Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Framework of serial multimodal biometrics with parallel fusion
LI Haixia, ZHANG Qing
Journal of Computer Applications    2015, 35 (10): 2789-2792.   DOI: 10.11772/j.issn.1001-9081.2015.10.2789
Abstract440)      PDF (801KB)(381)       Save
In the multimodal biometric system, the parallel fusion mode has more advantages than the serial fusion mode in convenience and efficiency. Based on current works on serial multimodal biometric system, a framework combined with parallel fusion mode and serial fusion mode was proposed. In the framework, the weighted score level fusion algorithm using biological features of gait, face and finger was proposed at first;then semi-supervised learning techniques were used to improve the performance of weak traits in the system, and the simultaneous upgrade of user convenience and recognition accuracy was achieved. Analysis and experimental result indicate that the performance of the weak classifier can be improved by online learning, the convenience and recognition accuracy are successfully promoted in this framework.
Reference | Related Articles | Metrics
Secure cross-layer transmission protocol of orthogonal frequency division multiplexing vehicular Ad-Hoc network
REN Guofeng JI Jiang LI Haixia TIAN Zhumei
Journal of Computer Applications    2014, 34 (5): 1232-1235.   DOI: 10.11772/j.issn.1001-9081.2014.05.1232
Abstract407)      PDF (771KB)(20846)       Save

To prevent eavesdropping in Orthogonal Frequency Division Multiplexing Vehicular Ad-Hoc Network (OFDM-VANET), a cross-layer security routing protocol was presented in this paper, which includes two parts: secure routing protocol and secure frequency diversity. On the one hand, the eavesdropping of the unrelated node was prevented, by limiting its knowledge on information transmission routing. On the other hand, in the diversity of physical layer receiving, the fading difference among wireless channels, which was transparently transmitted from network layer, was utilized to identify the destination node and eavesdropping nodes. The theory analysis and simulation results illustrate that, when the vehicle on a scale of 1000 to 2000, the protocol makes instantaneous eavesdroppers only about 3. Compared to the conventional methods, it can effectively reduce the number of eavesdroppers.

Reference | Related Articles | Metrics
Sequential acquisition method based on sequence core transform
TIAN Zhumei JI Jiang REN Guofeng LI Haixia
Journal of Computer Applications    2013, 33 (05): 1255-1259.   DOI: 10.3724/SP.J.1087.2013.01255
Abstract737)      PDF (781KB)(609)       Save
The existing sequential acquisition methods search the correlation peak continuously in receiving signals, thus wasting a great deal of calculation resources to search correlation peak in the received signal containing no target sequence. In another case, with the sequence period increasing, the calculation resources perform exponential growth. As a result, the target sequence can be hardly got. In order to reduce the calculation resources, the paper presented a sequence core transform method to acquire the sequence. The method compressed the entire sequence information into the local sequence core, and by this sequence core, the acquiring process was divided into two steps: sequence detection and sequence acquisition. In this process, the calculation resources were reduced because the sequence acquisition only occured in the second step. Furthermore, by using the down-sampling on received signals, the sequence core transform could decrease the sequence amount needed in the acquiring process. The theoretical analysis and simulation results show that, by losing some acquiring performance, the algorithm can reduce the calculation resources to complete acquisition in one sequence period. And the reduced calculation resources increase with the sequence period.
Reference | Related Articles | Metrics