In this algorithm, the frequency bandwidth that the celledge users can occupy is extended to the whole frequency bandwidth that the BS (base station) assigns to the cell, the cellcenter users and celledge users compete for the optimal subcarrier through the proportional fairness algorithm which will ensure the fairness. Then according to the optimization objective function and the proposed subcarrier allocation algorithm, the minimum rate and the proportional fairness constraint are introduced in connection to all the users. At last, the power allocated to each user is calculated using the Lagrange multiplier method. Simulations show that this algorithm will improve all the users fairness and throughput obviously.

    • References | Supplementary Material | Related Articles
    • Delay Tolerant Network Routing Algorithm to  Enhance the Packet Forwarding Direction
    • ZHANG Wen-zhu,HAN Xiao-dong
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 6-10. DOI:10.13190/jbupt.201204.6.zhangwzh
    • Abstract ( 2092 )     HTML       
    • A new routing algorithm named spray and wait routing algorithm based on grey Markov prediction model (SWR-GM) for delay tolerant network (DTN) is proposed. It combines grey Markov location predicting model with the spray and wait routing algorithm depending on activity coefficient of a node (ACoN). It predicates the location of the destination node by utilizing grey markov location predicting model. It also introduces the concept of ACoN to quantify the strength of a nodes activity. In addition, the algorithm sprays and forwards packets on the basis of ACoN, so it can enhance the transfer direction. Simulation shows that SWRGM algorithm can provide better network performance compared with the Epidemic algorithm and the traditional spray and wait outing (SWR) algorithm.

    • References | Supplementary Material | Related Articles
    • Design and Optimization of a Spherical Underwater  Vehicle BYSQ-2’s Structure
    • LAN Xiao-juan, SUN Han-xu, JIA Qing-xuan, LI Hong-yi
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 11-14. DOI:10.13190/jbupt.201204.11.lanxj
    • Abstract ( 1979 )     HTML       
    • The design and optimization method of a spherical underwater vehicle BYSQ-2's structure is presented. The vehicle's attitude can be changed by the inner steering mechanism. The structure of the vehicle is designed according to the configuration scheme and design index. After the thruster's type is chosen, the size of the pipe's inside diameter can be optimized by the admiralty coefficient law. According to the whole machine balancing law, the structure is adjusted to achieve symmetry, and the counterweight's quality is optimized. The BYSQ-2’s prototype is manufactured according to the conclusion, and the result of the experiment indicates that the prototype's performance achieves the design requirement. 

    • References | Supplementary Material | Related Articles
    • New Ultra-Wideband Electromagnetic Bandgap Structure Used for  Simultaneous Switching Noise Suppression
    • LU Hong-min, GUO Yan-lin, WEI Jing, WANG Xiao-ming
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 15-18. DOI:10.13190/jbupt.201204.15.luhm
    • Abstract ( 2063 )     HTML       
    • A new ultra-wideband electromagnetic bandgap (EBG) structure is proposed for simultaneous switching noise suppression (SSN). A analysis and design of the bandgap properties of the new EBG structure is given, the characteristics of stopband and signal integrity are simulated, showing that the new EBG's stopband is improved, and the lower cut-off frequency is decreased comparing with the Z-bridged EBG structure with the same parameters. Meanwhile, signal integrity of the proposed EBG power plane can be improved by using differential transmission lines.

    • References | Supplementary Material | Related Articles
    • Algorithm of Single Image Fog Removal Based on  Joint Bilateral Filter
    • CHEN Long, GUO Bao-long, BI Juan, ZHU Juan-juan
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 19-23. DOI:10.13190/jbupt.201204.19.chenl
    • Abstract ( 2530 )     HTML       
    • In the smoky, foggy, hazy and other harsh outdoor conditions, scene image captured is severely degraded by the scattering of atmospheric particles. Based on atmospheric scattering model, the degraded image needs a white balance operation to simplify the atmospheric scattering model; then, a new nonlinear spatial filtering algorithm is put forward to estimate the rough luminance of the sky, and joint bilateral filter is introduced to further refine the luminance of the sky. Finally, image is restored by using tone mapping. The complexity of the proposed algorithm is only a linear function of the input image pixels numbers, and this allows a very fast implementation. Experiments show that the proposed algorithm can effectively restore the fogdegraded images. With this algorithm, the images is restored with more natural, realistic, and higher-definition.

    • References | Supplementary Material | Related Articles
    • Information Predictions Based on Node Attributes of Social Media
    • ZHANG Chuang, JIANG Yang, WU Ming, XIAO Wen-jun, LI Tai
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 24-27. DOI:10.13190/jbupt.201204.24.zhangch
    • Abstract ( 1918 )     HTML       
    • The features of social media, such as node influence are important in information prediction. A new model with attribute, number and views of nodes (ANV) is proposed for event prediction. Experiment is designed to predict the performance of new released movies using back propagation (BP) neural network algorithm with the data of Sina Microblog. Compared to other models, when considering the node attribution, the proposed has higher prediction accuracy.

    • References | Supplementary Material | Related Articles
    • Object Based Watermarking Algorithm Robust to  Geometric Transformation Attacks
    • CHEN Zhi-peng,ZOU Jian-cheng
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 33-37. DOI:10.13190/jbupt.201204.33.chenzhp
    • Abstract ( 1960 )     HTML       
    • One of the key points of the MPEG-4 standard is the possibility to access and manipulate objects within a video sequence, but it increases the demand for information security protection and multimedia authentication technologies. An object based watermarking algorithm is proposed, which can correctly access the data embedded in the object. To resist against scaling and rotation attacks, two generalized Radon transformations are used. The watermark is embedded in the quantized SA-DCT coefficients. Experiments show that the algorithm is lowdistortion, robust to geometry transformation attacks. And the algorithm can integrate with the MPEG-4 codec very well. 

    • References | Supplementary Material | Related Articles
    • A Fractal Theory Based Layered Traffic Model Used  in Internet of Things
    • WU Qi-wu
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 38-41. DOI:10.13190/jbupt.201204.38.wuqw
    • Abstract ( 2284 )     HTML       
    • Considering the Internet of things based on radio frequency identification (RFID) as the study object and using the multiple ON-OFF traffics model (obeys heavy tail distribution of Pareto), a centralized self similar layered traffic model of Internet of things is proposed in view of its structure and traffic characteristics. The validity of the model is verified through the measurement of selfsimilarity parameter. Simulation proves that the model is effective. Moreover, the selfsimilarity increases network packet loss rate and queuing delay, and reduces the system throughput.

    • References | Supplementary Material | Related Articles
    • Modulation Identification Method of the Subcarriers with  Pilots for OFDM Signals
    • LIU Ming-qian, LI Bing-bing,ZHAO Lei, ZHAO Yan
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 42-45. DOI:10.13190/jbupt.201204.42.liumq
    • Abstract ( 2487 )     HTML       
    • A new modulation recognition method of the subcarriers with pilots for orthogonal frequency division multiplexing (OFDM) signals is proposed. The method firstly identifies null subcarrier signals of the OFDM and the pure pilot subcarrier signals by combination features of higher order cumulants in the equivalent model of OFDM. Then, it recognizes the modulated subcarrier signals which are less affected by pilots using comparing the variance of sequences in the minimum ring of vectogram. Simulation shows that the proposed method is effective and feasible in the multipath channels.

    • References | Supplementary Material | Related Articles
    • Topology Control Algorithm and Sleep Awake Scheme for  Strip Based Wireless Sensor Networks
    • ZOU Wei-xia,WANG Yi-bo,GAO Wan-xin,LI Bin,DU Guang-long
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 46-50. DOI:10.13190/jbupt.201204.46.zouwx
    • Abstract ( 2014 )     HTML       
    • To solve the problem of unevenness in energy consumption which tends to cause the network disconnection in stripbased wireless sensor networks, a improved topology control algorithm and sleep-awake scheme is proposed. Based on the set clustering, the clusterhead nodes are periodically elected under a migrationbased scheduling mechanism designed to regulate nodes duty cycles as well as intra/intercluster communication distances. And the load balance of them is achieved by adaptively adjusting the listening schedule. Simulations show that this algorithm could effectively prolong the network lifespan and improve the network completeness of the sensing area in the later period. 

    • References | Supplementary Material | Related Articles
    • Statistic Guarantees of QoS in Wireless Asymmetric Relay Networks
    • LIAO Yong,YANG Shi-zhong,PENG Xiao-qin,YANG Hong,ZHANG Lei
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 51-54. DOI:10.13190/jbupt.201204.51.liaoy
    • Abstract ( 2067 )     HTML       
    • Aiming that the optimal solution of dynamic resource allocation in relay networks is still incomplete, and combining the information theory with effective capacity, an optimal solution of dynamic resource allocation in estimateandforward (EF) relay networks is given independently. Moreover, setting the typical network as an example, a selfadaptive relay networks scheme based on dynamic resource allocation is put forward. A dynamic choice can be availed within three relay protocols, that can be depicted as amplifyandforward (AF), decodeandforward (DF) and EF according to the system QoS exponent requirement. Numerical simulation indicates that the dynamic resource allocation scheme can effectively maximize the effective capacity of relay networks under the limitation of system QoS exponent. Furthermore, the selfadaptive relay network scheme can improve a much better throughput performance than the traditional monorelay scheme.

    • References | Supplementary Material | Related Articles
    • Encoding and Decoding Method for 8×8 SAST Code
    • TIAN Xin-ji,XU Yan-ping,LI Ya,HU Zi-wei
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 55-58. DOI:10.13190/jbupt.201204.55.tianxj
    • Abstract ( 1943 )     HTML       
    • In order to reduce decoding complexity for 8×8 semiorthogonal algebraic spacetime code (SAST), a new encoding and decoding method is proposed for 8×8 SAST code with QAM modulated signals. In the proposed method, through part of the transmitted signals rotated by a certain angle according to the feedback information, the real part and the imaginary part of the first half and the second half of the transmitted signal vectors are mutually orthogonal. So its decoding complexity is proportional to the square of the modulation order. Simulation shows that the decoding complexity is reduced greatly by the proposed code only with 5 bit feedback. 

    • References | Supplementary Material | Related Articles
    • A New Joint Symbol Synchronization and Fine Frequency  Offset Estimation Algorithm in IEEE 802.11n
    • HUANG Ming,ZENG Yong-bo ,LI Zheng-ping,LUO Shou-shan ,XU Cheng-qian
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 59-63. DOI:10.13190/jbupt.201204.59.huangm
    • Abstract ( 2529 )     HTML       
    • The introduction of cyclic shift delay (CSD) is used in IEEE 802.11n to distinguish different spatial streams, however it poses a challenge to synchronization. The traditional synchronization methods, which utilize the crosscorrelation between the local training sequence and the received signal, will cause many spurious peaks and result in deteriorated synchronization performance. A new joint symbol synchronization and fine frequency offset estimation algorithm is proposed. It exploits the structure of IEEE 802.11n preamble and adopts a delaycorrelation algorithm to eliminate the effect of CSD. The proposed algorithm has advantages in avoiding the effect of carrier frequency offset, suppressing the generation of spurious peak results and improving the detection accuracy.

    • References | Supplementary Material | Related Articles
    • Spatial Diversity Based MQAM Modulation Classification in  Rayleigh Fading Channel
    • LI Yan-ling, LI Bing-bing, LIU Ming-qian
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 64-67. DOI:10.13190/jbupt.201204.64.liyl
    • Abstract ( 2050 )     HTML       
    • Considering the difficulty in classifying quadrature amplitude modulation (MQAM) signals over rayleigh fading channel, an algorithm based on antenna arrays for identifying MQAM signals in Rayleigh fading channels is presented. The characteristic that spatial diversity reception can improve the SNR of received signals is used. First, the equal gain diversity model for modulation classification is given. Then, the nonlinear leastsquares estimator is presented to estimate the frequency offsets and phase offsets. Finally the normalized fourthorder and sixthorder cumulants of the signal at the output of the combiner are estimated, that can be used as modulation classification features. Simulations demonstrate that the proposed scheme is efficient in rayleigh fading channel. Compared to the existing quasi hybrid likelihood ratio test (qHLRT) method, the proposed method has lower computational complexity and stronger practicability.

    • References | Supplementary Material | Related Articles
    • An Adaptive Backoff Algorithm for Ad Hoc Network Based  on Transmission State
    • LIU Ming-Xin,YU Qian
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 68-71. DOI:10.13190/jbupt.201204.68.liumx
    • Abstract ( 2051 )     HTML       
    • An adaptive backoff algorithm based on transmission state (ABTS) for Ad Hoc network is proposed. Used with ABTS, the channel status is sensed by calculating amount of competitive nodes locally and the contention window is adjusted linearly or multiplicatively according to different channel status. To reduce data losses, ABTS algorithm gives frames retransmitted repeatedly higher priority to send. Experiment demonstrates that ABTS algorithm has suitable performances in multi-hop Ad Hoc network, and, compared to Binary Exponential Backoff algorithm, ABTS algorithm has better performances in term of throughput, endtoend delay and collision rate.

    • References | Supplementary Material | Related Articles

    Reports

    • Management for Software Project Schedule Based on Significant Deviation Standard
    • ZHANG Jun-guang, YANG Fang-fang
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 72-76. DOI:10.13190/jbupt.201204.72.zhangjg
    • Abstract ( 1971 )     HTML       
    • An estimating and monitoring model of software project schedule is studied based on significant deviation standard. According to the principle of process control, dynamic control of software project effort based on significant deviation standard and risk reserve time is put forward as well. Three methods are introduced aimed on how to define significant deviation standard. They provide the foundation to improve the accuracy of project management and ensure the completion of projects within acceptable deviation. 

    • References | Supplementary Material | Related Articles
    • Resource Allocation for Exploiting Multiuser  Diversity in Multicast System
    • LI Song,WANG Xiao-xiang,ZHANG Hong-tao,ZHAO Yuan
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 81-84. DOI:10.13190/jbupt.201204.81.lis
    • Abstract ( 1826 )     HTML       
    • The system capacity of conventional multicast transmission in wireless system is limited by the worst user in the multicast group. A resource allocation algorithm for multicast system is proposed to overcome the capacity limitation by exploiting the multiuser diversity. Each subcarrier is allocated to some users with good channel state information. Due to the nonconvex property of the power allocation, power allocation based on gradient is adopted to optimize the power allocation locally. Simulation shows that the transmission rate is significantly improved by using our proposed algorithms, when compared to the traditional multicast transmission scheme.

    • References | Supplementary Material | Related Articles
    • A New Multi-Master Framework of MapReduce
    • JIN Jing,WANG Yan,LI Xin,CHEN Shan-zhi
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 89-93. DOI:10.13190/jbupt.201204.89.jinj
    • Abstract ( 2130 )     HTML       
    • In the existing MapReduce framework, the single master is the performance bottleneck. As a result, the size of the cluster is limited. In order to break the bottleneck, a multimaster framework is proposed in this paper. The implementation is based on Apache Hadoop MapReduce. The main framework and signaling system are redesigned to sustain more than one master. Meanwhile a doublemaster hot backup scheme is designed to solve single master failure, so that the new framework is able to reduce the impact of master failure.

    • References | Supplementary Material | Related Articles
    • Priori Information Aided SNR Estimation Algorithm for 8PSK Signal
    • MENG Qing-ping,ZHOU Xin-li,TIAN Wei
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 94-98. DOI:10.13190/jbupt.201204.94.mengqp
    • Abstract ( 1885 )     HTML       
    • Three priori information aided SNR estimation algorithm is proposed based on maximum likelihood sequential criterion. Compared with the existing harddecision aided SNR estimation algorithm, the proposed algorithm decreases estimation error in low SNR state. The performance of the algorithm in the beginning of iteration and in the next iterations in turbo equalizer is analyzed. According to different number of iteration, switching one algorithm to another can raise the estimation precision, and lower complexity. The new algorithms only use small number of data symbols, they can also handle a large range of SNR.

    • References | Supplementary Material | Related Articles
    • Design of Three-Limb Robot with Integrated of Arm-Leg Mechanism
    • FAN Ji-zhuang,LI Li-yi,ZHAO Jie
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 99-102. DOI:10.13190/jbupt.201204.99.fanjzh
    • Abstract ( 1636 )     HTML       
    • A three-limb robot with integrated of armleg mechanism is developed based on functional bionics. The robot can accomplish locomotion and operation tasks in time sharing multiplex mode with aid of permanent magnet absorption mechanisms and operation mechanisms mounted on each limb, and has a variety of agile walking gaits and operation patterns as well. Experiments of fundamental walking gaits and objects operation shows practicality. 

    • References | Supplementary Material | Related Articles
    • Energy-Efficient Cross Layer Design of Adaptive Modulation with  Hybrid-ARQ in Cooperative Networks
    • DAI Cui-qin,JIANG Li,CHEN Qian-bin,WANG Guang-yu
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 103-106. DOI:10.13190/jbupt.201204.103.daicq
    • Abstract ( 2098 )     HTML       
    • To improve energy efficiency in cooperative relay system, an approach to optimize the energy consumption of cooperative hybrid automatic repeat request (HARQ) protocols with adaptive modulation over Nakagami-m fading channel is proposed. Through modeling the state transition diagram, the total energy consumption and outage probability performance are derived. Further, an optimization framework to minimize the total energy consumption is formulated, and an exhaustive search algorithm is presented. It is shown that the performance of cooperative HARQ is better than the noncooperative HARQ. In addition, the proposed crosslayer scheme can reach to about 80% energy savings over the nonoptimized system.

    • Supplementary Material | Related Articles
    • Partial Network Coding Scheme Based on Energy in WSN
    • WANG Lei,ZHANG Guo-yin,MA Chun-guang,LI Xiang-xiang
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 107-111. DOI:10.13190/jbupt.201204.107.wangl
    • Abstract ( 2093 )     HTML       
    • A partial network coding scheme is proposed for wireless sensor network based on the eventdriven, it can meet highefficiency, lowpower transmission in the case of partial nodes participating in the encoding. The encoding nodes are categorized into the business encoding nodes and capability encoding nodes based on the heterogeneity of sensor nodes and the eventdriven way, increasing the robustness of the network coding and improved the efficiency of network coding. Simulation shows that this scheme is superior to the traditional network coding scheme in energy consumption, network throughput and transmission delay.

    • References | Supplementary Material | Related Articles
    • Problem of Signal Reconstruction of Compressive Sensing Solved by  Gradient Projection
    • HE Yi-bao, BI Du-yan, MA Shi-ping, YUE Yao-shuai
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 112-115. DOI:10.13190/jbupt.201204.112.heyb
    • Abstract ( 2159 )     HTML       
    • A gradient projection method combining Barzilai-Borwein stepsize and nonmonotone line search is proposed and applied to signal reconstruction in compressive sensing. The computation of Barzilai-Borwein stepsize is analyzed, A corresponding nonmonotone line search method is introduced. To reduce influence of line search, an adaptive nonmonotone line search is designed. Convergence analysis of the algorithm is given. Experiment shows that the proposed algorithm can get good performances of signal reconstruction with different sparsity, seems better than Basis Pursuit, Orthogonal Matching Pursuit and other gradient projection algorithms. 

    • References | Supplementary Material | Related Articles
    • Improved Bit-Flipping Method for Decoding Structured  Low-Density Parity-Check Codes
    • LIU Yuan-hua, ZHANG Mei-ling
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 116-119. DOI:10.13190/jbupt.201204.116.liuyh
    • Abstract ( 2155 )     HTML       
    • An improved bit-flipping (BF) algorithm with low complexity for decoding structured lowdensity parity-check codes (LDPC) is proposed to improve the performance of the harddecision BF algorithm. The harddecision bits are divided into two groups based on the magnitudes of the received symbols, and at each iteration, the proposed algorithm can flip more than one bit with using two thresholds, and the flipping error probability is effectively decreased. The improved BF algorithm requires some real number comparisons before iterations and requires only logical operations during the iterations. Compared with the weighted bitflipping algorithm and its modifications, the new method is with significantly lower complexity. Simulations show that the proposed algorithm is provided with very fast convergence speed and excellent performance with significantly low complexity.

    • References | Supplementary Material | Related Articles
    • A Blind Source Separation Method for Mixed Images with Additive White Gaussian Noise
    • YU Xian-chuan,XU Jin-dong
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 120-123. DOI:10.13190/jbupt.201204.120.yuxch
    • Abstract ( 2087 )     HTML       
    • Aiming at the noise sensitivity of blind source separation for mixed images based on the clustering sparse component analysis, a blind source separation method for mixed images with additive white Gaussian noise is proposed. The noise intensity in mixed image is evaluated by correlation coefficients between mixed image and noise image, then via sparse component analysis, the original images are separated from denoising mixed images. Experiment shows that the presented algorithm can remove the noise effectively, and extract the original images accurately from overlying noise mixed images. 

    • References | Supplementary Material | Related Articles
    • Addconcept:A Top-Down Algorithm for Horizontal Merger of  Concept Lattices
    • Lu Ling-ling,ZHANG Lei
    • Journal of Beijing University of Posts and Telecommunications. 2012, 35(4): 124-128. DOI:10.13190/jbupt.201204.124.lüll
    • Abstract ( 2284 )     HTML       
    • A top-down and depth-first algorithm is proposed for horizontally merging concept lattices. The influences of the inserting order of the parents/children concepts on new concepts and updated concepts are investigated. Some theorems on inserting and updating concepts are proved. Based on this, a recursive traversal order is designed to insert concepts into lattices, which can drastically reduce the number of concepts comparisons. Experiment and analysis indicate that the proposed algorithm can obviously improve efficiencies compared with other concept lattices merging algorithms.

    • References | Supplementary Material | Related Articles