Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Survey of visual object tracking methods based on Transformer
Ziwen SUN, Lizhi QIAN, Chuandong YANG, Yibo GAO, Qingyang LU, Guanglin YUAN
Journal of Computer Applications    2024, 44 (5): 1644-1654.   DOI: 10.11772/j.issn.1001-9081.2023060796
Abstract331)   HTML0)    PDF (1615KB)(234)       Save

Visual object tracking is one of the important tasks in computer vision, in order to achieve high-performance object tracking, a large number of object tracking methods have been proposed in recent years. Among them, Transformer-based object tracking methods become a hot topic in the field of visual object tracking due to their ability to perform global modeling and capture contextual information. Firstly, existing Transformer-based visual object tracking methods were classified based on their network structures, an overview of the underlying principles and key techniques for model improvement were expounded, and the advantages and disadvantages of different network structures were also summarized. Then, the experimental results of the Transformer-based visual object tracking methods on public datasets were compared to analyze the impact of network structure on performance. in which MixViT-L (ConvMAE) achieved tracking success rates of 73.3% and 86.1% on LaSOT and TrackingNet, respectively, proving that the object tracking methods based on pure Transformer two-stage architecture have better performance and broader development prospects. Finally, the limitations of these methods, such as complex network structure, large number of parameters, high training requirements, and difficulty in deploying on edge devices, were summarized, and the future research focus was outlooked, by combining model compression, self-supervised learning, and Transformer interpretability analysis, more kinds of feasible solutions for Transformer-based visual target tracking could be presented.

Table and Figures | Reference | Related Articles | Metrics
User granularity-level personalized social text generation model
Yongbing GAO, Juntian GAO, Rong MA, Lidong YANG
Journal of Computer Applications    2023, 43 (4): 1021-1028.   DOI: 10.11772/j.issn.1001-9081.2022030460
Abstract303)   HTML24)    PDF (2546KB)(150)       Save

In the field of open social text, the generated text content lacks personalized features. In order to solve the problem, a user-level fine-grained control generation model was proposed, namely PTG-GPT2-Chinese (Personalized Text Generation Generative Pre-trained Transformer 2-Chinese). In the proposed model, on the basis of the GPT2 (Generative Pre-trained Transformer 2.0) structure, an Encoder-Decoder model framework was designed. First, the static personalized information of a user was modeled and encoded on the Encoder side, a bidirectional independent attention module was added on the Decoder side to receive the static personalized feature vector, and the attention module in the original GPT2 structure was used for capturing the dynamic personalized features in the user’s text. Then, the scores of different attention modules were weighted and fused dynamically, and were participated in the subsequent decoding, thereby automatically generating social text constrained by the user’s personalized feature attributes. However, the semantic sparsity of the user’s basic information may cause conflicts between the generated text and some personalized features. Aiming at this problem, the BERT (Bidirectional Encoder Representations from Transformers) model was used to perform the secondary enhanced generation of consistent understanding between the output data of the Decoder side and the user’s personalized features, and finally the personalized social text generation was realized. Experimental results show that compared with the GPT2 model, the proposed model has the fluency improved by 0.36% to 0.72%, and on the basis of no loss of language fluency, the secondary generation makes the two evaluation indicators: personalization and consistency increase by 10.27% and 13.24% respectively. It is proved that the proposed model can assist user’s creation effectively and generate social text that is fluent and personalized for the user.

Table and Figures | Reference | Related Articles | Metrics
Trajectory prediction of sea targets based on geodetic distance similarity calculation
Yijian ZHAO, Li LIN, Qianqian WANG, Peng WEN, Dong YANG
Journal of Computer Applications    2023, 43 (11): 3594-3598.   DOI: 10.11772/j.issn.1001-9081.2022101639
Abstract154)   HTML0)    PDF (1803KB)(138)       Save

The existing similarity-based moving target trajectory prediction algorithms are generally classified according to the spatial-temporal characteristics of the data, and the characteristics of the algorithms themselves cannot be reflected. Therefore, a classification method based on algorithm characteristics was proposed. The calculation of the distances between two points is required for the trajectory similarity algorithms to carry out the subsequent calculations, however, the commonly used Euclidean Distance (ED) is only applicable to the problem of moving targets in a small region. A method of similarity calculation using geodetic distance instead of ED was proposed for the trajectory prediction of sea targets moving in a large region. Firstly, the trajectory data were preprocessed and segmented. Then, the discrete Fréchet Distance (FD) was adopted as similarity measure. Finally, synthetic and real data were used to test. Experimental results indicate that when sea targets move in a large region, the ED-based algorithm may gain incorrect prediction results, while the geodetic distance-based algorithm can output correct trajectory prediction.

Table and Figures | Reference | Related Articles | Metrics
Few-shot segmentation method for multi-modal magnetic resonance images of brain tumor
DONG Yang, PAN Haiwei, CUI Qianna, BIAN Xiaofei, TENG Teng, WANG Bangju
Journal of Computer Applications    2021, 41 (4): 1049-1054.   DOI: 10.11772/j.issn.1001-9081.2020081388
Abstract597)      PDF (1162KB)(998)       Save
Brain tumor Magnetic Resonance Imaging(MRI) has problems such as multi-modality, lacking of training data, class imbalance, and large differences between private databases, which lead to difficulties in segmentation. In order to solve these problems, the few-shot segmentation method was introduced, and a Prototype network based on U-net(PU-net) was proposed to segment brain tumor Magnetic Resonance(MR) images. First, the U-net structure was modified to extract the features of various tumors, which was used to calculate the prototypes. Then, on the basis of the prototype network, the prototypes were used to classify the spatial locations pixel by pixel, so as to obtain the probability maps and segmentation results of various tumor regions. Aiming at the problem of class imbalance, the adaptive weighted cross-entropy loss function was used to reduce the influence of the background class on loss calculation. Finally, the prototype verification mechanism was added, which means the probability maps obtained by segmentation were fused with the query image to verify the prototypes. The proposed method was tested on the public dataset BraTS2018, and the obtained results were as following:the average Dice coefficient of 0.654, the positive prediction rate of 0.662, the sensitivity of 0.687, the Hausdorff distance of 3.858, and the mean Intersection Over Union(mIOU) reached 61.4%. Compared with Prototype Alignment Network(PANet) and Attention-based Multi-Context Guiding Network(A-MCG), all indicators of the proposed method were improved. The results show that the introduction of the few-shot segmentation method has a good effect on brain tumor MR image segmentation, and the adaptive weighted cross-entropy loss function is also helpful, which can play an effective auxiliary role in the diagnosis and treatment of brain tumors.
Reference | Related Articles | Metrics
Mining multiple sequential patterns with gap constraints
WANG Huadong YANG Jie LI Yajuan
Journal of Computer Applications    2014, 34 (9): 2612-2616.   DOI: 10.11772/j.issn.1001-9081.2014.09.2612
Abstract246)      PDF (913KB)(515)       Save

For the given multiple sequences, a certain threshold and the gap constraints, the study objective is to discover frequent patterns whose supports in multiple sequences are no less than the given threshold value, where any two successive elements of pattern fulfill the user-specified gap constraints, and any two occurrences of a pattern in a given sequence meet the one-off condition. To solve this problem, the existing algorithms only consider the first occurrence of each character of a pattern when they compute the support of a pattern in a given sequence, so that many frequent patterns are not mined. An efficient mining algorithm of multiple sequential patterns with gap constraints, named MMSP, was proposed. Firstly, it stored the candidate positions of a pattern using two-dimensional table, then it selected the position from the candidate positions according to the left-most strategy. The experiments were conducted on DNA sequences. The number of frequent patterns mined by MMSP was 3.23 times of that mined by the related algorithm named M-OneOffMine when the number of multiple sequence elements is constant and the sequence length changes, and the average number of mining patterns by MMSP was 4.11 times of that mined by M-OneOffMine when the number of multiple sequence elements changes. The average number of mined patterns by MMSP was 2.21 and 5.24 times of that mined by M-OneOffMine and MPP respectively when the number of multiple sequence elements changes, and the frequent patterns mined by M-OneOffMine was a subset of MMSP. The experimental results show that MMSP can mine more frequent patterns with shorter time, and it is more suitable for practical applications.

Reference | Related Articles | Metrics
Adaptively-chosen ciphertext secure and publicly verifiable encryption scheme
DU Weidong YANG Xiaoyuan ZHANG Xianghuo WANG Xu'an
Journal of Computer Applications    2013, 33 (04): 1051-1054.   DOI: 10.3724/SP.J.1087.2013.01051
Abstract632)      PDF (648KB)(558)       Save
There is a great demand for publicly verifiable encryption in key escrow, optimistic fair exchange, publicly verifiable secret sharing and secure multiparty computation, but the current schemes are either chosen plaintext secure or chosen ciphertext secure in the random oracle model, which obviously are not secure enough to be applied in the complicated circumstances. Based on the analysis of the current schemes and application of the reality, this paper proposed a new publicly verifiable encryption scheme by combining the CS encryption scheme with the non-interactive zero knowledge proof protocol. The new scheme enabled any third party other than the sender and receiver to verify the validity of the ciphertext, but leaked no information about the message. Finally, without using the random oracle, the adaptively chosen ciphertext security of the scheme is proved in the standard model.
Reference | Related Articles | Metrics
Dependence relationships-based change probability metric: an experimental analysis
XUE Chao-dong YANG Yi-biao ZHOU Yu-ming
Journal of Computer Applications    2012, 32 (07): 2041-2043.   DOI: 10.3724/SP.J.1087.2012.02041
Abstract928)      PDF (584KB)(540)       Save
It is essential for software development and maintenance to predict which modules are change-prone in an Object-Oriented (OO) software system. In this paper, a light-weight approach was developed to compute the change probability metric by leveraging the dependence relationships between classes in a system. Then, based on Logistic regression model, an experimental analysis was conducted using Eclipse 2.0. The experimental results indicate that, on one hand, the proposed change probability metric captures different information from traditional OO metrics. On the other hand, when being used with traditional OO metrics together, the proposed change probability metric can significantly improve the accuracy for predicting the change-prone classes.
Reference | Related Articles | Metrics
Smart rail transportation-in-depth sensing and perceiving
CHEN Xiang-dong YANG Bin
Journal of Computer Applications    2012, 32 (05): 1196-1198.  
Abstract1634)      PDF (1748KB)(967)       Save
Smart Rail Transportation (SRT) is a new concept in rail transportation industry and poses technical challenges for the academic circle as well as the industry. It involves "in-depth sensibility and perceptibility", "extensive interconnectivity and interoperability among human beings, computers, and physical objects", and "premier intelligent data processing" to aim at SRT. Having analyzed the development trend pertinent to in-depth sensing and perceiving in SRT, this paper provided a comprehensive discussion on the requirements of relevant techniques, characterized by "sharpness", "swiftness", "reliability", "high-efficiency", "completeness", and "intelligence" in SRT.
Reference | Related Articles | Metrics
Survey on emerging pattern based contrast mining and applications
DUAN Lei TANG Chang-jie Guozhu DONG YANG Ning GOU Chi
Journal of Computer Applications    2012, 32 (02): 304-308.   DOI: 10.3724/SP.J.1087.2012.00304
Abstract1336)      PDF (945KB)(611)       Save
Contrast mining is one of fairly new hot data mining topics. Contrast mining focuses on knowledge that describes differences between classes and conditions, or describes changes over time. Contrast mining aims at developing techniques to discover patterns or models that contrast, and characterize multiple datasets associated with different classes or conditions. Contrast mining has wide applications in reality, due to its ability of simplifying problems and classifying accurately. Research on the mining and application of emerging patterns represents a major direction of contrast mining. This paper provided a survey of such issue. More specifically, after introducing the background, basic concepts and principles of emerging patterns, the paper analyzed the mining methods of emerging patterns, discussed extended definitions of emerging patterns and their mining, stated methods for constructing emerging pattern based classifiers, and illustrated applications of emerging pattern in several real-world fields. Finally, this paper gave out some topics for future research on emerging pattern based contrast mining.
Reference | Related Articles | Metrics
ID-based bidirectional threshold proxy re-signature
Yu-lei ZHANG Xiao-dong YANG Cai-fen WANG
Journal of Computer Applications    2011, 31 (01): 127-128.  
Abstract1154)      PDF (446KB)(1166)       Save
Based on Shao et al’s ID-based proxy re-signature, an ID-based bidirectional threshold proxy re-signature scheme in the standard model is presented in this paper. Our scheme eliminates the cost of restoring and managing certificates, and solves the difficult problem of excessive rights of the proxy in the proxy re-signature shceme. The scheme can tolerate t
Related Articles | Metrics
A new color difference formula in RGB color space
Yong WANG ZhenDong Yang ChengDao Wang
Journal of Computer Applications   
Abstract1580)      PDF (456KB)(1138)       Save
Based on the study of RGB (red-green-blue) color space and the comparison and analysis of several color difference formulas in RGB color space, this paper summarized three rules of color difference in RGB color space and proposed the conception of the importance of the color component. A new color difference formula in RGB color space was achieved by dynamically adjusting the vector distance and angular between a pair of RGB colors. The dynamic coefficient was weighted by the importance of color component. Color quantization experiment of highly complex color images demonstrates that this new color difference formula's performance is better than those widely used color difference formulas in RGB color space.
Related Articles | Metrics
Certificateless public key signature scheme without pairing
Hui-ge WANG Cai-fen WANG Yong-bin LI Xiao-dong YANG
Journal of Computer Applications   
Abstract1537)      PDF (523KB)(1006)       Save
The existing certificateless public key signature schemes are based on elliptic curve or Tate pairing. The proposed scheme was certificateless public signature scheme without pairing. New scheme was proved to be unforgery under random oracle model. New scheme avoids the using of certificate in certificate-based public key signature scheme, removes key escrow in ID-based signature scheme, needs simpler algorithm, and is convenient to practical application.
Related Articles | Metrics
Intrusion detection model for RFID system based on immune network
Jian-Hua GUO Hai-Dong YANG Fei-Qi DENG
Journal of Computer Applications   
Abstract1857)      PDF (743KB)(1342)       Save
It is very hard to develop encryption technology used in cheap Radio Frequency Identification (RFID) tags. In this paper, intrusion detection, as a new methodology, was adopted to create security model for RFID system. By analyzing typical security attacks on RFID systems, and based on artificial immune network, a solution to extract intrusion characteristics and to identify intrusion was proposed. A self-adaptive intrusion detection model for RFID system was designed. The model can enhance the defense capabilities of RFID systems by cooperating with encryption technology, but has no need to amend the technical standards of RFID. Stimulation results prove that the mistake rate and miss rate of the model are fairly low.
Related Articles | Metrics