Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Small object detection algorithm of YOLOv5 for safety helmet
Zongzhe LYU, Hui XU, Xiao YANG, Yong WANG, Weijian WANG
Journal of Computer Applications    2023, 43 (6): 1943-1949.   DOI: 10.11772/j.issn.1001-9081.2022060855
Abstract716)   HTML41)    PDF (3099KB)(531)       Save

Safety helmet wearing is a powerful guarantee of workers’ personal safety. Aiming at the collected safety helmet wearing pictures have characteristics of high density, small pixels and difficulty to detect, a small object detection algorithm of YOLOv5 (You Only Look Once version 5) for safety helmet was proposed. Firstly, based on YOLOv5 algorithm, the bounding box regression loss function and confidence prediction loss function were optimized to improve the learning effect of the algorithm on the features of dense small objects in training. Secondly, slicing aided fine-tuning and Slicing Aided Hyper Inference (SAHI) were introduced to make the small object produce a larger pixel area by slicing the pictures input into the network, and the effect of network inference and fine-tuning was improved. In the experiments, a dataset containing dense small objects of safety helmets in the industrial scenes was used for training. The experimental results show that compared with the original YOLOv5 algorithm, the improved algorithm can increase the precision by 0.26 percentage points, the recall by 0.38 percentage points. And the mean Average Precision (mAP) of the proposed algorithm reaches 95.77%, which is improved by 0.46 to 13.27 percentage points compared to several algorithms such as the original YOLOv5 algorithm. The results verify that the introduction of slicing aided fine-tuning and SAHI improves the precision and confidence of small object detection and recognition in the dense scenes, reduces the false detection and missed detection cases, and can satisfy the requirements of safety helmet wearing detection effectively.

Table and Figures | Reference | Related Articles | Metrics
Anesthesia resuscitation object detection method based on improved single shot multibox detector
Ronghao LUO, Zhiyou CHENG, Chuanjian WANG, Siqian LIU, Zhentian WANG
Journal of Computer Applications    2023, 43 (12): 3941-3946.   DOI: 10.11772/j.issn.1001-9081.2022121917
Abstract147)   HTML2)    PDF (2727KB)(84)       Save

The target detection model of anesthesia resuscitation is often used to help medical staff to perform resuscitation detection on anesthetized patients. The targets of facial actions during patient resuscitation are small and are not obvious, and the existing Single Shot multibox Detector (SSD) is difficult to accurately detect the facial micro-action features of patients in real time. Aiming at the problem that the original model has low detection speed and is easy to have missed detection, an anesthesia resuscitation object detection method based on improved SSD was proposed. Firstly, the backbone network VGG (Visual Geometry Group)16 of the original SSD was replaced by the lightweight backbone network MobileNetV2, and the standard convolutions were replaced by the depthwise separable convolutions. At the same time, the calculation method of first increasing and then reducing the dimension of the extracted features from patient photos was used to reduce computational cost, thereby improving detection speed of the model. Secondly, the Coordinate Attention (CA) mechanism was integrated into the feature layers with different scales extracted by the SSD, and the ability of the feature map to extract key information was improved by weighting the channel and location information, so that the network positioning and classification performance was optimized. Finally, comparative experiments were carried out on three datasets: CEW(Closed Eyes in the Wild), LFW(Labeled Faces in the Wild), and HAPF(Hospital Anesthesia Patient Facial). Experimental results show that the mean Average Precision (AP) of the proposed model reaches 95.23%, and the detection rate of photos is 24 frames per second, which are 1.39 percentage points higher and 140% higher than those of the original SSD model respectively. Therefore, the improved model has the effect of real-time accurate detection in anesthesia resuscitation detection, and can assist medical staff in resuscitation detection.

Table and Figures | Reference | Related Articles | Metrics
Semi-supervised representation learning method combining graph auto-encoder and clustering
Hangyuan DU, Sicong HAO, Wenjian WANG
Journal of Computer Applications    2022, 42 (9): 2643-2651.   DOI: 10.11772/j.issn.1001-9081.2021071354
Abstract508)   HTML55)    PDF (1000KB)(399)       Save

Node label is widely existed supervision information in complex networks, and it plays an important role in network representation learning. Based on this fact, a Semi-supervised Representation Learning method combining Graph Auto-Encoder and Clustering (GAECSRL) was proposed. Firstly, the Graph Convolutional Network (GCN) and inner product function were used as the encoder and the decoder respectively, and the graph auto-encoder was constructed to form an information dissemination framework. Then, the k-means clustering module was added to the low-dimensional representation generated by the encoder, so that the training process of the graph auto-encoder and the category classification of the nodes were used to form a self-supervised mechanism. Finally, the category classification of the low-dimensional representation of the network was guided by using the discriminant information of the node labels. The network representation generation, category classification, and the training of the graph auto-encoder were built into a unified optimization model, and an effective network representation result that integrates node label information was obtained. In the simulation experiment, the GAECSRL method was used for node classification and link prediction tasks. Experimental results show that compared with DeepWalk, node2vec, learning Graph Representations with global structural information (GraRep), Structural Deep Network Embedding (SDNE) and Planetoid (Predicting labels and neighbors with embeddings transductively or inductively from data), GAECSRL has the Micro?F1 index increased by 0.9 to 24.46 percentage points, and the Macro?F1 index increased by 0.76 to 24.20 percentage points in the node classification task; in the link prediction task, GAECSRL has the AUC (Area under Curve) index increased by 0.33 to 9.06 percentage points, indicating that the network representation results obtained by GAECSRL effectively improve the performance of node classification and link prediction tasks.

Table and Figures | Reference | Related Articles | Metrics
Research progress of blockchain‑based federated learning
Rui SUN, Chao LI, Wei WANG, Endong TONG, Jian WANG, Jiqiang LIU
Journal of Computer Applications    2022, 42 (11): 3413-3420.   DOI: 10.11772/j.issn.1001-9081.2021111934
Abstract1292)   HTML86)    PDF (1086KB)(979)       Save

Federated Learning (FL) is a novel privacy?preserving learning paradigm that can keep users' data locally. With the progress of the research on FL, the shortcomings of FL, such as single point of failure and lack of credibility, are gradually gaining attention. In recent years, the blockchain technology originated from Bitcoin has achieved rapid development, which pioneers the construction of decentralized trust and provides a new possibility for the development of FL. The existing research works on blockchain?based FL were reviewed, the frameworks for blockchain?based FL were compared and analyzed. Then, key points of FL solved by the combination of blockchain and FL were discussed. Finally, the application prospects of blockchain?based FL were presented in various fields, such as Internet of Things (IoT), Industrial Internet of Things (IIoT), Internet of Vehicles (IoV) and medical services.

Table and Figures | Reference | Related Articles | Metrics
Label noise filtering method based on dynamic probability sampling
Zenghui ZHANG, Gaoxia JIANG, Wenjian WANG
Journal of Computer Applications    2021, 41 (12): 3485-3491.   DOI: 10.11772/j.issn.1001-9081.2021061026
Abstract266)   HTML13)    PDF (1379KB)(126)       Save

In machine learning, data quality has a far-reaching impact on the accuracy of system prediction. Due to the difficulty of obtaining information and the subjective and limited cognition of human, experts cannot accurately mark all samples. And some probability sampling methods proposed in resent years fail to avoid the problem of unreasonable and subjective sample division by human. To solve this problem, a label noise filtering method based on Dynamic Probability Sampling (DPS) was proposed, which fully considered the differences between samples of each dataset. By counting the frequency of built-in confidence distribution in each interval and analyzing the trend of information entropy of built-in confidence distribution in each interval, the reasonable threshold was determined. Fourteen datasets were selected from UCI classic datasets, and the proposed algorithm was compared with Random Forest (RF), High Agreement Random Forest Filter (HARF), Majority Vote Filter (MVF) and Local Probability Sampling (LPS) methods. Experimental results show that the proposed method shows high ability on both label noise recognition and classification generalization.

Table and Figures | Reference | Related Articles | Metrics
Strategy with low redundant computation for reachability query preserving graph compression
Danfeng ZHAO, Junchen LIN, Wei SONG, Jian WANG, Dongmei HUANG
Journal of Computer Applications    2020, 40 (2): 510-517.   DOI: 10.11772/j.issn.1001-9081.2019091666
Abstract425)   HTML0)    PDF (634KB)(275)       Save

Since some computation in reachability Query Preserving Graph Compression (QPGC) algorithm are redundant, a high-performance compression strategy was proposed. In the stage of solving the vertex sets of ancestors and descendants, an algorithm named TSB (Topological Sorting Based algorithm for solving ancestor and descendant sets) was proposed for common graph data. Firstly, the vertices of the graph data were topological sorted. Then, the vertex sets were solved in the order or backward order of the topological sequence, avoiding the redundant computation caused by the ambiguous solution order. And an algorithm based on graph aggregation operation was proposed for graph data with short longest path, namely AGGB (AGGregation Based algorithm for solving ancestor and descendant sets), so the vertex sets were able to be solved in a certain number of aggregation operations. In the stage of solving reachability equivalence class, a Piecewise Statistical Pruning (PSP) algorithm was proposed. Firstly, piecewise statistics of ancestors and descendants sets were obtained and then the statistics were compared to achieve the coarse matching, and some unnecessary fine matches were pruned off. Experimental results show that compared with QPGC algorithm: in the stage of solving the vertex sets of ancestors and descendants, TSB and AGGB algorithm have the performance averagely increased by 94.22% and 90.00% respectively on different datasets; and in the stage of solving the reachability equivalence class, PSP algorithm has the performance increased by more than 70% on most datasets. With the increasing of the dataset, using TSB and AGGB cooperated with PSP has the performance improved by nearly 28 times. Theoretical analysis and simulation results show that the proposed strategy has less redundant computation and faster compression speed compared to QPGC.

Table and Figures | Reference | Related Articles | Metrics
Meta path-based dynamic similarity search in heterogeneous information network
CHEN Xiangtao DING Pingjian WANG Jing
Journal of Computer Applications    2014, 34 (9): 2604-2607.   DOI: 10.11772/j.issn.1001-9081.2014.09.2604
Abstract300)      PDF (759KB)(495)       Save

The existing similarity search algorithms do not consider the time factor. To address this problem, a meta path-based dynamic similarity search algorithm named PDSim was proposed for the heterogeneous information network. Firstly, PDSim calculated the link matrix of object under the given meta-path, thus obtained the instances ratio of meta-path between different objects. Meanwhile, the differences of establishing time were calculated. Finally, the dynamic similarity was measured under the given meta-path. In multiple instances of the similarity search, PDSim kept up with the interest variation of object which dynamically changed with time. Compared with the PathSim (Meta Path-Based Similarity) and PCRW (Path-Constrained Random Walks) methods, the clustering accuracy of Normalized Mutual Information (NMI) could be increased by 0.17% to 9.24% when applied to clustering. The experimental results show that, compared to the traditional similarity search algorithm based on link, the efficiency of dynamic similarity search and the satisfaction of user of PDSim are significantly improved, and it is a dynamic similarity search algorithm for object changes with time.

Reference | Related Articles | Metrics
Fast algorithm for sparse decomposition of real first-order polynomial phase signal based on group testing
OU Guojian WANG Weiqiang JIANG Qingping
Journal of Computer Applications    2014, 34 (6): 1604-1607.   DOI: 10.11772/j.issn.1001-9081.2014.06.1604
Abstract173)      PDF (705KB)(373)       Save

Concerning the huge calculation of sparse decomposition, a fast sparse decomposition algorithm with low computation complexity was proposed for first-order Polynomial Phase Signals (PPS). In this algorithm, firstly,two concatenate dictionaries including Df and Dp were constructed, and the atoms in the Df were constructed by the frequency, and the atoms in the Dp were constructed by the phase.Secondly, for the dictionary Df, the group testing was used to search the atoms that matched the signal, and the correlation values of the atoms and the signal were tested twice to achieve the reliability. Finally, according to the matching frequency atoms tested by group testing, the dictionary Dp was constructed, and the matching phase atoms were searched by Matching Pursuit (MP) algorithm. Therefore, the sparse decomposition of real first-order PPS was finished. The simulation results show that the computational efficiency of the proposed algorithm is about 604 times as high as that of matching pursuit and about 139 times as high as that of genetic algorithm, hence the presented algorithm has less computation complexity, and can finish sparse decomposition fast. The complexity of the algorithm is only O(N).

Reference | Related Articles | Metrics
MapReduce tasks scheduling model based on matching rules
JIN Weijian WANG Chunzhi
Journal of Computer Applications    2014, 34 (4): 1010-1013.   DOI: 10.11772/j.issn.1001-9081.2014.04.1010
Abstract561)      PDF (765KB)(425)       Save

MapReduce is one of the popular distributed computing frameworks based on an open source cloud platform named Hadoop. However, the First-In First-Out (FIFO) scheduling algorithm of MapReduce is inefficient in resources utilization. A new tasks scheduling model based on resources matching rules was proposed and implemented. After obtaining the tasks resources requirement and remainder resources on computing nodes, the model assigned tasks to computing nodes based on resources matching degree to improve the usage efficiency of system resources. First of all, the model for MapReduce scheduling was established, the quantitative definition of resources and matching degree were given, and the corresponding calculation formulas were put forward. Second, the specific methods of resource measurement and the implementation of the algorithm were introduced. Compared with FIFO scheduling algorithm on TeraSort, GrepCount and WordCount, the experimental results show that the proposed model reduces by 22.19% in tasks completion time in the best case, and increases by 25.39% in throughput even in the worst case.

Reference | Related Articles | Metrics
Continuous-valued attributes reduction algorithm based on gray correlation
ZHANG Jian WANG Jindong YU Dingkun
Journal of Computer Applications    2014, 34 (2): 401-405.  
Abstract409)      PDF (725KB)(413)       Save
Since most current attributes reduction algorithm can be only used for discrete decision tables, the correlation degree between condition attributes and decision attributes was defined as the importance degree of attributes, and meanwhile the overlap degree was defined based on the correlation degree and importance degree among attributes. The condition attributes' importance was renewed according to the overlap degree. To achieve the reduction of continuous-valued attributes set, an attributes reduction algorithm based on gray correlation analysis was proposed. The feasibility and effectiveness of the algorithm were verified in the simulation.
Related Articles | Metrics
Semi-supervised SVM image classification method with pre-selected sample by fuzzy C-mean
CHEN Yongjian WANG Xili
Journal of Computer Applications    2014, 34 (1): 260-264.   DOI: 10.11772/j.issn.1001-9081.2014.01.0260
Abstract616)      PDF (691KB)(491)       Save
In order to solve the problems that the semi-supervised classification method based on Laplacian Support Vector Machines (LapSVM) requires that all unlabeled sample should be added to the training set to train a classifier, the algorithm demands high time and space and cannot effectively deal with large-scale image classification, Fuzzy C-Mean (FCM) pre-selected sample of LapSVM image classification method was proposed. The method used FCM algorithm for clustering the unlabeled samples. According to the clustering results, unlabeled samples of near optimal separating hyper-plane were selected to add to the training sample set, and these samples may be support vector carrying useful information for classification. The quantity was only a small part of the unlabeled samples, so the training sample set was reduced. The simulation results show that this method takes advantage of the inherent discrimination information of the unlabeled samples, effectively improves the accuracy of classifiers, and reduces the algorithm's time and space complexity.
Related Articles | Metrics
Timelag weakening strategy for enhancing reliability of trust evaluation
HAN Zhigeng CHEN Geng JIANG Jian WANG Liangmin
Journal of Computer Applications    2014, 34 (1): 82-85.   DOI: 10.11772/j.issn.1001-9081.2014.01.0082
Abstract509)      PDF (608KB)(517)       Save
To reduce the negative impact of the inherent time lag property of trust evaluation on the result of evaluation, new time lag weakening policies for enhancing trust evaluation reliability were proposed by integrating the trust trends of target entity into trust evaluation process with second derivative as the measurement tool. In order to check the effectiveness of this strategy, with the idea of reverse engineering, the authors used it to extend the famous trust revaluation model proposed by Srivatsa. The results show the parts of trust evaluation result with the extended model is closer to the real behavior of the target entity than that of the original model, and the former is more capable of inhibiting the fluctuating behavior of malicious entity. All of these indicate that the time lag weakening policies can be used to enhance the reliability of trust evaluation.
Related Articles | Metrics
Iteration MapReduce framework for evolution algorithm
JIN Weijian WANG Chunzhi
Journal of Computer Applications    2013, 33 (12): 3591-3595.  
Abstract615)      PDF (806KB)(386)       Save
Modular programming of MapReduce greatly simplifies the implementation difficulty of distributed programming; however, its application scope is limited. In view of that MapReduce cannot be used to solve iteration algorithm, a new iteration MapReduce framework was proposed for evolutionary algorithm based on the study of MapReduce framework. The basic structure of the MapReduce was introduced, and the defects in implementing iteration algorithm were pointed out. The realization requirements and implementation of the proposed MapReduce framework were introduced, and the feasibility of abnormal mechanism was proposed and verified. At last, the new MapReduce framework was verified on Hadoop. The experimental results show that the parallel genetic algorithm based on the iteration MapReduce framework has higher speedup than that of MapReduce framework.
Related Articles | Metrics
Agent-based provable data possession scheme for mobile cloud computing
YANG Jian WANG Jian WANG Haihang YANG Dengqi
Journal of Computer Applications    2013, 33 (03): 743-747.   DOI: 10.3724/SP.J.1087.2013.00743
Abstract724)      PDF (990KB)(586)       Save
The existing Provable Data Possession (PDP) schemes cannot be directly applied in mobile cloud computing because the terminal' storage space and computing power are limited for the computationally intensive operations in those schemes. Addressing this issue, an Agent-based PDP scheme was proposed for mobile cloud computing. A semi-trusted security computation Agent was introduced between the terminal and the cloud server in order to help end-users complete the computationally intensive operations, so that the PDP scheme can be applied in mobile computing. A concrete PDP scheme was presented and a formal proof shows it satisfies the Chosen Plaintext Attack (CPA) security under random oracle model. The quantitative analysis results show that the scheme is fit for mobile cloud computing.
Reference | Related Articles | Metrics
QR code recognition based on sparse representation
SUN Daoda ZHAO Jian WANG Rui FENG Ning HU Jianghua
Journal of Computer Applications    2013, 33 (01): 179-181.   DOI: 10.3724/SP.J.1087.2013.00179
Abstract1065)      PDF (585KB)(550)       Save
With regard to the problem that recognition software does not work when the Quick Response (QR) code image is contaminated, damaged or obscured, a QR code recognition method based on sparse representation was proposed. Forty categories QR code images were used as research subjects and each category has 13 images. Three images were randomly selected from each category and thus a total of 120 images were got as the training sample and the remaining 400 as test sample. Sparse representation dictionary was composed of all training samples. The test samples were a sparse linear combination of the training samples and the coefficients were sparse. The projection of each test sample in the dictionary was calculated, so category with the smallest residual was classification category. Finally, comparison and analysis were done between the recognition results of the proposed method and the QR code recognition software PsQREdit. The experimental results show that, the proposed method is able to correctly identify for partially contaminated, damaged and obscured image, and it has good robustness. It is a new effective means for the recognition of QR code.
Reference | Related Articles | Metrics
Research and defence of new vulnerability exploiting method
Kai-Jian WANG Xiao-Bo Luo
Journal of Computer Applications   
Abstract1594)      PDF (949KB)(879)       Save
Based on the technology of Windows Heap Managing, a new vulnerability exploiting method made a programme exception become an exploitable vulnerability. This paper began with analyzing the programme exception, systemly disscussed the whole exploiting processs and the reasons. Then according to the specific IE vulnerability, the exploiting method and its danger were analyzed. At last, some defences of the vulnerability were dicussed.
Related Articles | Metrics
Dynamic traffic model under emergency incident and bidirectional dynamic shortest path algorithm
Zi-hui REN Jian WANG
Journal of Computer Applications   
Abstract1737)      PDF (716KB)(1204)       Save
A macroscopic dynamic traffic model for emergent incidents was presented with consideration of the number of the driveway, on-ramps and off-ramps and guidance instruction based on model METANET. And a bidirectional dynamic shortest path guidance algorithm for dealing with the emergent incidents timely and efficiently was also proposed. The weight altered dynamically with the change of the freeway and traffic jam. The shortest path from the two directions, which were timely and dynamically to strive for time in the processing of dealing with emergent incidents and succor, was searched. The simulation results show that the algorithm is feasible and effective and the efficiency of this algorithm has been improved.
Related Articles | Metrics
Design of wireless video transmission system based on dual-channel
Jin QI Jian WANG Xiao-yong JI
Journal of Computer Applications    2008, 28 (11): 2756-2758.  
Abstract1574)      PDF (814KB)(1164)       Save
A novel prototype system to obtain real-time and high quality video transmission in wireless environment of high packet loss rate and limited bandwidth was introduced. The wireless terminal used high performance multimedia Digital Signal Processor (DSP) as video processing and control core. Video signal was encoded by H.264 and transmitted over dual-channel of Enhanced Data rate for GSM Evolution (EDGE) to the video services. A transmission method and an error conceal method based on dual-channel buffers were proposed. The experimental results show that the system can transmit real-time video (CIF) and achieve satisfactory reconstructed video.
Related Articles | Metrics