Volume 19,Issue 11,2008 Table of Contents

  • Display Type:
  • Text List
  • Abstract List
  • 1  Discriminative Semi-Supervised Clustering Analysis with Pairwise Constraints
    YIN Xue-Song HU En-Liang CHEN Song-Can
    2008, 19(11):2791-2802.
    [Abstract](8366) [HTML](0) [PDF 391.28 K](11745)
    Abstract:
    Most existing semi-supervised clustering algorithms with pairwise constraints neither solve the problem of violation of pairwise constraints effectively, nor handle the high-dimensional data simultaneously. This paper presents a discriminative semi-supervised clustering analysis algorithm with pairwise constraints, called DSCA, which effectively utilizes supervised information to integrate dimensionality reduction and clustering. The proposed algorithm projects the data onto a low-dimensional manifold, where pairwise constraints based K-means algorithm is simultaneously used to cluster the data. Meanwhile, pairwise constraints based K-means algorithm presented in this paper reduces the computational complexity of constraints based semi-supervised algorithm and resolve the problem of violating pairwise constraints in the existing semi-supervised clustering algorithms. Experimental results on real-world datasets demonstrate that the proposed algorithm can effectively deal with high-dimensional data and provide an appealing clustering performance compared with the state-of-the-art semi-supervised algorithm.
    2  Semi-Supervised Clustering Based on Affinity Propagation Algorithm
    XIAO Yu YU Jian
    2008, 19(11):2803-2813.
    [Abstract](9499) [HTML](0) [PDF 319.20 K](19695)
    Abstract:
    A semi-supervised clustering method based on affinity propagation (AP) algorithm is proposed in this paper. AP takes as input measures of similarity between pairs of data points. AP is an efficient and fast clustering algorithm for large dataset compared with the existing clustering algorithms, such as K-center clustering. But for the datasets with complex cluster structures, it cannot produce good clustering results. It can improve the clustering performance of AP by using the priori known labeled data or pairwise constraints to adjust the similarity matrix. Experimental results show that such method indeed reaches its goal for complex datasets, and this method outperforms the comparative methods when there are a large number of pairwise constraints.
    3  Semi-Supervised K-Means Clustering Algorithm for Multi-Type Relational Data
    GAO Ying LIU Da-You QI Hong LIU He
    2008, 19(11):2814-2821.
    [Abstract](7691) [HTML](0) [PDF 360.81 K](10839)
    Abstract:
    A semi-supervised K-means clustering algorithm for multi-type relational data is proposed, which extends traditional K-means clustering by new methods of selecting initial clusters and similarity measures, so that it can semi-supervise cluster multi-type relational data. In order to achieve high performance, in the algorithm, besides attribute information, both labeled data and relationship information are employed. Experimental results on Movie database show the effectiveness of this method.
    4  Semi-Supervised Canonical Correlation Analysis Algorithm
    PENG Yan ZHANG Dao-Qiang
    2008, 19(11):2822-2832.
    [Abstract](11281) [HTML](0) [PDF 359.80 K](16467)
    Abstract:
    In this paper, a semi-supervised canonical correlation analysis algorithm called Semi-CCA is developed, which uses supervision information in the form of pair-wise constraints in canonical correlation analysis (CCA). In this setting, besides abundant unlabeled data examples, the domain knowledge in the form of pair-wise constraints which specify whether a pair of data examples belongs to the same class (must-link constraints) or not (cannot-link constraints) is also available. Meanwhile, the relative importance of must-link constraints and cannot-link constraints is validated. Experimental results on the artificial dataset, multiple feature database and facial database including Yale and AR show that the proposed Semi-CCA can effectively enhance the classifier performance by using only a small amount of supervision information.
    5  Local and Global Preserving Based Semi-Supervised Dimensionality Reduction Method
    WEI Jia PENG Hong
    2008, 19(11):2833-2842.
    [Abstract](9156) [HTML](0) [PDF 347.81 K](10894)
    Abstract:
    In many machine learning and data mining tasks, it can't achieve the best semi-supervised learning result if only use side-information. So, a local and global preserving based semi-supervised dimensionality reduction (LGSSDR) method is proposed in this paper. LGSSDR algorithm can not only preserve the positive and negative constraints but also preserve the local and global structure of the whole data manifold in the low dimensional embedding subspace. Besides, the algorithm can compute the transformation matrix and handle unseen samples easily. Experimental results on several datasets demonstrate the effectiveness of this method.
    6  Graph-Based Semi-Supervised Relation Extraction
    CHEN Jin-Xiu JI Dong-Hong
    2008, 19(11):2843-2852.
    [Abstract](9189) [HTML](0) [PDF 314.11 K](13813)
    Abstract:
    This paper investigates a graph-based semi-supervised learning algorithm, that is, label propagation algorithm for relation extraction. Labeled and unlabeled examples are represented as the nodes, and their distances as the weights of edges in the graph. The relation extraction tries to obtain a labeling function on this graph to satisfy the global consistency assumption. Experimental results on the ACE (automatic content extraction) corpus showed that this method achieves a better performance than SVM (support vector machine) when only very few labeled examples are available, and it also performs better than bootstrapping for the relation extraction task.
    7  Transductive Multi-Modality Video Semantic Concept Detection with Tensor Representation
    WU Fei LIU Ya-Nan ZHUANG Yue-Ting
    2008, 19(11):2853-2868.
    [Abstract](7925) [HTML](0) [PDF 540.93 K](11126)
    Abstract:
    A higher-order tensor framework for video analysis and understanding is proposed in this paper. In this framework, image frame, audio and text are represented, which are the three modalities in video shots as data points by the 3rd-order tensor. Then a subspace embedding and dimension reduction method is proposed, which explicitly considers the manifold structure of the tensor space from temporal-sequenced associated co-occurring multimodal media data in video. It is called TensorShot approach. Transductive learning uses a large amount of unlabeled data together with the labeled data to build better classifiers. A transductive support tensor machines algorithm is proposed to train effective classifier. This algorithm preserves the intrinsic structure of the submanifold where tensorshots are sampled, and is also able to map out-of-sample data points directly. Moreover, the utilization of unlabeled data improves classification ability. Experimental results show that this method improves the performance of video semantic concept detection.
    8  Optimal Action Criterion and Algorithm Improvement of Real-Time Dynamic Programming
    FAN Chang-Jie CHEN Xiao-Ping
    2008, 19(11):2869-2878.
    [Abstract](4295) [HTML](0) [PDF 297.10 K](7831)
    Abstract:
    This paper is primarily to improve the efficiency of real-time dynamic programming (RTDP) algorithm for solving Markov decision problems. Several typical convergence criteria are compared and analyzed. A criterion called optimal action criterion and a corresponding branch strategy are proposed on the basis of the upper and lower bound theory. This criterion guarantees that the agent can act earlier in a real-time decision process while an optimal policy with sufficient precision still remains. It can be proved that under certain conditions one can obtain an optimal policy with arbitrary precision by using such an incremental method. With these new techniques, a bounded incremental real-time dynamic programming (BI-RTDP) algorithm is designed. In the experiments of two typical real-time simulation systems, BI-RTDP outperforms the other state-of-the-art RTDP algorithms tested.
    9  Improved Parameterized Algorithm for P2-Packing Problem
    WANG Jian-Xin NING Dan FENG Qi-Long CHEN Jian-Er
    2008, 19(11):2879-2886.
    [Abstract](4230) [HTML](0) [PDF 324.90 K](5808)
    Abstract:
    P2-Packing is a typical NP-hard problem. This paper provides a further study on the structures of the P2-packing problem, and proposes a kernelization algorithm that can obtain a kernel of size at most 7k, which greatly reduces the current best kernel 15k. Based on the kernelization algorithm, an improved parameterized algorithm with running time O*(24.142k) is also presented, which greatly improves the current best result O*(25.301k).
    10  Algorithm of Shielding Noises in Information Filtering Based on Distribution of Two-Dimension Similarity Relation
    HONG Yu ZHANG Yu ZHENG Wei LIU Ting LI Sheng
    2008, 19(11):2887-2898.
    [Abstract](3486) [HTML](0) [PDF 549.37 K](5885)
    Abstract:
    This paper investigates the reasons for generation of noises in feedbacks of filtering system by analyzing the knowledge expressions and text structures, and builds a two-dimension similarity (DTS) model of information based on the opposed relation between the noises and user profiles. At the same time, by using the algorithm of AdaBoost based on the LMS (least mean square) classifier, this paper builds a classification curve between the noises and related information according to their distribution in two-dimension similarity space, which helps information filtering system detect and filter the noises in feedback. Experiments validated this algorithm substantially improved the capability of filtering system to rule out the noises.
    11  Leader-Based Parallel Cross Entropy Algorithm for Maximum Clique Problem
    Lü Qiang BAI Zhan-Hua XIA Xiao-Yan
    2008, 19(11):2899-2907.
    [Abstract](4603) [HTML](0) [PDF 205.36 K](5782)
    Abstract:
    The Cross Entropy method is a new search strategy for combinatorial optimization problems. However, it usually needs considerable computational time to achieve good solution quality. This paper introduces a Cross Entropy algorithm for solving maximum clique problem (MCP). To make the Cross Entropy algorithm faster, this paper proposes a leader-based cooperative parallel strategy. Unlike the widely used coarse-grained parallel strategy, our method has a leader, who can move around the parallel processors and collect data actively, and several followers whose main job are simply to sample the cliques guided by the leader via transition matrix. To evaluate the performance of the algorithm, this paper implements the algorithm using OpenMPI on MIMD architecture, and applies it on the MCP benchmark problems. The speedup and efficiency are analyzed, and the results are compared with those obtained by four other best heuristic algorithms. The results show that the presented method has achieved good performance among those best population-based heuristics.
    12  Nonlinear Dimensionality Reduction for Data on Manifold with Rings
    MENG De-Yu GU Nan-Nan XU Zong-Ben LEUNG Yee
    2008, 19(11):2908-2920.
    [Abstract](4173) [HTML](0) [PDF 675.74 K](6221)
    Abstract:
    Isomap has attracted attentions recently due to its prominent performance on nonlinear dimensionality reduction. However, how to implement effective learning for data on manifold with rings is still a remaining problem. To solve this problem, a systemic strategy is presented in this study. Based on the intrinsic implementation principle of Isomap, a theorem is presented which gives a sufficient and necessary condition to judge whether a manifold is with rings. Besides, an algorithm for detecting ring structures in the manifold is constructed and a nonlinear dimensionality reduction strategy is developed through polar coordinates transformation. A series of simulation results implemented on a series of synthetic and real-world data sets generated by manifolds with or without rings verify the prominent performance of the new method.
    13  Enhancing Training Set for Face Detection Based on SVM
    WANG Rui-Ping CHEN Jie SHAN Shi-Guang CHEN Xi-Lin GAO Wen
    2008, 19(11):2921-2931.
    [Abstract](4212) [HTML](0) [PDF 448.47 K](6361)
    Abstract:
    According to support vector machines (SVMs), for those geometric approach based classification methods, examples close to the class boundary usually are more informative than others. Taking face detection as an example, this paper addresses the problem of enhancing given training set and presents a nonlinear method to tackle the problem effectively. Based on SVM and improved reduced set algorithm (IRS), the method generates new examples lying close to the face/non-face class boundary to enlarge the original dataset and hence improve its sample distribution. The new IRS algorithm has greatly improved the approximation performance of the original reduced set (RS) method by embedding a new distance metric called image Euclidean distance (IMED) into the kernel function. To verify the generalization capability of the proposed method, the enhanced dataset is used to train an AdaBoost-based face detector and test it on the MIT+CMU frontal face test set. The experimental results show that the original collected database can be enhanced effectively by the proposed method to learn a face detector with improved generalization performance.
    14  Corner Detection and Sub-Pixel Localization Based on Local Orientation Distribution
    WANG Zhi-Heng WU Fu-Chao WANG Xu-Guang
    2008, 19(11):2932-2942.
    [Abstract](4204) [HTML](0) [PDF 538.67 K](7672)
    Abstract:
    In this paper, an algorithm for corner detection and localization is proposed based on local orientation distribution (LOD). The algorithm consists of two steps: The first is to detect corners by using the absolute corner energy and the relative corner energy; Then, the detected corners are re-located to sub-pixel accuracy by fitting the intersection of orientation lines of support pixels by the least squares technique. Experimental results show that the LOD-based algorithm can not only provide a higher localization accuracy than most popular detectors, but also has a better performance in resisting noises.
    15  Immune Clonal Multi-Objective Optimization Algorithm for Constrained Optimization
    SHANG Rong-Hua JIAO Li-Cheng MA Wen-Ping
    2008, 19(11):2943-2956.
    [Abstract](4988) [HTML](0) [PDF 381.81 K](8941)
    Abstract:
    In this paper, the disadvantages of some existing algorithms in handling constrained objective problems (COPs) are analyzed and an algorithm used for COPs—immune clonal multi-objective optimization algorithm (ICMOA) is proposed. This algorithm treats constrained optimization as a multi-objective optimization with two objectives. One objective is the original objective function and the other is obtained by the constraints. The concept of the Pareto-dominance in multi-objective optimization is introduced and each individual is implemented clone, mutation, selection and other operations based on the degree of its Pareto-dominance. The clone operation implements the searching for optimal solution in the global region and is available for getting a high quality solution. The mutation operation improves the searching for optimal solution in the local region and assures the diversity of the solutions. The selection operation guarantees the convergence to the optimal solution and improves the convergence speed. Based on the theorem of Markov chain, the global convergence of the new algorithm is proved. Compared with the existing algorithms, simulation results on 13 benchmark test problems show that the new algorithm has some advantages in convergence speed and precision.
    16  Reinforcement Learning Model Based on Regret for Multi-Agent Conflict Games
    XIAO Zheng ZHANG Shi-Yong
    2008, 19(11):2957-2967.
    [Abstract](4284) [HTML](0) [PDF 397.94 K](8627)
    Abstract:
    For conflict game, a rational but conservative action selection method is investigated, namely, minimizing regret function in the worst case. By this method the loss incurred possibly in future is the lowest under this very policy, and Nash equilibrium mixed policy is obtained without information about other agents. Based on regret, a reinforcement learning model and its algorithm for conflict game under multi-agent complex environment are put forward. This model also builds agents' belief updating process on the concept of cross entropy distance, which further optimizes action selection policy for conflict games. Based on Markov repeated game model, this paper demonstrates the convergence property of this algorithm, and analyzes the relationship between belief and optimal policy. Additionally, compared with extended Q-learning algorithm under MMDP (multi-agent markov decision process), the proposed algorithm decreases the number of conflicts dramatically, enhances coordination among agents, improves system performance, and helps to maintain system stability.
    17  GMPL Logic of Kinds of Preferences
    ZHANG Zhi-Zheng GAO Zhi-Qiang XING Han-Cheng
    2008, 19(11):2968-2978.
    [Abstract](3888) [HTML](0) [PDF 286.63 K](5511)
    Abstract:
    Because of the absence of a whole logic to represent and reason various kinds of preferences, MPL (logic of many kinds of preference) is presently constructed to fill the gap. But, the semantics of MPL is based on the complete pre-order, so incomplete preferences cannot be expressed in it. In this paper, GMPL (a generalized edition of MPL) is introduced to supply the gap. In addition, the expressive power of GMPL is showed by rewriting several familiar logical preferences. Moreover, a decision procedure is introduced to reduce SAT problem of GMPL into that of propositional logic.
    18  Time Window Mechanism to Improve BGP Routing Convergence
    WANG Li-Jun WU Jian-Ping
    2008, 19(11):2979-2989.
    [Abstract](4908) [HTML](0) [PDF 309.56 K](9773)
    Abstract:
    In this paper, a time window mechanism based on the penalty value of route flap damping is designed to improve routing convergence. This mechanism judges the route stability in the network from BGP (border gateway protocol) routes correlation by observing multiple routes received from different peers jointly. Then BGP speaker can find instable routes earlier and makes stable routes get the chance to be selected earlier in route selection, thus curtail path exploration. Simulation results prove that with proper parameters this method can reduce convergence delay and communication overhead obviously. Furthermore, without addition information in BGP Update message, time window mechanism is a practical method to be deployed in the Internet.
    19  Countermeasure for Cryptographic Chips to Resist Side-Channel Attacks
    ZHANG Tao FAN Ming-Yu
    2008, 19(11):2990-2998.
    [Abstract](4159) [HTML](0) [PDF 293.59 K](8468)
    Abstract:
    As for different level side-channel leakages, a general side-channel leakage-tolerated model is proposed and a formal description is given by entropy theory. This model adopts (t,n) threshold leakage mechanism, and thus the security do not compromise with partial side-channel leakages. Based on the proposed model, a two-phase masking method is utilized to build leakage-tolerated Advanced Encryption Standard (AES-128). Compared with the conventional countermeasures, this method can resist higher-order side-channel attack and template attack simultaneously. The effectiveness of this method is verified by theoretical analysis and simulation.
    20  Group Mobility Model for Ad Hoc Networks
    PENG Hui SHEN Lin-Cheng BU Yan-Long WAN Lin
    2008, 19(11):2999-3010.
    [Abstract](4597) [HTML](0) [PDF 382.64 K](8638)
    Abstract:
    This paper makes a full-scale introduction to the advancement of research on group mobility model and analyses characteristics and the application range of different models. Most of the existing group mobility models exhibit certain drawbacks in describing the group movement behaviors. A Gibbs sampler based simulated annealing group mobility (GGM) model is proposed to address this deficiency. By simulation comparison with reference point group mobility (RPGM) model, this paper analyzes the impact of two models on Ad Hoc network protocol performance. Experimental results show that the proposed GGM model can describe three different behaviors of group movements effectively, which are group gathering, dispersion, and linear formation, by choosing Gibbs potential functions. The simulation also indicates that different group mobility models have different impact on the performance evaluation of ad hoc network protocol.
    21  Service Composition Based on Adaptable Revision of Multiple Service Case
    CHENG Rui-Xing YANG Fang-Chun SU Sen
    2008, 19(11):3011-3022.
    [Abstract](4152) [HTML](0) [PDF 363.33 K](5588)
    Abstract:
    In this paper, a hierarchical semantic service case is outlined, which supports overall description of functionality, behavior restraints and features. An adaptable similarity degree measurement is proposed to retrieve a service case which is more similar to the target case and easier to be revised if necessary. Moreover, a method based on the interaction ontology is presented to realize dynamically revising service case to support Web service composition. The method of Web service composition proposed in this paper is proved to be feasible and effective by examinations.
    22  Automatic Search Engine Performance Evaluation Based on User Behavior Analysis
    LIU Yi-Qun CEN Rong-Wei ZHANG Min RU Li-Yun MA Shao-Ping
    2008, 19(11):3023-3032.
    [Abstract](4672) [HTML](0) [PDF 293.92 K](11478)
    Abstract:
    With click-through data analysis, an automatic search engine performance evaluation method is proposed. This method generates navigational type query topics and answers automatically based on search users' querying and clicking behavior. Experimental results based on a commercial Chinese search engine's user logs show that the automatic method gets a similar evaluation result with the traditional assessor-based ones. This method can also provide timely evaluation results with little human efforts.
    23  Adaptive Beacon Exchange Algorithm in Geographic Routing for Mobile Wireless Sensor Networks
    ZHANG Heng-Yang LI Ying-Ying LIU Yun-Hui
    2008, 19(11):3033-3041.
    [Abstract](3731) [HTML](0) [PDF 331.75 K](6195)
    Abstract:
    To address the phenomenon of temporary communication blindness resulted from fixed period beacon exchange in mobile wireless sensor networks, an adaptive beacon exchange algorithm is proposed. The key idea is that work node calculates variable beacon period according to characteristic value relative to up node. idle node calculates variable beacon period according to characteristic value relative to its all neighbors.The threshold probability can be adjusted to meet the performance requirement of networks. Forwarding node removes the next hop from neighbors table if its overtime to wait for the feedback beacon. The simulation shows that the adaptive beacon exchange algorithm can acquire high reach rate for eliminating the phenomenon of temporary communication blindness, especially in work-node-sparse sceneries, with low consumption. So the algorithm is scalable and applicable to large-scale mobile wireless sensor networks.
    24  Cluster-Based Consistency Scheme of Cooperative Caching in Mobile Ad Hoc Networks
    XIE Gao-Gang LI Zhen-Yu CHEN Jia-Ning
    2008, 19(11):3042-3052.
    [Abstract](3616) [HTML](0) [PDF 269.66 K](6269)
    Abstract:
    Cooperative caching has been adequately addressed in MANETs for QoS and cooperative computing. This paper presents a Cluster-based Consistency Scheme, CCS. In CCS, the close nodes in locality are organized into a cluster, where a more stable and powerful node is selected as header in each cluster and the others are at most 2 hops away from the header as the members of the cluster. All header nodes form a ring with Chord as group management protocol. An updating tree is built dynamically on top of the Chord ring to propagate the updated data items. In this way, the updated data item is broadcasted within cluster at MAC layer and transmitted among the header nodes along the updating tree. The simulation results demonstrate CCS outperforms the Gossip scheme for consistency of cooperative caching with less workload, higher success rate and less updating time.
    25  Computing Lines Intersecting with Set of Line Segments and the Maximum Range
    WANG Jia-Ye YANG Cheng-Lei ZHANG Cai-Ming
    2008, 19(11):3053-3060.
    [Abstract](4061) [HTML](0) [PDF 212.55 K](6067)
    Abstract:
    For a given set S of line segments, finding a straight line intersecting with all the line segments in S is studied in this paper. If an intersection restriction is satisfied by the set, the algorithm presented is to answer whether there is a straight line intersecting with all the line segments in S. If the straight lines exist, the algorithm finds a maximum range, where every straight line located in the range intersects with all the line segments in S. The time complexity of the algorithm is O(n×log n). The algorithm can be used in pattern marching and so on.
    26  Automatic Polycube Construction and Parameterization
    LIN Jun-Cong JIN Xiao-Gang FAN Zheng-Wen LIU Sheng-Jun FENG Jie-Qing
    2008, 19(11):3061-3072.
    [Abstract](3597) [HTML](0) [PDF 557.76 K](6498)
    Abstract:
    An automatic Polycube construction and parameterization method is proposed in this paper. This approach first decomposes the input mesh into a set of feature regions. Each region is approximated by a simple Polycube which is further split into several patches. Since each patch corresponds to a rectangular sub-surface of the Polycube, they can be parameterized independently. A smoothing procedure between patches is performed to reduce the overall parametric distortion. This method makes Polycube parameterization more convenient in texture mapping and other applications.
    27  Focus+Context Technique for Interactive Visualization of Large Hierarchies
    REN Lei WANG Wei-Xin TENG Dong-Xing MA Cui-Xia DAI Guo-Zhong WANG Hong-An
    2008, 19(11):3073-3082.
    [Abstract](5736) [HTML](0) [PDF 595.89 K](7871)
    Abstract:
    A Focus+Context technique based on circle packing is presented for interactive visualization of large hierarchical data. First, a triangular mesh generating method based on externally tangent circles packing is proposed to establish context. Then a method for triangular mesh neighbors tracking is introduced. To realize the context consistency for Focus+Context technique, a layout method for the distorted brother nodes of the focus node is presented based on triangular mesh neighbors tracking, and a recursive method for the children nodes of the focus node is described. Experimental results show that this method can realize fisheye view and can achieve focus and context consistency. The method has been applied to the interactive visualization of file systems, and an interactive visualization tool is introduced.
    28  Extracting Realistic Textures from Reference Spheres
    ZHENG Zuo-Yong MA Li-Zhuang ZENG Zhou
    2008, 19(11):3083-3090.
    [Abstract](3709) [HTML](0) [PDF 322.82 K](6022)
    Abstract:
    A method for extracting realistic textures from real-world reference spheres is proposed in this paper. The BRDF (bidirectional reflectance distribution function) parameters of fundamental materials, as well as a material weight map for the sphere are obtained through a non-linear optimization process. The material weight map can be used as a conventional texture for relighting. With the BRDF models recovered, the rendered 3D objects can exhibit real and complex appearances with varying light direction/intensity, view point and surface orientations.

    Current Issue


    Volume , No.

    Table of Contents

    Archive

    Volume

    Issue

    联系方式
    • 《Journal of Software 》
    • 主办单位:Institute of Software, CAS, China
    • 邮编:100190
    • 电话:010-62562563
    • 电子邮箱:jos@iscas.ac.cn
    • 网址:https://www.jos.org.cn
    • 刊号:ISSN 1000-9825
    •           CN 11-2560/TP
    • 国内定价:70元
    You are the firstVisitors
    Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
    Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
    Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
    Technical Support:Beijing Qinyun Technology Development Co., Ltd.

    Beijing Public Network Security No. 11040202500063