Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Improved practical Byzantine fault tolerance consensus algorithm based on Raft algorithm
WANG Jindong, LI Qiang
Journal of Computer Applications    2023, 43 (1): 122-129.   DOI: 10.11772/j.issn.1001-9081.2021111996
Abstract723)   HTML34)    PDF (2834KB)(347)       Save
Since Practical Byzantine Fault Tolerance (PBFT) consensus algorithm applied to consortium blockchain has the problems of insufficient scalability and high communication overhead, an improved practical Byzantine fault tolerance consensus algorithm based on Raft algorithm named K-RPBFT (K-medoids Raft based Practical Byzantine Fault Tolerance) was proposed. Firstly, blockchain was sharded based on K-medoids clustering algorithm, all nodes were divided into multiple node clusters and each node cluster constituted to a single shard, so that global consensus was improved to hierarchical multi-center consensus. Secondly, the consus between the cluster central nodes of each shard was performed by adopting PBFT algorithm, and the improved Raft algorithm based on supervision nodes was used for intra-shard consensus. The supervision mechanism in each shard gave a certain ability of Byzantine fault tolerance to Raft algorithm and improved the security of the algorithm. Experimental analysis shows that compared with PBFT algorithm, K-RPBFT algorithm greatly reduces the communication overhead and consensus latency, improves the consensus efficiency and throughput while having Byzantine fault tolerance ability, and has good scalability and dynamics, so that the consortium blockchain can be applied to a wider range of fields.
Reference | Related Articles | Metrics
Review of facial action unit detection
YAN Jingwei, LI Qiang, WANG Chunmao, XIE Di, WANG Baoqing, DAI Jun
Journal of Computer Applications    2020, 40 (1): 8-15.   DOI: 10.11772/j.issn.1001-9081.2019061043
Abstract732)      PDF (1281KB)(614)       Save
Facial action unit detection aims at making computers detect the action unit targets based on the given facial images or videos automatically. Due to a great amount of research during the past 20 years, especially the construction of more and more facial action unit databases and the raise of deep learning based methods, facial action unit detection technology has been rapidly developed. Firstly, the concept of facial action unit and commonly used facial action unit databases were introduced, and the traditional methods including steps such as pre-processing, feature extraction and classifier learning were summarized. Then, for several important research areas, such as region learning, facial action unit correlation learning and weak supervised learning, systematic review and analysis were conducted. Finally, the shortcomings of the existing reasearch and potential developing trends of facial action unit detection were discussed.
Reference | Related Articles | Metrics
Improvement of blockchain practical Byzantine fault tolerance consensus algorithm
GAN Jun, LI Qiang, CHEN Zihao, ZHANG Chao
Journal of Computer Applications    2019, 39 (7): 2148-2155.   DOI: 10.11772/j.issn.1001-9081.2018112343
Abstract905)      PDF (1409KB)(766)       Save

Since Practical Byzantine Fault Tolerance (PBFT) consensus algorithm applied to the alliance chain has the problems of static network structure, random selection of master node and large communication overhead, an Evolution of Practical Byzantine Fault Tolerance (EPBFT) consensus algorithm was proposed. Firstly, a series of activity states were set for consensus nodes, making the nodes have complete life cycle in the system through state transition, so that the nodes were able to dynamically join and exit while the system has a dynamic network structure. Secondly, the selection method of master node of PBFT was improved with adding the election process of master node with the longest chain as the election principle. After the election of master node, the reliability of master node was further ensured through data synchronization and master node verification process. Finally, the consensus process of PBFT algorithm was optimized to improve the consensus efficiency, thus the communication overhead of EPBFT algorithm was reduced to 1/2 of that of PBFT algorithm with little view changes. The experimental results show that EPBFT algorithm has good effectiveness and practicability.

Reference | Related Articles | Metrics
Improved pitch contour creation and selection algorithm for melody extraction
LI Qiang, YU Fengqin
Journal of Computer Applications    2018, 38 (8): 2411-2415.   DOI: 10.11772/j.issn.1001-9081.2018020311
Abstract701)      PDF (803KB)(377)       Save
Aiming at the problem that the discontinuity of the pitch sequence of the same sound source was caused by the interference of different sound sources in polyphonic music which reduced the accuracy of pitch estimation, an improved pitch contour creation and selection algorithm for melody extraction was proposed. Firstly, a method based on auditory streaming cues and the continuity of pitch salience was proposed to create pitch contour by calculating the pitch salience of each point in the time-frequency spectrum. In order to further select the melody pitch contour, the non-melodic pitch contours were removed according to the repetitive characteristics of the accompaniment, and dynamic time warping algorithm was used to calculate the similarity between the melodic and non-melodic pitch contours. Finally, the octave errors in the melodic pitch contours was detected based on the long term relationship of the adjacent pitch contours. Simulation experiments on the data set ORCHSET show that the pitch estimation accuracy and the overall accuracy of the proposed algorithm are improved by 2.86% and 3.32% respectively compared with the oringinal algorithm, which can effectively solve the pitch estimation problem.
Reference | Related Articles | Metrics
Load balancing strategy of cloud storage based on Hopfield neural network
LI Qiang, LIU Xiaofeng
Journal of Computer Applications    2017, 37 (8): 2214-2217.   DOI: 10.11772/j.issn.1001-9081.2017.08.2214
Abstract585)      PDF (646KB)(376)       Save
Focusing on the shortcoming of low storage efficiency and high recovery cost after copy failure of the current Hadoop, Hopfield Neural Network (HNN) was used to improve the overall performance. Firstly, the resource characteristics that affect the storage efficiency were analyzed. Secondly, the resource constraint model was established, the Hopfield energy function was designed and simplified. Finally, the average utilization rate of 8 nodes was analyzed by using the standard test case Wordcount, and the performance and resource utilization of the proposed strategy were compared with three typical algorithms including dynamic resource allocation algorithm, energy-efficient algorithm and Hadoop default storage strategy, and the comparison results showed that the average efficiency of the storage strategy based on HNN was promoted by 15.63%, 32.92% and 55.92% respectively. The results indicate that the proposed algorithm can realize the resource load balancing, help to improve the storage capacity of Hadoop, and speed up the retrieval.
Reference | Related Articles | Metrics
Task scheduling method based on template genetic algorithm in cloud environment
SHENG Xiaodong, LI Qiang, LIU Zhaozhao
Journal of Computer Applications    2016, 36 (3): 633-636.   DOI: 10.11772/j.issn.1001-9081.2016.03.633
Abstract661)      PDF (529KB)(430)       Save
Cloud task scheduling is a hot issue in the research of cloud computing. The cloud task scheduling method directly affects the overall performance of the cloud platform. A task scheduling method Template-Based Genetic Algorithm (TBGA) was proposed. Firstly, according to the processor's CPU speed, bandwidth and etc., the amount of tasks that should be allocated to each processor was calculated. andwas called allocation template. Secondly, according to the template, the tasks were combined into multiple subsets and finally each subset of tasks was allocated to the corresponding processor by using genetic algorithm. Experimental results show that the method can obtain shorter time scheduling for total tasks. TBGA reduced 20% of task set completion time compared with Min-Min algorithm and 30% of task set completion time compared with Genetic Algorithm (GA). Therefore, the TBGA is an effective task scheduling algorithm.
Reference | Related Articles | Metrics
Voice activity detection algorithm based on hidden Markov model
LI Qiang, CHEN Hao, CHEN Dingdang
Journal of Computer Applications    2016, 36 (11): 3212-3216.   DOI: 10.11772/j.issn.1001-9081.2016.11.3212
Abstract744)      PDF (756KB)(444)       Save
Concerning the problem that the existing Voice Activity Detection (VAD) algorithms based on Hidden Markov Model (HMM) were poor to track noise, a method using Baum-Welch algorithm was proposed to train the noise with different characteristics, and the corresponding noise model was generated to establish a library. When voice activity was detected, depending on the measured background noise of the speech, the voice was dynamically matched to a noise model in the library. Meanwhile, in order to meet real-time requirements of speech signal processing, reduce the complexity of the speech parameter extraction, the threshold was improved to ensure the inter-frame correlation of the speech signal. Under different noise environments, the improved algorithm performance was tested and compared with Adaptive Multi-Rate (AMR), G.729B of the International Telecommunications Union (ITU-T). The test results show that the improved algorithm can effectively improve the accuracy of detection and noise tracking ability in real-time voice signal processing.
Reference | Related Articles | Metrics
Research and development of intelligent healthy community system based on mobile Internet
YUAN Xi, LI Qiang
Journal of Computer Applications    2015, 35 (1): 239-242.   DOI: 10.11772/j.issn.1001-9081.2015.01.0239
Abstract539)      PDF (762KB)(1034)       Save

To solve the problem of low resource utilization in community health center, little contact between community health center and community residents, and difficulty for residents to participate in personal health management and medical care, an intelligent healthy community system was developed. With the increasing popular mobile devices, the system provided support for health record management, chronic disease management, immunization, appointment registration, medical information query and other services in community health center. It realized the data sharing and interaction among smart phones, tablet PCs and Hospital Information System (HIS), which allowed the residents to actively participate in personal health management. Now the system has been deployed in one community health center of Chengdu, it makes community residents convient to manage their personal health, and improves the work efficiency and service quality of community health center.

Reference | Related Articles | Metrics
Cross-layer resource allocation algorithm of MIMO-OFDM systems with partial channel state information
HUANG Yu-qing LI Cheng-xin LI Qiang
Journal of Computer Applications    2012, 32 (05): 1211-1216.  
Abstract1128)      PDF (2936KB)(738)       Save
Cross-layer design is an effective technique for future mobile communication systems. A cross-layer resource allocation algorithm with partial channel state information was explored to maximize the total system throughput for multi-user MIMO-OFDM (Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing) system. The objective function of the optimization problem was designed based on the power limitation constraint, transmission rate, average queue length and sub-carrier occupancy, Quality of Service (QoS) requirements of different services and queue state information of data link layer. Under the condition of finite-length user buffer in data link layer, the mean feedback model was utilized to describe the feedback process of channel state information, and then the corresponding cross-layer resource allocation criteria could be derived. The simulation results show that compared with the existing schemes, the proposed algorithms obtain reasonable throughput performance and reduce lost package rate while providing better QoS requirement for each user of different services.
Reference | Related Articles | Metrics
Method of SVM classifier generation based on fuzzy classification association rule
CUI Jian LI Qiang LIU Yong
Journal of Computer Applications    2011, 31 (05): 1348-1350.   DOI: 10.3724/SP.J.1087.2011.01348
Abstract1700)      PDF (650KB)(936)       Save
To increase the classification accuracy of the database classification system, this paper proposed a new classification method. Firstly, the continuous attributes were dispersed by the Fuzzy C-Mean (FCM) algorithm. Secondly, an improved fuzzy association method was proposed to mine the classification association rules. Eventually, the compatibility between the generated rules and patterns was used to construct a set of feature vectors, which were used to generate a classifier. The experimental results demonstrate that the method has high discrimination and efficiency.
Related Articles | Metrics
Larger-traffic-first packet marking for real-time IP traceback
LI Qiang, ZHU Hong-zi, JU Jiu-bin
Journal of Computer Applications    2005, 25 (07): 1498-1501.  
Abstract981)      PDF (651KB)(729)       Save
Based on the current research on improving realtime PPM algorithms in IP traceback, the relations among marking probability, traffic volume for constructing an attack path and the distance of the attacking path were analysed. And an approach of realtime IP tracebacking which deploys larger traffic first probabilistic packet marking scheme (LTFMS) was proposed. According to the statistics on the present traffic of routers, a victim could construct a major attacking path in minimum time. For large-scale DDoS attacks, by establishing a simulated test environment and experiment analysis, LTFMS can construct more attacking paths than the existing schemes within the same time.
Reference | Related Articles | Metrics