Home / Journals / JQC / Vol.2, No.2, 2020
  • Open Access

    ARTICLE

    Weighted Particle Swarm Clustering Algorithm for Self-Organizing Maps

    Guorong Cui, Hao Li, Yachuan Zhang, Rongjing Bu, Yan Kang*, Jinyuan Li, Yang Hu
    Journal of Quantum Computing, Vol.2, No.2, pp. 85-95, 2020, DOI:10.32604/jqc.2020.09717
    Abstract The traditional K-means clustering algorithm is difficult to determine the cluster number, which is sensitive to the initialization of the clustering center and easy to fall into local optimum. This paper proposes a clustering algorithm based on self-organizing mapping network and weight particle swarm optimization SOM&WPSO (Self-Organization Map and Weight Particle Swarm Optimization). Firstly, the algorithm takes the competitive learning mechanism of a self-organizing mapping network to divide the data samples into coarse clusters and obtain the clustering center. Then, the obtained clustering center is used as the initialization parameter of the weight particle swarm optimization algorithm. The particle position… More >

  • Open Access

    ARTICLE

    A Novel Intrusion Detection Algorithm Based on Long Short Term Memory Network

    Xinda Hao1, Jianmin Zhou2,*, Xueqi Shen1, Yu Yang1
    Journal of Quantum Computing, Vol.2, No.2, pp. 97-104, 2020, DOI:10.32604/jqc.2020.010819
    Abstract In recent years, machine learning technology has been widely used for timely network attack detection and classification. However, due to the large number of network traffic and the complex and variable nature of malicious attacks, many challenges have arisen in the field of network intrusion detection. Aiming at the problem that massive and high-dimensional data in cloud computing networks will have a negative impact on anomaly detection, this paper proposes a Bi-LSTM method based on attention mechanism, which learns by transmitting IDS data to multiple hidden layers. Abstract information and high-dimensional feature representation in network data messages are used to… More >

  • Open Access

    ARTICLE

    A Survey of Time Series Data Visualization Methods

    Wangdong Jiang1, Jie Wu1,*, Guang Sun1,2, Yuxin Ouyang3, Jing Li3, Shuang Zhou2
    Journal of Quantum Computing, Vol.2, No.2, pp. 105-117, 2020, DOI:10.32604/jqc.2020.07242
    Abstract In the era of big data, the general public is more likely to access big data, but they wouldn’t like to analyze the data. Therefore, the traditional data visualization with certain professionalism is not easy to be accepted by the general public living in the fast pace. Under this background, a new general visualization method for dynamic time series data emerges as the times require. Time series data visualization organizes abstract and hard-to-understand data into a form that is easily understood by the public. This method integrates data visualization into short videos, which is more in line with the way… More >

  • Open Access

    ARTICLE

    A Position Self-Adaptive Method to Detect Fake Access Points

    Ping Lu1,2,*
    Journal of Quantum Computing, Vol.2, No.2, pp. 119-127, 2020, DOI:10.32604/jqc.2020.09433
    Abstract In recent years, with the maturity and popularity of Wi-Fi technology, wireless hotspots have been deployed on a large scale in public places. But at the same time, it brings many security issues that cannot be ignored. Among them, the fake access point attack is a very serious threat in wireless local area network. In this paper, we propose a method to detect fake access points in wireless local area network. First, our detection method is passive, which means there is almost no additional traffic will be generated during the program’s operation. Second, different from many existing methods, our method… More >

Share Link

WeChat scan