Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
β-QoM target-barrier coverage construction algorithm for wireless visual sensor network
Xinming GUO, Rui LIU, Fei XIE, Deyu LIN
Journal of Computer Applications    2023, 43 (9): 2877-2884.   DOI: 10.11772/j.issn.1001-9081.2023010084
Abstract168)   HTML7)    PDF (4482KB)(46)       Save

Focusing on the failure of intrusion detection resulted from low captured image width of traditional Wireless Visual Sensor Network (WVSN) target-barrier, a Wireless visual sensor network β Quality of Monitoring (β-QoM) Target-Barrier coverage Construction (WβTBC) algorithm was proposed to ensure that the captured image width is not less than β. Firstly, the geometric model of the visual sensor β-QoM region was established, and it was proven that the width of intruder image captured by the target-barrier of intersection of all adjacent visual sensor β-QoM regions must be greater than or equal to β. Then, based on the linear programming modeling for optimal β-QoM target-barrier coverage of WVSN, it was proven that this coverage problem is NP-hard. Finally, in order to obtain suboptimal solution of the problem, a heuristic algorithm WβTBC was proposed. In this algorithm, the directed graph of WVSN was constructed according to the counterclockwise β neighbor relationship between sensors, and Dijkstra algorithm was used to search β-QoM target-barriers in WVSN. Experimental results show that WβTBC algorithm can construct β-QoM target-barriers effectively, and save about 23.3%, 10.8% and 14.8% sensor nodes compared with Spiral Periphery Outer Coverage (SPOC), Spiral Periphery Inner Coverage (SPIC) and Target-Barrier Construction (TBC) algorithms, respectively. In addition, under the condition of meeting the requirements of intrusion detection, with the use of WβTBC algorithm, the smaller β is, the higher success rate of building β-QoM target-barrier will be, the fewer nodes will be needed in forming the barrier, and the longer working period of WVSN for β-QoM intrusion detection will be.

Table and Figures | Reference | Related Articles | Metrics
Road abandoned object detection algorithm based on optimized instance segmentation model
Yue ZHANG, Liang ZHANG, Fei XIE, Jiale YANG, Rui ZHANG, Yijian LIU
Journal of Computer Applications    2021, 41 (11): 3228-3233.   DOI: 10.11772/j.issn.1001-9081.2021010073
Abstract685)   HTML21)    PDF (1573KB)(540)       Save

In the field of traffic safety, the road abandoned objects easily cause traffic accidents and become potential traffic safety hazards. Focusing on the problems of low recognition rate and poor detection effect for different abandoned objects of traditional road abandoned object detection methods, a road abandoned object detection algorithm based on the optimized instance segmentation model CenterMask was proposed. Firstly, the residual network ResNet50 optimized by dilated convolution was used as the backbone neural network to extract image features and carry out the multi-scale processing. Then, the Fully Convolutional One-Stage (FCOS) target detector optimized by Distance Intersection over Union (DIoU) function was used to realize the detection and classification of road abandoned objects. Finally, the spatial attention-guided mask was used as the mask segmentation branch to realize the object shape segmentation, and the model training was realized by the transfer learning method. Experimental results show that, the detection rate of the proposed algorithm for road abandoned objects is 94.82%, and compared with the common instance segmentation algorithm Mask Region-Convolutional Neural Network (Mask R-CNN), the proposed road abandoned object detection algorithm has the Average Precision (AP) increased by 8.10 percentage points in bounding box detection.

Table and Figures | Reference | Related Articles | Metrics
Parallel alignment algorithm of large scale biological networks based on message passing interface
SHU Junhui ZHANG Wu XUE Qianfei XIE Jiang
Journal of Computer Applications    2014, 34 (11): 3117-3120.   DOI: 10.11772/j.issn.1001-9081.2014.11.3117
Abstract184)      PDF (594KB)(487)       Save

In order to reduce the time complexity of biological networks alignment, an implementation for large scale biological networks alignment based on Scalable Protein Interaction Network Alignment (SPINAL) in Message Passing Interface (MPI) program was proposed. Based on MPI, the SPINAL algorithm combined with parallelization method was applied into this approach. Instead of serial algorithm, parallel sorting algorithm was used in multi-core environment. Load balancing strategy was chosen to assign tasks reasonably. In the processing of large scale biological networks alignment, the experiment shows that, compared with the algorithm without parallelization and load balancing strategy, this proposed algorithm can reduce the runtime and improve computation efficiency effectively.

Reference | Related Articles | Metrics
Maximizing projection grating slit for document image skew detection
ZHAO Fei XIE Liyang LI Jia
Journal of Computer Applications    2011, 31 (06): 1631-1633.   DOI: 10.3724/SP.J.1087.2011.01631
Abstract1671)      PDF (490KB)(436)       Save
Skew document images often appears when it is captured by image acquisition devices such as cameras or scanners, which may induce recognition mistakes by Optical Character Recognition (OCR) software. The paper proposed an optimized method for the skew detection of document images, and its objective function is the image projection grating slit width. The document image angle is the inverse of the projection angle, when the corresponding projection grating slit width is the largest. The detection range is expanded and the detection speed is increased by the grating line width function. The amount of calculation in detection is decreased by preliminary projection on equispaced rows and back projection. The detection precision is improved by dichotomy. In the experiments document images where a few illustrations were used, and the skew detection results show the proposed method is of high efficiency and robustness.
Related Articles | Metrics