The existing image captioning methods only focus on the grid spatial location features without enough grid feature interaction and full use of image global features. To generate higher-quality image captions, a global image captioning method based on Graph ATtention network (GAT) was proposed. Firstly, a multi-layer Convolutional Neural Network (CNN) was utilized for visual encoding, extracting the grid features and entire image features of the given image and building a grid feature interaction graph. Then, by using GAT, the feature extraction problem was transformed into a node classification problem, including a global node and many local nodes, and the global and local features were able to be fully utilized after updating the optimization. Finally, through the Transformer-based decoding module, the improved visual features were adopted to realize image captioning. Experimental results on the Microsoft COCO dataset demonstrated that the proposed method effectively captured the global and local features of the image, achieving 133.1% in CIDEr (Consensus-based Image Description Evaluation) metric. It can be seen that the proposed image captioning method is effective in improving the accuracy of image captioning, thus allowing processing tasks such as classification, retrieval, and analysis of images by words.
To solve the problem that the direct use of high-dimensional, high-frequency, noise-containing real-world data to perform data processing leads to unreliable estimators, a data uncertainty quantification method based on Generative Adversarial Network (GAN) was proposed. Firstly, the original data distribution was reconstructed by GAN to construct a mapping distribution from the noise space to the space of the original data. Secondly, the samples were extracted by Markov Chain Monte Carlo (MCMC) method to obtain new samples based on the original data distribution. Thirdly, confidence intervals for the uncertainty of the samples were defined based on the specified functions. Finally, the confidence intervals were used to estimate the uncertainty of the original data, and within the data the confidence intervals was selected as the data used by the estimator. Experimental results show that 50% fewer samples are required to train the estimator to reach the upper limit by using the data within the confidence intervals compared to the samples required by using the original data. At the same time, compared to the original data, the data within the confidence intervals requires 30% fewer samples on average to achieve the same test accuracy.
With the continuous increment of data and system size, network communication becomes a performance bottleneck of key-value storage systems. Meanwhile, Remote Direct Memory Access (RDMA) technique can support high bandwidth, low latency data transmission, which provides a new idea for designing key-value storage systems. Based on RDMA technique in the high performance network, a key-value storage system named Chequer with high performance and low CPU overhead was designed and implemented. By combining the characteristics of RDMA primitives, the basic operation workflow of key-value storage system was redesigned. And a linear probing based shared hash table was designed to reduce the number of client reading rounds by solving the problem of client cache invalidation as well as increasing the hash hit rate, which can further improve the performance of the system. The Chequer system was implemented on the small-scale cluster, and its performance was demonstrated by experiments.
An efficient multisignature scheme was proposed, whose security is tightly related to the hardness of the Dicisional DiffieHellman problem (DDHP) in the random oracle model. Under the Proof-Of-Possession (POP) key registration assumption, the scheme was proved unforgeable against the adaptive chosen message and signing groups attacks. Both the size of multi-signature and the computation cost of verification do not increase with the increase of the signers. Compared with the Computational Diffie-Hellman Problem (CDHP)-based scheme with tight security reduction proposed by Z C WANG, the scheme has the merits of fewer communication rounds and less computation cost. Thus it can be used in many electronic transactions.