Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Implementation and performance analysis of Knuth39 parallelization based on many integrated core platform
ZHANG Baodong, ZHOU Jinyu, LIU Xiao, HUA Cheng, ZHOU Xiaohui
Journal of Computer Applications    2015, 35 (1): 58-61.   DOI: 10.11772/j.issn.1001-9081.2015.01.0058
Abstract399)      PDF (588KB)(428)       Save

To solve the low running speed problem of Knuth39 random number generator, a Knuth39 parallelization method based on Many Integrated Core (MIC) platform was proposed. Firstly, the random number sequence of Knuth39 generator was divided into subsequences by regular interval. Then, the random numbers were generated by every thread from the corresponding subsequence's starting point. Finally, the random number sequences generated by all threads were combined into the final sequence. The experimental results show that the parallelized Knuth39 generator successfully passed 452 tests of TestU01, the results are the same as those of Knuth39 generator without parallelization. Compared with single thread on Central Processing Unit (CPU), the optimal speed-up ratio on MIC platform is 15.69 times. The proposed method improves the running speed of Knuth39 generator effectively, ensures the randomness of the generated sequences, and it is more suitable for high performance computing.

Reference | Related Articles | Metrics
Adaptive stereo matching based on color similarity
LI Hong LI Da-hai WANG Qiong-hua CHENG Ying-feng ZHANG Chong
Journal of Computer Applications    2012, 32 (12): 3373-3376.   DOI: 10.3724/SP.J.1087.2012.03373
Abstract790)      PDF (601KB)(505)       Save
A kind of area matching method that combined weights matrix with similarity coefficient matrix was proposed in this article. The article was organized as follows: first of all, the method got the weights matrix by using color similarity and distance proximity, and the value of the matrix was corrected with an edge matrix for improving correction of the edge pixels. Then a similarity coefficient matrix was adaptively obtained according to each point pairs sum of absolute difference in matching window between left image and right image. Finally, the method was investigated by matching four stereo images (Tsukuba, Venus, Teddy, and Cones) with ground truth provided in Middlebury stereo database and the rate of overall accuracy reaches 91.82%,96.19%,76.6%,86.9%,respectively.
Related Articles | Metrics
Color image enhancement based on improved intersecting cortical model
PU Tian LI Ying-hua CHENG Jian ZHENG Hu
Journal of Computer Applications    2012, 32 (11): 3153-3156.   DOI: 10.3724/SP.J.1087.2012.03153
Abstract898)      PDF (686KB)(447)       Save
To meet the physiological perception of human eyes, a color image enhancement algorithm based on improved Intersecting Cortical Model (ICM) was proposed. The internal activities and dynamic threshold were improved to nonlinear attenuation, which satisfied the nonlinear perception of human eyes. And the decay factor was replaced by the step factor, while maintaining some of the significant features of the original model. It applied the Threshold Versus Intensity (TVI) function of the human visual system on the intensity component of the input image to adjust the dynamic range compression. At the same time, it also adjusted the saturation component of the input image by nonlinearity. Compared to the original ICM, this algorithm reduced the complexity and improved the adaptability. The experimental results confirm that the method can obtain clear and bright results.
Reference | Related Articles | Metrics
Fatigue pattern recognition of human face based on Gabor wavelet transform
Fen-hua CHENG Hai-yan YANG
Journal of Computer Applications    2011, 31 (08): 2119-2122.  
Abstract1139)      PDF (682KB)(718)       Save
Fatigue is one of the main factors that cause traffic accidents. A new method for monitoring fatigue state based on Gabor wavelet transform was proposed. In this method, the frequent patterns mining algorithm was designed to mine the fatigue patterns of fatigue facial image sequences during the training phase first. And then, during the fatigue recognition phase, the face image sequence to be detected was represented by fused feature sequence through Gabor wavelet transform. Afterwards, the classification algorithm was used for fatigue detection of the human face sequence. The simulation results on 500 fatigue images sampled by the authors show that the proposed algorithm achieves 92.8% in right detection rate and 0.02% in error detection rate, and outperforms than some similar method.
Reference | Related Articles | Metrics
Reputation model based pair-wise key establishment algorithm for sensor networks
Fen-hua CHENG
Journal of Computer Applications    2011, 31 (07): 1876-1879.   DOI: 10.3724/SP.J.1087.2011.01876
Abstract1423)      PDF (652KB)(869)       Save
Based on the key pre-distribution scheme, a new pair-wise key establishment method was proposed for sensor networks, in which each node was pre-assigned with an initial global key before deployment. And after deployment, the node can dynamically establish different one-hop pair-wise key on the basis of the pre-assigned global initial key. The theoretical analysis and simulation results show that the new algorithm has better probability of direct and indirect pair-wise key establishment than the traditional random pair-wise key establishing scheme for sensor networks.
Reference | Related Articles | Metrics
Cryptanalysis and revelation of some certificateless signatures
Yu-lei ZHANG Cai-fen WANG Yong-jie ZHANG Wen-hua CHENG Ya-ning HAN
Journal of Computer Applications    2009, 29 (11): 2957-2959.  
Abstract1475)      PDF (576KB)(1103)       Save
The Certificateless Signature (CLS) scheme simplifies the need of certificates in the Public Key Infrastructure (PKI), thus the CLS scheme is vulnerable to key replacement attacks. The schemes proposed by Ming-Wang, Li-Cheng-Sun and Cao-Paterson-Kou were analyzed. It is shown that these schemes are insecure because of an adversary who replaces the public key of a signer can forge valid signatures. Then the schemes were improved by binding technology, which satisfied a definition of Rafael-Ricardo’s certificateless general mode. Finally, it was shown that the identity-based cryptosystem signature scheme cannot be applied to CLS directly when a CLS scheme is designed.
Related Articles | Metrics