Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Proximal smoothing iterative algorithm for magnetic resonance image reconstruction based on Moreau-envelope
LIU Xiaohui, LU Lijun, FENG Qianjin, CHEN Wufan
Journal of Computer Applications    2018, 38 (7): 2076-2082.   DOI: 10.11772/j.issn.1001-9081.2017122980
Abstract546)      PDF (1157KB)(300)       Save
To solve the problem of two non-smooth regularization terms in sparse reconstruction of Magnetic Resonance Imaging (MRI) based on Compressed Sensing (CS), a new Proximal Smoothing Iterative Algorithm (PSIA) based on Moreau-envelope was proposed. The classical sparse reconstruction for MRI based on CS is a problem of minimizing the objective function with a linear combination of three terms:the least square data fidelity term, the sparse regularization term of wavelet transform, and the Total Variation (TV) regularization term. Firstly, the proximal smoothing of the wavelet transform regularization term in the objective function was carried out. Then, the linear combination of the data fidelity term and the wavelet transform regularization term after smooth approximation was considered as a new convex function that could be continuously derived. Finally, PSIA was used to solve the new optimization problem. The proposed algorithm can not only cope with the two regularization constraints simultaneously in the optimization problem, but also avoid the algorithm robustness problem caused by fixed weights. The experimental results on simulated phantom images and real MR images show that, compared with four classical sparse reconstruction algorithms such as Conjugate Gradient (CG) decent algorithm, TV l1 Compressed MRI (TVCMRI) algorithm, Reconstruction From Partial k space algorithm (RecPF) and Fast Composite Smoothing Algorithm (FCSA), the proposed algorithm has better reconstruction results of image signal-to-noise ratio, relative error and structural similarity index, and its algorithm complexity is comparable to the existing fastest reconstruction algorithm FCSA.
Reference | Related Articles | Metrics
Parameters design and optimization of crosstalk cancellation system for two loudspeaker configuration
XU Chunlei LI Junfeng QIU Yuan XIA Risheng YAN Yonghong
Journal of Computer Applications    2014, 34 (5): 1503-1506.   DOI: 10.11772/j.issn.1001-9081.2014.05.1503
Abstract323)      PDF (747KB)(451)       Save

In three-dimensional sound reproduction with two speakers, Crosstalk Cancellation System (CCS) performance optimization often pay more attention to the effect independently by the factors such as inverse filter parameters design and loudspeaker configuration. A frequency-domain Least-Squares (LS) estimation approximation was proposed to use for the performance optimization. The relationship between these factors and their effect on CCS performance was evaluated systematically. To achieve the tradeoff of computing efficiency and system performance of crosstalk cancellation algorithm, this method obtained the optimization parameters. The effect of crosstalk cancellation was evaluated with Channel Separation (CS) and Performance Error (PE) index, and the simulation results indicate that these parameters can obtain good crosstalk cancellation effect.

Reference | Related Articles | Metrics
System-level test case generating method based on UML model
FENG Qiuyan
Journal of Computer Applications    2014, 34 (1): 276-280.   DOI: 10.11772/j.issn.1001-9081.2014.01.0276
Abstract562)      PDF (686KB)(676)       Save
With the software testing methods based on Unified Model Language (UML) models, use case diagrams and sequence diagrams were integrated for system testing. Firstly, three algorithms were proposed including the algorithm for generating Use case diagram Execution Graph (UEG), the algorithm for generating Sequence diagram Execution Graph (SEG) and the algorithm for generating System Testing Graph (STG) based on UEG and SEG. Then, the UEG, SEG and STG were traversed to generate test cases for system-level testing based on specified three-level criteria, mainly to detect interaction, scenario, use case and use case dependency faults. Finally, the experimental validation shows that the solution can do system-level software testing based on use case diagram and sequence diagram.
Related Articles | Metrics
Transient faults recovery and control on wireless tunnel construction monitoring systems
ZUO Ze-hua HUANG Xiong-feng QIN Yuan-qing ZHOU Chun-jie
Journal of Computer Applications    2012, 32 (05): 1443-1445.  
Abstract901)      PDF (1742KB)(566)       Save
Using the wireless monitoring technology in tunnel construction can reduce the network cabling and increase the system flexibility. But the complexity and variability of the tunnel construction environment and the instability of the sensor nodes' software and hardware often lead to the transient faults, even cause security accidents. Against the transient faults, in order to ensure the system functions, a multi-level transient fault recovery and control strategy was proposed, which dealt with the transient faults in four layers: the spot data monitoring layer, the data transport layer, the security protection layer and the emergency response layer. The simulation results indicate that the proposed strategy can improve the accuracy of hazard detection and the execution efficiency of commands execution, beneficial to ensure the safety of constructors.
Reference | Related Articles | Metrics
Research of digital time-stamping service in unreliable networks
CHANG Chao-wen CHEN Jun-feng QIN Xi
Journal of Computer Applications    2012, 32 (01): 60-65.   DOI: 10.3724/SP.J.1087.2012.00060
Abstract1044)      PDF (955KB)(640)       Save
The technology of Digital Time-Stamping (DTS) is widely used in digital signature, electronic commerce and patents and property right protection of various software and hardware. For some unreliable networks, of which the network situation is poor, the net speed changes greatly and the net links are usually intermittent, there is no necessary technological means to guarantee the normal and effective operation of DTS service. According to the characteristics of the unreliable networks, a new time-stamping scheme was proposed. In the scheme, it did not need to communicate with Time Stamp Authority (TSA) each time when a time-stamping service was required. The local trusted platform would offer the time-stamping service itself. A new DTS service protocol based on Trusted Platform Module (TPM) was also proposed under the circumstances of unreliable networks. The results of the security analysis of the protocol show that the protocol is secure and the time error in the protocol can be kept under control. The adaptability of the protocol for the unreliable network is excellent.
Reference | Related Articles | Metrics
Autonomous localization of mobile robot based on odometer and PTZ vision
NIU Guo-chen XU Ping FENG Qi
Journal of Computer Applications    2011, 31 (10): 2821-2824.   DOI: 10.3724/SP.J.1087.2011.02821
Abstract2065)      PDF (603KB)(569)       Save
To reduce the influence of cumulative odometer localization error, an autonomous localization approach for mobile robot based on odometer and Pan-Tilt-Zoom (PTZ) vision was presented. Interrupt S-shaped searching strategy was put forward, as well as a vision localization approach based on finite automaton. The position credibility models of odometer and PTZ vision were established according to their positioning error sources. A localization framework combining odometer and PTZ vision based on real-time position credibility was designed. An application experiment of vision localization and localization using odometer and PTZ vision was carried out. The validity and practicability of the method are confirmed.
Related Articles | Metrics
New proxy blind multi-signature scheme
Zhen-peng Hu Hai-feng Qian Zhi-bin Li
Journal of Computer Applications   
Abstract1811)            Save
With proxy multisignature, many original signers can delegate their signing power to a proxy signer in such a way that the proxy signer can sign any message on behalf of them. In blind signature, the signer cannot make a linkage between the blind signature and the identity of the requester. Therefore, they are easily applied in electronic commerce. Based on Schnorr signature scheme, a new proxy blind multisignature scheme was proposed. One proxy signer can generate a proxy blind multisignature on behalf of many original signers. This scheme satisfies the security properties of both the blind signature scheme and the proxy multisignature scheme. It has advantages such as low computation load, high efficiency and security, and that the length of signature does not increase when the new original signers join in.
Related Articles | Metrics
Research and design of location service architecture in migrating workflow system
Yu-Feng QIN Guang-Zhou ZENG
Journal of Computer Applications   
Abstract1856)      PDF (801KB)(1015)       Save
The services to Migrating Instance (MI) that a location can be offered were classified into MI services and workflow services at first, and then a service architecture based on multi-thread to support these two kinds of services was proposed in this paper. It not only helps to increase the services efficiency of the location server provided, but also makes it more extensible.
Related Articles | Metrics
Interaction technology with firewalls and intusion detection system
FENG Qing-yu
Journal of Computer Applications    2005, 25 (12): 2763-2764.  
Abstract1525)      PDF (399KB)(1230)       Save
Considering the demand of obtaining integrity and dynamics in network security,an interaction model with firewalls and IDSs(Intrusion Detection System) was implemented based on the ideal of distributed open platform of security.To strengthen the stop function of intrusion detection,the idea which interaction system making initiative recovery to paroxysmal network attack was presented,and the key technology of implementation was introduced.
Related Articles | Metrics
Two approaches of color image retrieval based on run-length description
HU En-liang,Feng Qiao-sheng,YANG Xiu-guo,LIN Yu-cai
Journal of Computer Applications    2005, 25 (02): 338-340.   DOI: 10.3724/SP.J.1087.2005.0338
Abstract1336)      PDF (150KB)(833)       Save

According to the conception of color run-length, a method of feature representation based on run-length matrix for color image was proposed,then two similarity criterions were given.In order to enhance the robusticity in feature representing,the cumulative transformation was defined for run-length matrix.After experimented for true images, the better achievement is obtained when retrieving texture images by our approaches.

Related Articles | Metrics