Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Robust multi-view subspace clustering based on consistency graph learning
Zhenjun PAN, Cheng LIANG, Huaxiang ZHANG
Journal of Computer Applications    2021, 41 (12): 3438-3446.   DOI: 10.11772/j.issn.1001-9081.2021061056
Abstract373)   HTML14)    PDF (781KB)(139)       Save

Concerning that the multi-view data analysis is susceptible to the noise of the original dataset and requires additional steps to calculate the clustering results, a Robust Multi-view subspace clustering based on Consistency Graph Learning (RMCGL) algorithm was proposed. Firstly, the potential robust representation of data in the subspace was learned in each view, and the similarity matrix of each view was obtained based on these representations. Then, a unified similarity graph was learned based on the obtained multiple similarity matrices. Finally, by adding rank constraints to the Laplacian matrix corresponding to the similarity graph, the obtained similarity graph had the optimal clustering structure, and the final clustering results were able to be obtained directly by using this similarity graph. The process was completed in a unified optimization framework, in which potential robust representations, similarity matrices and consistency graphs could be learned simultaneously. The clustering Accuracy (ACC) of RMCGL algorithm is 3.36 percentage points, 5.82 percentage points and 5.71 percentage points higher than that of Graph-based Multi-view Clustering (GMC) algorithm on BBC, 100leaves and MSRC datasets, respectively. Experimental results show that the proposed algorithm has a good clustering effect.

Table and Figures | Reference | Related Articles | Metrics
Dynamic resource management mechanism of debris resources in cloud computing
WANG Xiaoyu CHENG Lianglun
Journal of Computer Applications    2014, 34 (4): 999-1004.   DOI: 10.11772/j.issn.1001-9081.2014.04.0999
Abstract538)      PDF (1109KB)(370)       Save

Concerning the problems that resources specifications and services required by users were not entirely consistent and the full resources were cut into debrises in the process of resource reservation in cloud computing environment, a dynamic resources management strategy considering the reuse of debris resources was put forward. The causes of debris resources were studied to construct debris resource pools, and the metric was made to measure how many tasks the debris resource could receive. While taking full account of the current task for resource discovery, scheduling, matching, the resource partitioning was further discussed by task scheduling, and the influence of the receiving capacity of subsequent tasks of resources debris was indicated. Finally, a dynamic resource debris scheduling model was built. The theoretical analysis and Cloudsim simulation results prove that, the resource management strategy can achieve resource optimization and reorganization of resources debris effectively. The strategy can not only improve the resources reception capability for subsequent tasks but ensure high resource utilization.

Reference | Related Articles | Metrics
Algorithm of generating multi-resolution curves for progressive transmission over the Internet
CAO Zhenzhou LI Manchun CHENG Liang CHEN Zhenjie
Journal of Computer Applications    2013, 33 (03): 688-690.   DOI: 10.3724/SP.J.1087.2013.00688
Abstract884)      PDF (621KB)(420)       Save
Concerning the problems of high time complexity and topological inconsistency existing in the multi-resolution representation of curve for progressive transmission, an algorithm of generating multi-resolution curves for progressive transmission over the Internet was proposed in this paper. By using pre-stored vertex deviation to simplify curves and using an optimized monotone chain intersection algorithm to maintain topological consistency, the algorithm can quickly generate topologically consistent multi-resolution curves. The algorithm was used in the experiment of progressive transmission for curve data, and the experimental results show that the multi-resolution curve data maintain topological consistency and the generation time changes linearly with the amount of data. The effectiveness of the algorithm has been verified in the experiment.
Reference | Related Articles | Metrics
Track prediction of vessel in controlled waterway based on improved Kalman filter
ZHAO Shuai-bing TANG Cheng LIANG Shan WANG De-jun
Journal of Computer Applications    2012, 32 (11): 3247-3250.   DOI: 10.3724/SP.J.1087.2012.03247
Abstract1015)      PDF (605KB)(530)       Save
Due to the lack of information of Automatic Identification System (AIS) equipment, the location of a vessel cannot be accurately judged by intelligent supporting command system based on AIS. It is difficult to accurately issue the traffic signal from it. Meanwhile, due to the narrow and winding features in controlled waterway, it is difficult for traditional Kalman filter to accurately predict track of moving vessel. In this situation, the real-time estimation of system noise in Kalman filter algorithm was proposed to increase the accuracy of track prediction of moving vessel. Simulation analysis was carried out on the tracking effect of the traditional Kalman filter and improved Kalman filter. The results indicate that the proposed algorithm can solve the lack in information of AIS equipment, and accurately predict the location of a vessel. The accuracy and the reliability of intelligence supporting command system can be ensured in controlled waterway.
Reference | Related Articles | Metrics
Efficient key management protocol based on matrix space
ZHANG Cai-xia CHENG Liang-lun WANG Xiang-dong
Journal of Computer Applications    2012, 32 (06): 1605-1608.   DOI: 10.3724/SP.J.1087.2012.01605
Abstract1051)      PDF (662KB)(427)       Save
Related Articles | Metrics
Priority-based service differentiation and rate control strategy
LIU Hong-tao CHENG Liang-lun
Journal of Computer Applications    2011, 31 (06): 1458-1460.   DOI: 10.3724/SP.J.1087.2011.01458
Abstract1605)      PDF (478KB)(725)       Save
To support Quality of Service (QoS) requirements for different kinds of network in medium and high rate wireless sensor networks, a priority-based service differentiation and rate control strategy was proposed. The strategy gives high priority to the traffic with strong real-time and reliability requirement for service differentiation, calculates the rate difference using the factor ε, and adjusts the sending rate of its upstream node by using hop-by-hop method. The simulation results show the proposed strategy can guarantee high-priority real-time traffic with high throughput and low latency, and maintain the stability of the network throughput.
Related Articles | Metrics
Vector quantization based on the dynamic threshold of speaker recognition
Ming Kang Cheng Liang Wang
Journal of Computer Applications   
Abstract1798)      PDF (432KB)(674)       Save
Code splitting threshold is one of the important factors to initialize codebook in Speaker Recognition based on the Vector Quantitation (VQ), but traditional threshold is not easy to determine and needs a large number of experiments to determine the value. This paper used dynamic and random method to select the threshold in a certain range, and combined with differential cepstrum thresholds to establish speaker recognition model. The results show that given the method improves the recognition rate, the training time and the recognition time have improved significantly.
Related Articles | Metrics
Design and implementation of the SmartPhone based remote home surveillance system
WANG Ning,HUANG Zhang-qin,CHENG Liang,HOU Yi-bin
Journal of Computer Applications    2005, 25 (09): 2212-2213.   DOI: 10.3724/SP.J.1087.2005.02212
Abstract1160)      PDF (182KB)(1202)       Save
A 2.5G SmartPhone based Remote Home Surveillance System was presented,and the system structure and design principles were described.Based on the analysis of current GPRS bandwidth and SmartPhone’s computing power,an MJPEG based surveillance scheme and the design of related transfer/control protocol were introduced. The realization and analysis of proto type system was presented at the end of the paper.
Related Articles | Metrics
Transition mechanisms deployed in wireless network
LI Zhen-jun, LU Yun-ting, CHENG Liang-yu
Journal of Computer Applications    2005, 25 (01): 188-191.   DOI: 10.3724/SP.J.1087.2005.0188
Abstract1014)      PDF (221KB)(1246)       Save

The mobile communication nodes require large numbers of IP address as they need to be always online. It’s a long period to deploy IPv6. During this period, the address transition mechanism is required to adapt itself to any situations in the present network, but the actual conversion mechanisms are all out of it. An all-purpose address transition mechanism used in the IP interim based on communications principle in wireless network was introduced. The mechanism was applied to wireless network.

Related Articles | Metrics