Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Identity-based ring signature scheme on number theory research unit lattice
Jinbo LI, Ping ZHANG, Ji ZHANG, Muhua LIU
Journal of Computer Applications    2023, 43 (9): 2798-2805.   DOI: 10.11772/j.issn.1001-9081.2022081268
Abstract251)   HTML6)    PDF (962KB)(176)       Save

Concerning the problems that the size of the trapdoor base is too large and the public key of ring members needs digital certificate authentication in the lattice-based ring signature schemes, an NTRU (Number Theory Research Unit) lattice-based Identity-Based Ring Signature scheme (NTRU-IBRS) was proposed. Firstly, the trapdoor generation algorithm on NTRU lattice was used to generate the system master public-private key pairs. Secondly, the master private key was taken as the trapdoor information and the one-way function was reversely operated to obtain the private key of every ring member. Finally, based on the Small Integer Solution (SIS) problem, the ring signature was generated by using the rejection sampling technology. Security analysis shows that NTRU-IBRS is anonymous and existentially unforgeable under adaptive chosen message and chosen identity attacks. Performance analysis and experimental simulation show that compared with the ring signature scheme on ideal lattice and the identity-based linkable ring signature scheme on NTRU lattice: in storage overhead, NTRU-IBRS has the system private key length decreased by 0 to 99.6% and the signature private key length decreased by 50.0% to 98.4%; and in time overhead, NTRU-IBRS has the total time overhead reduced by 15.3% to 21.8%. Simulation results of applying NTRU-IBRS to the dynamic Internet of Vehicles (IoV) scenario show that NTRU-IBRS can ensure privacy security and improve communication efficiency during vehicle interaction at the same time.

Table and Figures | Reference | Related Articles | Metrics
Maximal clique searching algorithm for hypergraphs
Lantian XU, Ronghua LI, Yongheng DAI, Guoren WANG
Journal of Computer Applications    2023, 43 (8): 2319-2324.   DOI: 10.11772/j.issn.1001-9081.2022091334
Abstract388)   HTML49)    PDF (1332KB)(305)       Save

Most of entity relationships in the real world cannot be represented by simple binary relations, and hypergraph can represent the n-ary relations among entities well. Therefore, definitions of hypergraph clique and maximal clique were proposed, and the exact algorithm and approximation algorithm for searching hypergraph maximal clique were given. First, the reason why the existing maximal clique searching algorithms on ordinary graphs cannot be applied to hypergraphs directly was analyzed. Then, based on the characteristics of hypergraph and the definition of maximal clique, a novel data structure for preserving the adjacency relations among hyperpoints was proposed, and an accurate maximal clique searching algorithm on hypergraph was proposed. As the running of the exact algorithm is slow, the pruning idea of pivots was combined with, the number of recursive layers was reduced, and an approximation maximal clique searching algorithm on hypergraph was proposed. Experimental results on multiple real hypergraph datasets show that under the premise finding most maximal cliques, the proposed approximation algorithm improves the search speed. When the number of test hypergraph cliques on 3-uniform hypergraph is 22, the acceleration ratio reaches over 1 000.

Table and Figures | Reference | Related Articles | Metrics
Aspect-based sentiment analysis model fused with multi-window local information
Zhixiong ZHENG, Jianhua LIU, Shuihua SUN, Ge XU, Honghui LIN
Journal of Computer Applications    2023, 43 (6): 1796-1802.   DOI: 10.11772/j.issn.1001-9081.2022060891
Abstract254)   HTML9)    PDF (1323KB)(96)       Save

Focused on the issue that the current Aspect-Based Sentiment Analysis (ABSA) models rely too much on the syntactic dependency tree with relatively sparse relationships to learn feature representations, which leads to the insufficient ability of the model to learn local information, an ABSA model fused with multi-window local information called MWGAT (combining Multi-Window local information and Graph ATtention network) was proposed. Firstly, the local contextual features were learned through the multi-window local feature learning mechanism, and the potential local information contained in the text was mined. Secondly, Graph ATtention network (GAT), which can better understand the syntactic dependency tree, was used to learn the syntactic structure information represented by the syntactic dependency tree, and syntax-aware contextual features were generated. Finally, these two types of features representing different semantic information were fused to form the feature representation containing both the syntactic information of syntactic dependency tree and the local information, so that the sentiment polarities of aspect words were discriminated by the classifier efficiently. Three public datasets, Restaurant, Laptop, and Twitter were used for experiment. The results show that compared with the T-GCN (Type-aware Graph Convolutional Network) model combined with the syntactic dependency tree, the proposed model has the Macro-F1 score improved by 2.48%, 2.37% and 0.32% respectively. It can be seen that the proposed model can mine potential local information effectively and predict the sentiment polarities of aspect words more accurately.

Table and Figures | Reference | Related Articles | Metrics
Aspect-oriented fine-grained opinion tuple extraction with adaptive span features
Linying CHEN, Jianhua LIU, Shuihua SUN, Zhixiong ZHENG, Honghui LIN, Jie LIN
Journal of Computer Applications    2023, 43 (5): 1454-1460.   DOI: 10.11772/j.issn.1001-9081.2022040502
Abstract212)   HTML2)    PDF (1182KB)(172)       Save

Aspect-oriented Fine-grained Opinion Extraction (AFOE) extracts aspect terms and opinion terms from reviews in the form of opinion pairs or additionally extracts sentiment polarities of aspect terms on the basis of the above to form opinion triplets. Aiming at the problem of neglecting correlation between the opinion pairs and contexts, an aspect-oriented Adaptive Span Feature-Grid Tagging Scheme (ASF-GTS) model was proposed. Firstly, BERT (Bidirectional Encode Representation from Transformers) model was used to obtain the feature representation of the sentence. Then, the correlation between the opinion pair and local context was enhanced by the Adaptive Span Feature (ASF) method. Next, Opinion Pair Extraction (OPE) was transformed into a uniform grid tagging task by Grid Tagging Scheme (GTS). Finally, the corresponding opinion pairs or opinion triplet were generated by the specific decoding strategy. Experiments were carried out on four AFOE benchmark datasets adaptive to the task of opinion tuple extraction. The results show that compared with GTS-BERT (Grid Tagging Scheme-BERT) model, the proposed model has the F1-score improved by 2.42% to 7.30% and 2.62% to 6.61% on opinion pair or opinion triplet tasks, respectively. The proposed model can effectively reserve the sentiment correlation between opinion pair and context, and extract opinion pairs and their sentiment polarities more accurately.

Table and Figures | Reference | Related Articles | Metrics
Threat intelligence entity relation extraction method integrating bootstrapping and semantic role labeling
Shunhang CHENG, Zhihua LI, Tao WEI
Journal of Computer Applications    2023, 43 (5): 1445-1453.   DOI: 10.11772/j.issn.1001-9081.2022040551
Abstract361)   HTML7)    PDF (1678KB)(180)       Save

To efficiently and automatically mine threat intelligence entities and their relations in open source heterogeneous big data, a Threat Intelligence Entity Relation Extraction (TIERE) method was proposed. Firstly, a data preprocessing method was studied and presented by analyzing the characteristics of the open source cyber security reports. Then, an Improved BootStrapping-based Named Entity Recognition (NER-IBS) algorithm and a Semantic Role Labeling-based Relation Extraction (RE-SRL) algorithm were developed for the problems of high text complexity and small standard dataset in cyber security field. Initial seeds were constructed by using a small number of samples and rules, the entities in the unstructured text were mined through iterative training, and the relations between entities were mined by the strategy of constructing semantic roles. Experimental results show that on the few-shot cyber security information extraction dataset, the F1 value of the NER-IBS algorithm is 84%, which is 2 percentage points higher than that of the RDF-CRF (Regular expression and Dictionary combined with Feature templates as well as Conditional Random Field) algorithm, and the F1 value of RE-SRL algorithm for uncategorized relation extraction is 94%, proving that TIERE method has efficient entity and relation extraction capability.

Table and Figures | Reference | Related Articles | Metrics
Multi-stage low-illuminance image enhancement network based on attention mechanism
Guihui CHEN, Jinyu LIN, Yuehua LI, Zhongbing LI, Yuli WEI, Kai LU
Journal of Computer Applications    2023, 43 (2): 552-559.   DOI: 10.11772/j.issn.1001-9081.2022010093
Abstract299)   HTML14)    PDF (4056KB)(140)       Save

A multi-stage low-illuminance image enhancement network based on attention mechanism was proposed to solve the problem that the details of low-illuminance images are lost due to the overlapping of image contents and large brightness differences in some regions during the enhancement process of low-illuminance images. At the first stage, an improved multi-scale fusion module was used to perform preliminary image enhancement. At the second stage, the enhanced image information of the first stage was cascaded with the input of this stage, and the result was used as the input of the multi-scale fusion module in this stage. At the third stage, the enhanced image information of the second stage was cascaded with the input of the this stage, and the result was used as the input of the multi-scale fusion module in this stage. In this way, with the use of multi-stage fusion, not only the brightness of the image was improved adaptively, but also the details were retained adaptively. Experimental results on open datasets LOL and SICE show that compared to the algorithms and networks such as MSR (Multi-Scale Retinex) algorithm, gray Histogram Equalization (HE) algorithm and RetinexNet (Retina cortex Network), the proposed network has the value of Peak Signal-to-Noise Ratio (PSNR) 11.0% to 28.9% higher, and the value of Structural SIMilarity (SSIM) increased by 6.8% to 46.5%. By using multi-stage method and attention mechanism to realize low-illuminance image enhancement, the proposed network effectively solves the problems of image content overlapping and large brightness difference, and the images obtained by this network are more detailed and subjective recognizable with clearer textures.

Table and Figures | Reference | Related Articles | Metrics
Network representation learning based on autoencoder with optimized graph structure
Kun FU, Yuhan HAO, Minglei SUN, Yinghua LIU
Journal of Computer Applications    2023, 43 (10): 3054-3061.   DOI: 10.11772/j.issn.1001-9081.2022101494
Abstract252)   HTML22)    PDF (2515KB)(243)       Save

The aim of Network Representation Learning (NRL) is to learn the potential and low-dimensional representation of network vertices, and the obtained representation is applied for downstream network analysis tasks. The existing NRL algorithms using autoencoder extract information about node attributes insufficiently and are easy to generate information bias, which affects the learning effect. Aiming at these problems, a Network Representation learning model based on Autoencoder with optimized Graph Structure (NR-AGS) was proposed to improve the accuracy by optimizing the graph structure. Firstly, the structure and attribute information were fused to generate the joint transition matrix, thereby forming the high-dimensional representation. Secondly, the low-dimensional embedded representation was learnt by an autoencoder. Finally, the deep embedded clustering algorithm was introduced during learning to form a self-supervision mechanism in the processes of autoencoder training and the category distribution division of nodes. At the same time, the improved Maximum Mean Discrepancy (MMD) algorithm was used to reduce the gap between distribution of the learnt low-dimensional embedded representation and distribution of the original data. Besides, in the proposed model, the reconstruction loss of the autoencoder, the deep embedded clustering loss and the improved MMD loss were used to optimize the network jointly. NR-AGS was applied to the learning of three real datasets, and the obtained low-dimensional representation was used for downstream tasks such as node classification and node clustering. Experimental results show that compared with the deep graph representation model DNGR (Deep Neural networks for Graph Representations), NR-AGS improves the Micro-F1 score by 7.2, 13.5 and 8.2 percentage points at least and respectively on Cora, Citeseer and Wiki datasets. It can be seen that NR-AGS can improve the learning effect of NRL effectively.

Table and Figures | Reference | Related Articles | Metrics
Joint detection and tracking algorithm of target in aerial refueling scenes
Yi ZHANG, Yongrong SUN, Kedong ZHAO, Hua LI, Qinghua ZENG
Journal of Computer Applications    2022, 42 (9): 2893-2899.   DOI: 10.11772/j.issn.1001-9081.2021071286
Abstract306)   HTML7)    PDF (4223KB)(110)       Save

Focusing on the target tracking problem in the docking stage of autonomous aerial refueling, a joint detection and tracking algorithm of target in aerial refueling scenes was proposed. In the algorithm, CenterTrack network with integrated detection and tracking was adopted to track the drogue. In view of the large computational cost and long training time, this network was improved from two aspects: model design and network optimization. Firstly, dilated convolution group was introduced into the tracker to make the network weight lighter without changing the size of the receptive field. At the same time, the convolutional layer of the output part was replaced with depthwise separable convolutional layer to reduce the network parameters and computational cost. Then, the network was further optimized to make it converge to a stable state faster by combining Stochastic Gradient Descent (SGD) method with Adaptive moment estimation (Adam) algorithm. Finally, videos of real-world aerial refueling scenes and simulations on the ground were made into dataset with the corresponding format for experimental verification. The training and testing were carried out on the self-built drogue dataset and MOT17 (Multiple Object Tracking 17) public dataset respectively, and the effectiveness of the proposed algorithm was verified. Compared to the original CenterTrack network, the improved network Tiny-CenterTrack reduces training time by about 48.6% and improves the real-time performance by 8.8%. Experimental results show that the improved network can effectively save the computing resources and improve the real-time performance to a certain extent without the loss of network performance.

Table and Figures | Reference | Related Articles | Metrics
Homologous spectrogram feature fusion with self-attention mechanism for bird sound classification
Zhihua LIU, Wenjie CHEN, Aibin CHEN
Journal of Computer Applications    2022, 42 (4): 1260-1268.   DOI: 10.11772/j.issn.1001-9081.2021071258
Abstract390)   HTML11)    PDF (1376KB)(161)       Save

At present, most deep learning models are difficult to deal with the classification of bird sound under complex background noise. Because bird sound has the continuity characteristic in time domain and high-low characteristic in frequency domain, a fusion model of homologous spectrogram features was proposed for bird sound classification under complex background noise. Firstly, Convolutional Neural Network (CNN) was used to extract Mel-spectrogram features of bird sound. Then, the time domain and frequency domain dimensions of the same Mel-spectrogram feature were compressed to 1 by specific convolution and down-sampling operations, so that frequency domain feature with only high-low characteristics and the time domain feature with only continuous characteristics were obtained. Based on the above operation to extract frequency domain and time domain features, the features of Mel-spectrogram were extracted both in time domain and frequency domain, the time-frequency domain features with continuity and high-low characteristics were obtained. Then the self-attention mechanism was applied to the obtained time domain, frequency domain and time-frequency domain features, strengthening their own characteristics. Finally, the results of these three homologous spectrogram features after decision fusion were used for bird sound classification. The proposed model was used for audio classification of 8 bird species on Xeno-canto website, achieved the better result in the comparison experiment with the Mean Average Precision (MAP) of 0.939. The experimental results show that the proposed model can deal with the problem of the poor classification effect of bird sound under complex background noise.

Table and Figures | Reference | Related Articles | Metrics
Online kernel regression based on random sketching method
Qinghua LIU, Shizhong LIAO
Journal of Computer Applications    2022, 42 (3): 676-682.   DOI: 10.11772/j.issn.1001-9081.2021040869
Abstract271)   HTML19)    PDF (628KB)(98)       Save

In online kernel regression learning, the inverse matrix of the kernel matrix needs to be calculated when a new sample arrives, and the computational complexity is at least the square of the number of rounds. The idea of applying sketching method to hypothesis updating was introduced, and a more efficient online kernel regression algorithm via sketching method was proposed. Firstly, The loss function was set as the square loss, a new gradient descent algorithm, called FTL-Online Kernel Regression (F-OKR) was proposed, using the Nystr?m approximation method to approximate the Kernel, and applying the idea of Follow-The-Leader (FTL). Then, sketching method was used to accelerate F-OKR so that the computational complexity of F-OKR was reduced to the level of linearity with the number of rounds and sketch scale, and square with the data dimension. Finally, an efficient online kernel regression algorithm called Sketched Online Kernel Regression (SOKR) was designed. Compared to F-OKR, SOKR had no change in accuracy and reduced the runtime by about 16.7% on some datasets. The sub-linear regret bounds of these two algorithms were proved, and experimental results on standard regression datasets also verify that the algorithms have better performance than NOGD (Nystr?m Online Gradient Descent) algorithm, the average loss of all the datasets was reduced by about 64%.

Table and Figures | Reference | Related Articles | Metrics
Adaptive hybrid attention hashing for deep cross-modal retrieval
Xinghua LIU, Guitao CAO, Qiubin LIN, Wenming CAO
Journal of Computer Applications    2022, 42 (12): 3663-3670.   DOI: 10.11772/j.issn.1001-9081.2021101806
Abstract293)   HTML17)    PDF (1778KB)(127)       Save

In feature learning process, the existing hashing methods cannot distinguish the importance of the feature information of each region, and cannot utilize the label information to explore the correlation between modalities. Therefore, an Adaptive Hybrid Attention Hashing for deep cross-modal retrieval (AHAH) model was proposed. Firstly, channel attention and spatial attention were combined by the weights obtained by autonomous learning to strengthen the attention to the relevant target area and weaken the attention to the irrelevant target area. Secondly, the similarity between modalities was expressed more finely through the statistical analysis of modality labels and quantification of similarity degrees to numbers between 0 and 1 by using the proposed similarity measurement method. Compared with the most advanced method Multi-Label Semantics Preserving Hashing (MLSPH) on four commonly used datasets MIRFLICKR-25K, NUS-WIDE, MSCOCO, and IAPR TC-12, when the hash code length is 16 bit, the proposed method has the retrieval mean Average Precision (mAP) increased by 2.25%, 1.75%, 6.8%, and 2.15%, respectively. In addition, ablation experiments and efficiency analysis also prove the effectiveness of the proposed method.

Table and Figures | Reference | Related Articles | Metrics
Manifold regularized nonnegative matrix factorization based on clean data
Hua LI, Guifu LU, Qinru YU
Journal of Computer Applications    2021, 41 (12): 3492-3498.   DOI: 10.11772/j.issn.1001-9081.2021060962
Abstract243)   HTML6)    PDF (663KB)(124)       Save

The existing Nonnegative Matrix Factorization (NMF) algorithms are often designed based on Euclidean distance, which makes the algorithms sensitive to noise. In order to enhance the robustness of these algorithms, a Manifold Regularized Nonnegative Matrix Factorization based on Clean Data (MRNMF/CD) algorithm was proposed. In MRNMF/CD algorithm, the low-rank constraints, manifold regularization and NMF technologies were seamlessly integrated, which makes the algorithm perform relatively excellent. Firstly, by adding the low-rank constraints, MRNMF/CD can recover clean data from noisy data and obtain the global structure of the data. Secondly, in order to use the local geometric structure information of the data, manifold regularization was incorporated into the objective function by MRNMF/CD. In addition, an iterative algorithm for solving MRNMF/CD was proposed, and the convergence of this solution algorithm was analyzed theoretically. Experimental results on ORL, Yale and COIL20 datasets show that MRNMF/CD algorithm has better accuracy than the existing algorithms including k-means, Principal Component Analysis (PCA), NMF and Graph Regularized Nonnegative Matrix Factorization (GNMF).

Table and Figures | Reference | Related Articles | Metrics
Complexity analysis of functional query answering on big data
Wenli WU, Guohua LIU, Junbao ZHANG
Journal of Computer Applications    2020, 40 (2): 416-419.   DOI: 10.11772/j.issn.1001-9081.2019091618
Abstract401)   HTML0)    PDF (436KB)(235)       Save

Functional query is an important operation in big data application, and the problem of query answering has always been the core problem in database theory. In order to analyze the complexity of the functional query answering problem on big data, firstly, the functional query language was reduced to a known decidable language by using mapping reduction method, which proves the computability of the functional query answering problem. Secondly, first-order language was used to describe the functional query, and the plexity of the first-order language was analyzed. On this basis, the NC-factor reduction method was used to reduce the functional query class to the known Π Τ Q -complete class. It is proved that functional query answering problem can be solved in NC time after PTIME (Polynomial TIME) preprocessing. It can be conducted that the functional query answering problem can be handled on big data.

Table and Figures | Reference | Related Articles | Metrics
Energy-efficient algorithm based on data classification for cloud storage system
ZHANG Tao LIAO Bin SHUN Hua LI Fengjun JI Jinhu
Journal of Computer Applications    2014, 34 (8): 2267-2272.   DOI: 10.11772/j.issn.1001-9081.2014.08.2267
Abstract414)      PDF (956KB)(460)       Save

Constant expansion and that energy consumption factors are ignored with its design process, bring the problem of high energy consumption and low efficiency of the cloud storage system. And this problem has become a main bottleneck in the development of cloud computing and big data. Most of previous studies had been mostly used to adjust the entire storage node to the low-power mode to save energy. According to the repetition of data and access rules, new storage model based on data classification was proposed. The storage area was divided into HotZone, ColdZone and ReduplicationZone so as to divisionally store the data according to the repetition and activity factor characteristics of each data file. Based on the new storage model, an energy-efficient storage algorithm was designed and a new storage model was constructed. The experimental results show that, the new storage model improves the energy utilization rate of the distributed storage system nearly 25%, especially when the system load is lower than the given threshold.

Reference | Related Articles | Metrics
Construction of protein-compound interactions model
LI Huaisong YUAN Qin WANG Caihua LIU Juan
Journal of Computer Applications    2014, 34 (7): 2129-2131.   DOI: 10.11772/j.issn.1001-9081.2014.07.2129
Abstract150)      PDF (586KB)(396)       Save

Building an interpretable and large-scale protein-compound interactions model is an very important subject. A new chemical interpretable model to cover the protein-compound interactions was proposed. The core idea of the model is based on the hypothesis that a protein-compound interaction can be decomposed as protein fragments and compound fragments interactions, so composing the fragments interactions brings about a protein-compound interaction. Firstly, amino acid oligomer clusters and compound substructures were applied to describe protein and compound respectively. And then the protein fragments and the compound fragments were viewed as the two parts of a bipartite graph, fragments interactions as the edges. Based on the hypothesis, the protein-compound interaction is determined by the summation of protein fragments and compound fragments interactions. The experiment demonstrates that the model prediction accuracy achieves 97% and has the very good explanatory.

Reference | Related Articles | Metrics
Adaptive image diffusion filtering based on exponent variable in the complex wavelet domain
Jin-Hua LIU
Journal of Computer Applications    2014, 34 (6): 1758-1761.   DOI: 10.11772/j.issn.1001-9081.2014.06.1758
Abstract278)      PDF (587KB)(315)       Save

In order to overcome the problem of staircase effect and edge blurring caused by using the traditional anisotropic diffusion model, the perfect reconstruction and better direction selectivity characteristics of the complex wavelet transform were applied to design an adaptive diffusion model combined with the gradient and complex wavelet transform modulus in the complex wavelet domain, and an adaptive image diffusion filtering algorithm was proposed based on exponent variable in this work. Finally, the filtering performance of the proposed algorithm was tested through computer simulation. The experimental results show that the noise can be filtered effectively in low Signal-to-Noise Ratio (SNR) conditions, and the edges and textures can be preserved well by the proposed method.

Reference | Related Articles | Metrics
Relative orientation approach based on direct resolving and iterative refinement
YANG Ahua LI Xuejun LIU Tao LI Dongyue
Journal of Computer Applications    2014, 34 (6): 1706-1710.   DOI: 10.11772/j.issn.1001-9081.2014.06.1706
Abstract295)      PDF (723KB)(492)       Save

In order to improve the robustness and accuracy of relative orientation, an approach combining direct resolving and iterative refinement for relative orientation was proposed. Firstly, the essential matrix was estimated from some corresponding points. Afterwards the initial relative position and posture of two cameras were obtained by decomposing the essential matrix. The process for determining the only position and posture parameters were introduced in detail. Finally, by constructing the horizontal epipolar coordinate system, the constraint equation group was built up from the corresponding points based on the coplanar constraint, and the initial position and posture parameters were refined iteratively. The algorithm was resistant to the outliers by applying the RANdom Sample Consensus (RANSAC) strategy and dynamically removing outliers during iterative refinement. The simulation experiments illustrate the resolving efficiency and accuracy of the proposed algorithm outperforms that of the traditional algorithm under the circumstance of importing varies of random errors. And the experiment with real data demonstrates the algorithm can be effectively applied to relative position and posture estimation in 3D reconstruction.

Reference | Related Articles | Metrics
Object classification based on discriminable features and continuous tracking
LI Zhihua LIU Qiuluan
Journal of Computer Applications    2014, 34 (5): 1275-1278.   DOI: 10.11772/j.issn.1001-9081.2014.05.1275
Abstract367)      PDF (634KB)(351)       Save

Aiming at object classification problem in heavily crowded and complex visual surveillance scenes, a real-time object classification approach was proposed based on discriminable features and continuous tracking. Firstly rapid features matching including color, shape and position was utilized to build the initial target correspondence in the whole scene, in which motion direction and velocity of the moving target were used to predict the preferable searching area in the next frame to accelerate the target matching process. And then the appearance model was utilized to rematch the occluded object without establishing the correspondence. In order to enhance the classification precision, the final object classification results were determined by the maximum probability of continuous object feature extraction and classification according to the tracking results. Experimental results show that the proposed method gets better classification precision compared with the method which do not utilized the continuous tracking,and its correct rate averagely reaches 97%. The new scheme effectively improves the performance of object classification in the complex scenes.

Reference | Related Articles | Metrics
Effective inter-cell interference coordination scheme in long term evolution femtocell network based on soft frequency reuse
LI Yanan SU Hansong LIU Gaohua LI Yuan
Journal of Computer Applications    2014, 34 (5): 1239-1242.   DOI: 10.11772/j.issn.1001-9081.2014.05.1239
Abstract362)      PDF (712KB)(359)       Save

Femtocell is a small low powered base station which can provide an increase in system capacity and better indoor coverage for two-tier Long Term Evolution (LTE) network. However, interference problem between the femtocell and the Microcell eNodeB (MeNB) should be solved in advance. Concerning the interference between them, an effective Inter-Cell Interference Coordination (ICIC) scheme using Soft Frequency Reuse (SFR) was proposed in LTE femtocell system. Under the macrocell pre-allocating frequency band by the SFR, the femtocell user equipments chose sub-bands which were not used in the macrocell sub-area to avoid co-channel interference. At the same time, when the femtocell was located in the center of a macrocell, it was not going to select the sub-bands which were occupied by the boundary region of the same sector. Simulation results show that the proposal scheme improves the throughput performance of overall network by 14% compared to the situation without ICIC, and the average throughput of cell edge users increases by 34% at least.

Reference | Related Articles | Metrics
Single video temporal super-resolution reconstruction algorithm based on maximum a posterior
GUO Li LIAO Yu CHEN Weilong LIAO Honghua LI Jun XIANG Jun
Journal of Computer Applications    2014, 34 (12): 3580-3584.  
Abstract151)      PDF (823KB)(613)       Save

Any video camera equipment has certain temporal resolution, so it will cause motion blur and motion aliasing in captured video sequence. Spatial deblurring and temporal interpolation are usually adopted to solve this problem, but these methods can not solve it completely in origin. A temporal super-resolution reconstruction method based on Maximum A Posterior (MAP) probability estimation for single-video was proposed in this paper. The conditional probability model was determined in this method by reconstruction constraint, and then prior information model was established by combining temporal self-similarity in video itself. From these two models, estimation of maximum posteriori was obtained, namely reconstructed a high temporal resolution video through a single low temporal resolution video, so as to effectively remove motion blur for too long exposure time and motion aliasing for inadequate camera frame-rate. Through theoretical analysis and experiments, the validity of the proposed method is proved to be effective and efficient.

Reference | Related Articles | Metrics
Sparse channel estimation method based on compressed sensing for OFDM cooperation system
ZHANG Aihua LI Chunlei GUI Guan
Journal of Computer Applications    2014, 34 (1): 13-17.   DOI: 10.11772/j.issn.1001-9081.2014.01.0013
Abstract652)      PDF (702KB)(380)       Save
A compressed channel sensing method was proposed for Orthogonal Frequency Division Multiplexing (OFDM) based Amplify-and-Forward (AF) cooperative communication network over frequency-selective fading channels. First, by using cyclic matrix theory, the system model was established similar to the traditional point-to-point system model, which consisted of a cascaded channel vector and a measurement matrix. And then, using the theory of compressed sensing, the measurement matrix was proven to satisfy Restricted Isometry Property (RIP) with high probability. Finally, convolution channel impulse response was reconstructed with compressed sensing algorithm. According to the figures example, the cooperative channel exhibited an inherent sparse or sparse clustering structure. Hence, the proposed method can fully exploit the inherent sparse structure in cooperative channel. The simulation results confirm that the proposed method provides significant improvement in Mean Square Error (MSE) performance or spectral efficiency compared with the traditional linear channel estimation methods.
Related Articles | Metrics
Energy saving and load balance strategy in cloud computing
QIAN Yurong YU Jiong WANG Weiyuan SHUN Hua LIAO Bin YANG Xingyao
Journal of Computer Applications    2013, 33 (12): 3326-3330.  
Abstract689)      PDF (867KB)(622)       Save
An adaptive Virtual Machine (VM) dynamic migration strategy of soft energy-saving was put forward to optimize energy consumption and load balance in cloud computing. The energy-saving strategy adopted Dynamic Voltage Frequency Scaling (DVFS) as the static energy-aware technology to achieve the sub-optimized static energy saving, and used online VM migration to achieve an adaptive dynamic soft energy-saving in cloud platform. The two energy-saving strategies were simulated and compared with each other in CloudSim platform, and the data were tested on PlanetLab platform. The results show that: Firstly, the adaptive soft and hard combination strategy in energy-saving can significantly save 96% energy; secondly, DVFS+MAD_MMT strategy using Median Absolute Deviation (MAD) to determine whether the host is overload, and choosing VM to remove based on Minimum Migration Time (MMT), which can save energy about 87.15% with low-load in PlanetLab Cloudlets than that of experimental environment; finally, security threshold of 2.5 in MAD_MMT algorithm can consume the energy efficiently and achieve the adaptive load balancing of virtual machines migration dynamically.
Related Articles | Metrics
Prediction of moving object trajectory based on probabilistic suffix tree
WANG Xing JIANG Xinhua LIN Jie XIONG Jinbo
Journal of Computer Applications    2013, 33 (11): 3119-3122.  
Abstract827)      PDF (828KB)(450)       Save
In the prediction of moving object trajectory, concerning the low accuracy rate of low order Markov model and the expansion of state space in high order model, a dynamic adaptive Probabilistic Suffix Tree (PST) prediction method based on variable length Markov model was proposed. Firstly, moving objects trajectory path was serialized according to the time; then the probability characteristic of sequence context was trained and calculated from the historical trajectory data of moving objects, the probabilistic suffix tree model based path sequence was constructed, combined with the actual trajectory data, thus the future trajectory information could be predicted dynamically and adaptively. The experimental results show that the highest prediction accuracy was obtained in second order model, with the order of the model increasing, the prediction accuracy was maintained at about 82% and better prediction results were achieved. In the meantime, space complexity was decreased exponentially and storage space was reduced greatly. The proposed method made full use of historical data and current trajectory information to predict the future trajectory, and provided a more flexible and efficient location-based services.
Related Articles | Metrics
Automatic detection algorithm for new roads based on trajectory of floating cars
JIANG Xinhua LIAO Lyuchao ZOU Fumin
Journal of Computer Applications    2013, 33 (02): 579-582.   DOI: 10.3724/SP.J.1087.2013.00579
Abstract1112)      PDF (632KB)(407)       Save
In order to achieve dynamic update of digital map data to support the geographic information services in traffic network with rapid development, a new-road automatic detection algorithm was proposed based on the Floating Car Data (FCD) technology. In this method, the moving trajectories of massive floating cars were calculated in real-time, then the suspected new road sets were extracted with the image matching between the existing map layers and the trajectories. After applying a filtering algorithm to the data sets for cleaning, the new road detection reports covering the new roads' location and length were generated automatically and saved as temporary map layers. The field test results show that this algorithm can detect the new roads quickly, so far as to detect new road within five minutes. It is a cost-effective solution for the real-time road map layer update.
Related Articles | Metrics
Chaotic ship maneuvering control in course-keeping
LI Tianwei LIU Xiaoguang PENG Weihua LI Wei
Journal of Computer Applications    2013, 33 (01): 234-238.   DOI: 10.3724/SP.J.1087.2013.00234
Abstract713)      PDF (730KB)(492)       Save
Concerning the problem of chaotic maneuvering control for sailing ship, a rectangular impulsive parametric perturbation control method based on the Melnikov function of controlled chaotic system was proposed through the non-linear ship steering model. The proposed method perturbed the chaotic system parameters by using rectangular pulse. Through solving the chaotic system's homoclinic orbit and constructing the Melnikov function of controlled chaotic system, the value range of the pulse parameters was fixed by mathematic method with reference to the simple zero boundary conditions of Melnikov function, and this method avoided blindly choosing the pulse parameters when controlling chaos. The experiments for the chaotic ship steering control show that, the proposed method can stabilize the chaotic system to periodic orbits, and amplitude of the stabilized system is only 8.5% of the original system. The experimental results demonstrate the effectiveness of the proposed method for the chaotic ship steering control.
Reference | Related Articles | Metrics
Speech endpoint detection based on critical band and energy entropy
ZHANG Ting HE Ling HUANG Hua LIU Xiaoheng
Journal of Computer Applications    2013, 33 (01): 175-178.   DOI: 10.3724/SP.J.1087.2013.00175
Abstract838)      PDF (605KB)(575)       Save
The accuracy of the speech endpoint detection has a direct impact on the precision of speech recognition, synthesis, enhancement, etc. To improve the effectiveness of speech endpoint detection, an algorithm based on critical band and energy entropy was proposed. It took full advantage of the frequency distribution of human auditory characteristics, and divided the speech signals according to critical bands. Combined with the different distribution of energy entropy of each critical band of the signals respectively in the speech segments and noise segments, speech endpoint detection under different background noises was completed. The experimental results indicate that the average accuracy of the newly proposed algorithm is 1.6% higher than the traditional short-time energy algorithm. The proposed method can achieve the detection of speech endpoint under various noise environment of low Signal to Noise Ratio (SNR).
Reference | Related Articles | Metrics
Delay tolerant network routing resource allocation model on general k-anycast
ZHANG Yong-hui LIN Zhang-xi LIU Jian-hua LIANG Quan
Journal of Computer Applications    2012, 32 (12): 3494-3498.   DOI: 10.3724/SP.J.1087.2012.03494
Abstract745)      PDF (995KB)(445)       Save
Delay Tolerant Network (DTN) can modify frequent network disruption and segmentation in mobile Internet access. Its core technology includes routing resource allocation. However, the existed knowledge oracles of DTN routing algorithms are time probabilistic uncertainty in public transport means mobile network or logistics, which reduces the efficiency of resource allocation. So it was proposed that general k-anycast allocates bandwidth resources to k eligible access routers in access period, which diversify the time deviation degrees and decrease the uncertainty. And access router information matrixes decide general k-anycast router aggregation. Therefore packets can be transmitted simultaneously to multiple destinations. The probabilistic uncertain utility model was further proposed for routing resource allocation based on DTN custody transfer. Simulations show that its transmission performance and robustness are better than Multicast DTN routing algorithm.
Related Articles | Metrics
Multi-feature fusion Camshift algorithm and its further improvement
LIN Jian-hua LIU Dang-hui SHAO Xian-kui
Journal of Computer Applications    2012, 32 (10): 2814-2816.   DOI: 10.3724/SP.J.1087.2012.02814
Abstract1130)      PDF (687KB)(453)       Save
The Camshift algorithm based on color-kernel can effectively track objects in a simple background, but it is easy to be interfered by illumination variation or the similar color object in the background. To improve the algorithms ability to respond to illumination variation, a multi-feature adaptive fusion scheme based on color, shape and texture was proposed. And further improvements have been proposed through modifying feature histogram and setting a reasonable search region to solve the problem of similar background. The experimental results show that the improved algorithm has higher tracking accuracy than traditional algorithm in the scene with illumination variation or similar background.
Reference | Related Articles | Metrics
High-speed packet processing by non-collision hash functions based on
ZHANG Mo-hua LI Ge
Journal of Computer Applications    2012, 32 (04): 999-1002.   DOI: 10.3724/SP.J.1087.2012.00999
Abstract777)      PDF (778KB)(508)       Save
High-speed packet inspection can be achieved through storing attack signatures on the high-speed on-chip memory. Concerning the limited on-chip memory, this paper proposed a new trie structure with non-collision hash functions based on middle-point partition. The algorithm evenly partitioned attack signatures into multiple groups at each layer in trie tree to achieve the effective control of memory. The trie-tree structure can be implemented on a single chip and perform query operations by pipelining and parallelism, thus achieving higher throughput. The space complex of storing middle-point is O(n) and the construction time of hash table is linearly growing with the number of attack signatures. The experimental results show that the new structure decreases the demand of on-chip memory and can facilitate access to the attack signature on the on-chip memory while allowing to perform the signatures matching operations only once.
Reference | Related Articles | Metrics
Improved Normalized BP-Based decoding algorithm for low density parity check code
ZHANG Xiao-hua LI Yan-ping
Journal of Computer Applications    2012, 32 (01): 150-152.   DOI: 10.3724/SP.J.1087.2012.00150
Abstract1045)      PDF (541KB)(655)       Save
To further improve the decoding performance of the Normalized BP-Based algorithm, an improved Normalized BP-Based algorithm was proposed. The correction factor was changed dynamically according the amount of the information from the check nodes to variable nodes in order to achieve non-linear compensation of BP-Based algorithm. The simulation results show that when the bit error rate was less than 0.5×10-2, the improved algorithms could get about 0.1dB gain, compared with Normalized BP-Based algorithm, only with slight increase in complexity, and the number of iterations did not increase.
Reference | Related Articles | Metrics