Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Image classification algorithm based on overall topological structure of point cloud
Jie WANG, Hua MENG
Journal of Computer Applications    2024, 44 (4): 1107-1113.   DOI: 10.11772/j.issn.1001-9081.2023050563
Abstract73)   HTML4)    PDF (2456KB)(76)       Save

Convolutional Neural Network (CNN) is sensitive to the local features of data due to the complex classification boundaries and too many parameters. As a result, the accuracy of CNN model will decrease significantly when it is attacked by adversarial attacks. However, the Topological Data Analysis (TDA) method pays more attention to the macro features of data, which naturally can resist noise and gradient attacks. Therefore, an image classification algorithm named MCN (Mapper-Combined neural Network) combining topological data analysis and CNN was proposed. Firstly, the Mapper algorithm was used to obtain the Mapper map that described the macro features of the dataset. Each sample point was represented by a new feature using a multi-view Mapper map, and the new feature was represented as a binary vector. Then, the hidden layer feature was enhanced by combining the new feature with the hidden layer feature extracted by the CNN. Finally, the feature-enhanced sample data was used to train the fully connected classification network to complete the image classification task. Comparing MCN with pure convolutional network and single Mapper feature classification algorithm on MNIST and FashionMNIST data sets, the initial classification accuracy of the MCN with PCA (Principal Component Analysis) dimension reduction is improved by 4.65% and 8.05%, the initial classification accuracy of the MCN with LDA (Linear Discriminant Analysis) dimensionality reduction is improved by 8.21% and 5.70%. Experimental results show that MCN has higher classification accuracy and stronger anti-attack capability.

Table and Figures | Reference | Related Articles | Metrics
Scene graph-aware cross-modal image captioning model
Zhiping ZHU, Yan YANG, Jie WANG
Journal of Computer Applications    2024, 44 (1): 58-64.   DOI: 10.11772/j.issn.1001-9081.2022071109
Abstract262)   HTML4)    PDF (1879KB)(173)       Save

Aiming at the forgetting and underutilization of the text information of image in image captioning methods, a Scene Graph-aware Cross-modal Network (SGC-Net) was proposed. Firstly, the scene graph was utilized as the image’s visual features, and the Graph Convolutional Network (GCN) was utilized for feature fusion, so that the visual and textual features were in the same feature space. Then, the text sequence generated by the model was stored, and the corresponding position information was added as the textual features of the image, so as to solve the problem of text feature loss brought by the single-layer Long Short-Term Memory (LSTM) Network. Finally, to address the issue of over dependence on image information and underuse of text information, the self-attention mechanism was utilized to extract significant image information and text information and fuse then. Experimental results on Flickr30K and MS-COCO (MicroSoft Common Objects in COntext) datasets demonstrate that SGC-Net outperforms Sub-GC on the indicators BLEU1 (BiLingual Evaluation Understudy with 1-gram), BLEU4 (BiLingual Evaluation Understudy with 4-grams), METEOR (Metric for Evaluation of Translation with Explicit ORdering), ROUGE (Recall-Oriented Understudy for Gisting Evaluation) and SPICE (Semantic Propositional Image Caption Evaluation) with the improvements of 1.1,0.9,0.3,0.7,0.4 and 0.3, 0.1, 0.3, 0.5, 0.6, respectively. It can be seen that the method used by SGC-Net can increase the model’s image captioning performance and the fluency of the generated description effectively.

Table and Figures | Reference | Related Articles | Metrics
Review of applications of natural language processing in text sentiment analysis
Yingjie WANG, Jiuqi ZHU, Zumin WANG, Fengbo BAI, Jian GONG
Journal of Computer Applications    2022, 42 (4): 1011-1020.   DOI: 10.11772/j.issn.1001-9081.2021071262
Abstract2309)   HTML192)    PDF (783KB)(1284)       Save

Text sentiment analysis has gradually become an important part of Natural Language Processing(NLP) in the fields of systematic recommendation and acquisition of user sentiment information, as well as public opinion reference for the government and enterprises. The methods in the field of sentiment analysis were compared and summarized by literature research. Firstly, literature investigation was carried out on the methods of sentiment analysis from the dimensions of time and method. Then, the main methods and application scenarios of sentiment analysis were summarized and compared. Finally, the advantages and disadvantages of each method were analyzed. According to the analysis results, in the face of different task scenarios, there are mainly three sentiment analysis methods: sentiment analysis based on emotion dictionary, sentiment analysis based on machine learning and sentiment analysis based on deep learning. The method based on multi-strategy mixture has become the trend of improvement. Literature investigation shows that there is still room for improvement in the techniques and methods of text sentiment analysis, and it has a large market and development prospects in e-commerce, psychotherapy and public opinion monitoring.

Table and Figures | Reference | Related Articles | Metrics
Dust accumulation degree recognition of photovoltaic panel based on improved deep residual network
Pengxiang SUN, Li BI, Junjie WANG
Journal of Computer Applications    2022, 42 (12): 3733-3739.   DOI: 10.11772/j.issn.1001-9081.2021101715
Abstract312)   HTML8)    PDF (3164KB)(168)       Save

The dust accumulation on photovoltaic panels will reduce the conversion efficiency of photovoltaic power generation, and easily cause damage to the photovoltaic panels at the same time. Therefore, it is of great significance to recognize the dust accumulation of photovoltaic panels intelligently. Aiming at above problems, a dust accumulation degree recognition model of photovoltaic panel based on improved deep residual network was proposed. Firstly, the NeXt Residual Network (ResNeXt)50 was improved by decomposing convolution and fine-tuning down-sampling. Then, the Coordinate Attention (CA) mechanism was fused to embed the location information into channel attention, the channel relationship and long-term dependence were encoded by using the accurate location information, and the feature map was decomposed into two one-dimensional codes by using the two-dimensional global pooling operation, thereby enhencing the representation of the objects of attention. Finally, the cross-entropy loss function was replaced by the Supervised Contrast (SupCon) learning loss function to effectively improve the recognition accuracy. Experimental results show that in the recognition of the dust accumulation of photovoltaic panel at four levels of real photovoltaic power stations, the improved ResNeXt50 model has a recognition accuracy of 90.7%, which is increased by 7.2 percentage points compared with that of the original ResNeXt50. The proposed model can meet the basic requirements of intelligent operation and maintenance of photovoltaic power stations.

Table and Figures | Reference | Related Articles | Metrics
Personal event detection method based on text mining in social media
Rui XIAO, Mingyi LIU, Zhiying TU, Zhongjie WANG
Journal of Computer Applications    2022, 42 (11): 3513-3519.   DOI: 10.11772/j.issn.1001-9081.2022010106
Abstract299)   HTML7)    PDF (2013KB)(77)       Save

Users’ social media contains their past personal experiences and potential life patterns, and the study of their patterns is of great value for predicting users’ future behaviors and performing personalized recommendations for users. By collecting Weibo data, 11 types of events were defined, and a three?stage Pipeline system was proposed to detect personal events by using BERT (Bidirectional Encoder Representations from Transformers) pre?trained models in three stages respectively, including BERT+BiLSTM+Attention, BERT+FullConnect and BERT+BiLSTM+CRF. The information of whether the text contained defined events, the event types of events contained, and the elements contained in each event were extracted from the Weibo, and the specific elements are Subject (subject of the event), Object (event element), Time (event occurrence time), Place (place where the event occurred) and Tense (tense of the event), thereby exploring the change law of user’s personal event timeline to predict personal events. Comparative experiments and analysis were conducted with classification algorithms such as logistic regression, naive Bayes, random forest and decision tree on a collected real user Weibo dataset. Experimental results show that the BERT+BiLSTM+Attention, BERT+FullConnect, BERT+BiLSTM+CRF methods used in three stages achieve the highest F1?score, verifying the effectiveness of the proposed methods. Finally, the personal event timeline was visually built according to the extracted events with time information.

Table and Figures | Reference | Related Articles | Metrics
Multi-site temperature prediction model based on graph convolutional network and gated recurrent unit
Donglin MA, Sizhou MA, Weijie WANG
Journal of Computer Applications    2022, 42 (1): 287-293.   DOI: 10.11772/j.issn.1001-9081.2021010099
Abstract461)   HTML25)    PDF (753KB)(194)       Save

Spatio-temporal prediction task is widely applied in neuroscience, transportation, meteorology and other fields. As a typical spatio-temporal prediction task, temperature prediction needs to dig out the inherent spatio-temporal characteristics of temperature data. Aiming at the problems of large prediction error and insufficient spatial feature extraction in the existing temperature prediction algorithms, a temperature prediction model based on Graph Convolutional Network and Gated Recurrent Unit (GCN-GRU) was proposed. Firstly, the methods of weight redistribution and multi-order neighbor connection were used to modify Graph Convolutional Network (GCN) in order to effectively mine the unique spatial characteristics of the meteorological data. Secondly, the matrix multiplication of each recurrent unit in the Gated Recurrent Unit (GRU) was replaced by graph convolution operation, and all the recurrent units were connected in series to form a graph convolutional gating layer. Then, the graph convolutional gating layer was used to build the main network structure to extract the spatio-temporal characteristics of the data. Finally, the temperature prediction results were output through a fully connected output layer. Compared with the single models such as Gated Recurrent Unit (GRU) and Long Short-Term Memory (LSTM), GCN-GRU had the Mean Absolute Error (MAE)reduced by 0.67 and 0.83 respectively; compared with the prediction model combined with Chebyshev graph convolution and Long Short-Term Memory (Cheb-LSTM) and the prediction model combined with Graph Convolutional Network and Long Short-Term Memory (GCN-LSTM), the proposed model had the MAE reduced by 0.36 and 0.23 respectively.

Table and Figures | Reference | Related Articles | Metrics
Fast file access system for NVM storage systems
Qingjian HE, Tao CAI, Jie WANG, Dejiao NIU
Journal of Computer Applications    2020, 40 (2): 541-546.   DOI: 10.11772/j.issn.1001-9081.2019091655
Abstract439)   HTML0)    PDF (602KB)(212)       Save

NVM (Non-Volatile Memory) storage system has the potential to provide high throughput, including near-memory read and write speeds, byte addressing features, and support for multi-way forwarding. However, the existing system software stack is not designed for NVM, which makes the system software stack have many factors that affect system access performance. Through analysis, it is found that the lock mechanism of the file system has a large overhead, which makes the concurrent access of data to be a difficult problem under multi-core environment. In order to alleviate these problems, a lock-free file reading and writing mechanism as well as a byte-based read and write interface were designed. By eliminating the file-based lock mechanism, the coarse-grained access control was changed, and the self-management request was used to improve the concurrency of the process. When designing the new file access interface that can utilize byte addressing, the read-write asymmetry as well as the different characteristics of the read and write operations of the NVM storage device were considered. These designs reduce the overhead of the software stack and make the full use of NVM features to provide a high concurrent, high throughput, and durable storage system. Finally, based on the open source NVM simulator PMEM, the FPMRW prototype system was implemented, and the universal test tool Filebench was used to test and analyze the FPRRW. The results show that the FPMRW can improve the system throughput by 3%-40% compared with EXT+PMEM and XFS+PMEM.

Table and Figures | Reference | Related Articles | Metrics
Detection method for echo hiding based on convolutional neural network framework
Jie WANG, Rangding WANG, Diqun YAN, Yuzhen LIN
Journal of Computer Applications    2020, 40 (2): 375-380.   DOI: 10.11772/j.issn.1001-9081.2019081400
Abstract364)   HTML1)    PDF (713KB)(418)       Save

Echo hiding is a steganographic technique with audio as carrier. Currently, the steganalysis methods for echo hiding mainly use the cepstral coefficients as handcrafted-features to realize classification. However, when the echo amplitude is low, the detection performance of these traditional methods is not high. Aiming at the low echo amplitude condition, a steganalysis method for echo hiding based on Convolutional Neural Network (CNN) was proposed. Firstly, Short-Time Fourier Transform (STFT) was used to extract the amplitude spectrum coefficient matrix as the shallow feature. Secondly, the deep feature was extracted by the designed CNN framework from the shallow feature. The network framework consisted of four convolutional blocks and three fully connected layers. Finally, the classification results were output by Softmax. The proposed method was steganographically evaluated on three classic echo hiding algorithms. Experimental results indicate that the detection rates of the proposed method under low echo amplitude are 98.62%, 98.53% and 93.20% respectively. Compared with the existing traditional handcrafted-features based methods and deep learning based methods, the proposed method has the detection performance improved by more than 10%.

Table and Figures | Reference | Related Articles | Metrics
Culling of foreign matter fake information in detection of subminiature accessory based on prior knowledge
ZHEN Rongjie WANG Zhong LIU Wenjing GOU Jiansong
Journal of Computer Applications    2014, 34 (5): 1458-1462.   DOI: 10.11772/j.issn.1001-9081.2014.05.1458
Abstract196)      PDF (810KB)(385)       Save

In visual detection of subminiature accessory, the extracted target contour will be affected by the existence of foreign matter in the field like dust and hair crumbs. In order to avoid the impact for measurement brought by foreign matter, a method of culling foreign matter fake information based on prior knowledge was put forward. Firstly, the corners of component image with foreign matter were detected. Secondly, the corner-distribution features of standard component were obtained by statistics. Finally, the judgment condition of foreign matter fake imformation was derived from the corner-distribution features of standard component to cull the foreign matter fake information. Through successful application in an actual engineering project, the processing experiments on three typical images with foreign matter prove that the proposed algorithm ensures the accuracy of the measurement, while effectively culling the foreign matter fake information in the images.

Reference | Related Articles | Metrics
Image retrieval based on enhanced micro-structure and context-sensitive similarity
HU Yangbo YUAN Jie WANG Lidong
Journal of Computer Applications    2014, 34 (10): 2938-2943.   DOI: 10.11772/j.issn.1001-9081.2014.10.2938
Abstract272)      PDF (994KB)(526)       Save

A new image retrieval method based on enhanced micro-structure and context-sensitive similarity was proposed to overcome the shortcoming of high dimension of combined image feature and intangible combined weights. A new local pattern map was firstly used to create filter map, and then enhanced micro-structure descriptor was extracted based on color co-occurrence relationship. The descriptor combined several features with the same dimension as single color feature. Based on the extracted descriptor, normal distance between image pairs was calculated and sorted. Combined with the iterative context-sensitive similarity, the initial sorted image series were re-ranked. With setting the value of iteration times as 50 and considering the top 24 images in the retrieved image set, the comparative experiments with Multi-Texton Histogram (MTH) and Micro-Structure Descriptor (MSD) show that the retrieval precisions of the proposed algorithm respectively are increased by 13.14% and 7.09% on Corel-5000 image set and increased by 11.03% and 6.8% on Corel-10000 image set. By combining several features and using context information while keeping dimension unchanged, the new method can enhance the precision effectively.

Reference | Related Articles | Metrics
Cryptanalysis and improvement of a certificateless signature scheme
HE Junjie WANG Juan QI Chuanda
Journal of Computer Applications    2013, 33 (05): 1378-1381.   DOI: 10.3724/SP.J.1087.2013.01378
Abstract1123)      PDF (643KB)(678)       Save
Security analysis of the certificateless signature scheme proposed by Guo L L, et al. (Guo L L, Lin C L, Zhang S Y. Attack and improvement for certificateless signature scheme. Computer Engineering, 2012, 38(16): 134-137,141) showed that the scheme was insecure against public key replacement attack. An improved scheme which can resist public key replacement attack was proposed. The scheme was proved to be existentially unforgeable against adaptive chosen message and identity attacks in random oracle model, and the security was reduced to computational Diffie-Hellman assumption. Compared with other certificateless signature schemes based on bilinear pairing, the improved scheme has better computational efficiency.
Reference | Related Articles | Metrics
Digital watermarking algorithm of anti-geometric attacks based on SIFT
GAO Huming LI Kaijie WANG Yingjuan
Journal of Computer Applications    2013, 33 (03): 748-751.   DOI: 10.3724/SP.J.1087.2013.00748
Abstract816)      PDF (746KB)(479)       Save
To solve the problems that the digital watermark information are vulnerable to geometric attacks and the balance between invisibility and robustness of watermarking algorithm, a digital watermarking algorithm was proposed based on Scale Invariant Feature Transform (SIFT) for image local feature points. Based on SIFT algorithm local feature points, circular Local Feature Area (LFA) that met certain conditions were found. After the LFA regularization, the watermarking was embedded in intermediate frequency coefficient of LFA Discrete Cosine Transform (DCT) domain. Among them, considering the influence of the watermark information on the image quality, the embedding strength was dynamically adjusted according to the Watson human visual model. The experimental results show that the Peak Signal-to-Noise Ratio (PSNR) and the similarity of watermark get higher. The algorithm guarantees better watermark invisibility and robustness performance under certain geometric attacks.
Reference | Related Articles | Metrics
Information aggregation leakage proof model based on assignment partition
XIE Wenchong YANG Yingjie WANG Yongwei DAI Xiangdong
Journal of Computer Applications    2013, 33 (02): 408-416.   DOI: 10.3724/SP.J.1087.2013.00408
Abstract753)      PDF (791KB)(317)       Save
To solve the problems existing in BLP (Bell-LaPadula) model, such as information aggregation leakage, excessive privileges of trusted subject and the deficiency of integrity, with reference to the application requirement of hierarchical file protection, an information aggregation leakage proof model named IALP (Information Aggregation Leakage Proof) was proposed based on assignment partition. First of all, the cause of information aggregation leakage and the current research situation were discussed. Secondly, on the basis of assignments partition, the knowledgeable degree of subject and the information weight of object were quantized, and the relatively trusted subject was proposed. Security axioms and state transition rules were given. Finally, the theoretical proof, application examples and analysis indicate that IALP can control the knowable degree of the subject towards the object set with the aggregation leakage relation, and limits the privilege of trusted subject and enhances the integrity to some extent.
Related Articles | Metrics
Secure and efficient ID-based partially blind signature scheme
HE Jun-jie WANG Juan QI Chuan-da
Journal of Computer Applications    2012, 32 (05): 1388-1391.  
Abstract1103)      PDF (1994KB)(559)       Save
Partially blind signature allows signer to add some public information negotiated by signer and user to signature, and better solves the conflict between anonymity and controllability of blind signature. Utilizing the Shim's (SHIM K A. An ID-based aggregate signature scheme with constant pairing computations. The Journal of Systems and Software, 2010, 83(10): 1873-1880 )ID-based signature scheme, a new provable secure ID-based partially blind signature scheme was proposed. The scheme was proved to be existentially unforgeable against adaptive chosen message and identity attacks in random oracle model, and the security was reduced to computational Diffie-Hellman assumption. Compared with other ID-based partially blind signature schemes in random oracle model, the proposed scheme has better computational efficiency and less communication.
Reference | Related Articles | Metrics
Precision test method based on continued-fraction approximation
XU Jin-chen GUO Shao-zhong ZHAO Jie WANG Qian
Journal of Computer Applications    2011, 31 (10): 2600-2602.   DOI: 10.3724/SP.J.1087.2011.02600
Abstract1379)      PDF (596KB)(589)       Save
Poor adaptability and slow convergence rate are the two main disadvantages of the existing precision test methods. To solve this problem, an elementary functions precision test method based on continued-fraction approximation was proposed by analyzing Unit in the Last Place (ULP) error and comparing several different functions true values calculations. The different calculations were analyzed and tested in the following two ways: time complexity and convergence degree. The experimental results show that the precision test method based on continued-fraction approximation is more effective, less complex and achieves faster convergence.
Related Articles | Metrics
Trust evaluation based on community discovery in multi-Agent system
Xing-hua YANG Wen-jie WANG Xiao-feng WANG Zhong-zhi SHI
Journal of Computer Applications    2011, 31 (08): 2068-2071.   DOI: 10.3724/SP.J.1087.2011.02068
Abstract1287)      PDF (855KB)(798)       Save
To solve the trust problem among Agents brought about by the characteristics of openness, dynamics and uncertainty of Multi-Agent System (MAS), a method for trust evaluation based on community discovery was proposed. Firstly, the G-N algorithm (GIRVAN M, NEWMAN M E J. Community structure in social and biological networks. Proceedings of the National Academy of Sciences of the United States of America, 2002, 99(12): 7821-7826) was employed to discover the community structure in the system. Both the inner and outer community reputations of the estimated Agents were calculated respectively by use of the belief of the recommending Agents, and then the total trust value was further assessed by combining the reputations and the direct trust values. Furthermore, the dynamic adjustment of Agent's trust value was realized via cooperation feedback. Lastly, the simulation results show that the community discovery-based trust evaluation method can effectively evaluate the Agent's trust value, and further enhance the ratio of successful interactions with the introduction of the feedback mechanism.
Reference | Related Articles | Metrics