Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Local differential privacy protection mechanism for mobile crowd sensing with edge computing
LI Zhuo, SONG Zihui, SHEN Xin, CHEN Xin
Journal of Computer Applications    2021, 41 (9): 2678-2686.   DOI: 10.11772/j.issn.1001-9081.2020111787
Abstract371)      PDF (1255KB)(455)       Save
Aiming at the problem of the difficulty in privacy protection and the cost increase caused by privacy protection in the user data submission stage in Mobile Crowd Sensing (MCS), CS-MVP algorithm for joint privacy protection and CS-MAP algorithm for independent privacy protection of the attributes of user submitted data were designed based on the principle of Local Differential Privacy (LDP). Firstly, the user submitted privacy model and the task data availability model were constructed on the basis of the attribute relationships. And CS-MVP algorithm and CS-MAP algorithm were used to solve the availability maximization problem under the privacy constraint. At the same time, in the edge computing supported MCS scenarios, the three-layer architecture for MCS under privacy protection of the user submitted data was constructed. Theoretical analysis proves the optimality of the two algorithms under the data attribute joint privacy constraint and data attribute independent privacy constraint respectively. Experimental results show that under the same privacy budget and amount of data, compared with LoPub and PrivKV, the accuracy of user submitted data recovered to correct sensor data based on CS-MVP algorithm and CS-MAP algorithm is improved by 26.94%, 84.34% and 66.24%, 144.14% respectively.
Reference | Related Articles | Metrics
Online short video content distribution strategy based on federated learning
DONG Wentao, LI Zhuo, CHEN Xin
Journal of Computer Applications    2021, 41 (6): 1551-1556.   DOI: 10.11772/j.issn.1001-9081.2020121936
Abstract328)      PDF (958KB)(509)       Save
To improve the accuracy of short video content distribution, the interest tendencies and the personalized demands for short video content of social groups that the users belong to were analyzed, and in the short video application scenarios based on the active recommendation approaches, a short video content distribution strategy was designed with the goal of maximizing the profit of video content providers. Firstly, based on the federated learning, the interest prediction model was trained by using the local album data of the user group, and the user group interest vector prediction algorithm was proposed and the interest vector representation of the user group was obtained. Secondly, using the interest vector as the input, the corresponding short video content distribution strategy was designed in real time based on the Combinatorial Upper Confidence Bound (CUCB) algorithm, so that the long-term profit obtained by the video content providers was maximized. The average profit obtained by the proposed strategy is relatively stable and significantly better than that obtained by the short video distribution strategy only based on CUCB; in terms of total profit of video providers, compared with the Upper Confidence Bound (UCB) strategy and random strategy, the proposed strategy increases by 12% and 30% respectively. Experimental results show that the proposed short video content distribution strategy can effectively improve the accuracy of short video distribution, so as to further increase the profit obtained by video content providers.
Reference | Related Articles | Metrics
Multi-objective optimization model and solution algorithm for emergency material transportation path
LI Zhuo, LI Yinzhen, LI Wenxia
Journal of Computer Applications    2019, 39 (9): 2765-2771.   DOI: 10.11772/j.issn.1001-9081.2019020270
Abstract1013)      PDF (983KB)(431)       Save

For the actual background of the shortage of self-owned vehicles of the transporters in the early stage of emergency, the combinatorial optimization problem of hybrid vehicle paths with transportation mode of joint distribution of self-owned vehicles and vehicles rented by third-party was studied. Firstly, with the different interests between demand points and transporters considered, a multi-objective hybrid vehicle routing optimization model with soft time windows was established with the goal of maximizing system satisfaction and minimizing system delivery time and total cost. Secondly, the shortcomings of NSGA-Ⅱ algorithm in solving this kind of problems such as poor convergence and uneven distribution of Pareto frontiers were considered, the heuristic strategy and pheromone positive feedback mechanism of ant colony algorithm were used to generate offspring population, non-dominated sorting strategy model was used to guide the multi-objective optimization process, and the variable neighborhood descent search was introduced to expand the search space. A multi-objective non-dominated sorting ant colony algorithm was proposed to break through the bottleneck of the original algorithm. The example shows that the proposed model can provide reference for decision makers to choose reasonable paths according to different optimization objectives in different situations, and the proposed algorithm shows better performance in solving different scale problems and different distribution type problems.

Reference | Related Articles | Metrics
Extraction method of marine lane boundary from exploiting trajectory big data
XU Yao, LI Zhuoran, MENG Jinlong, ZHAO Lipo, WEN Jianxin, WANG Guiling
Journal of Computer Applications    2019, 39 (1): 105-112.   DOI: 10.11772/j.issn.1001-9081.2018071739
Abstract609)      PDF (1324KB)(372)       Save
The traditional road information extraction method is high-cost and slow-update. Compared with it, road or marine lane information extraction from crowdsourcing trajectory data is low-cost and easier to update. However, it is difficult to extract lane boundary due to vessel trajectory data with high noise, large data volume and uneven distribution across different regions. To solve this problem, an extraction method of marine lane boundary from exploiting trajectory big data was proposed. Firstly, the parallelized denoising, interpolation and trajectory segmentation for trajectory big data was conducted. Then, based on parallelization and Geohash-encoded spatial clustering, trajectory data was simplified into multiple square regions. The regions were divided and the NiBlack method was extended as SpatialNiBlack algorithm to recognize regions on lane. Finally, based on the filtering results, del-alpha-shape algorithm was proposed to construct a Delaunay triangulation network and obtain marine lane boundary. The theoretical analysis and experimental results show that the proposed method can achieve an accuracy of 86.7% and a recall rate of 79.4% when the maximum density value is 200, minimum density value is 10, length and width of window are 5 and 5 respectively. The experimental results show that the proposed method is effective to extract valuable marine lane boundaries from large-scale trajectory data.
Reference | Related Articles | Metrics
Mobile crowdsensing task distribution mechanism based on compressed sensing
SONG Zihui, LI Zhuo, CHEN Xin
Journal of Computer Applications    2019, 39 (1): 15-21.   DOI: 10.11772/j.issn.1001-9081.2018071595
Abstract497)      PDF (1085KB)(293)       Save

Since the cost of mobile crowdsensing in full coverage of area is excessively high, a Compressive Sensing-based mobile crowdsensing Task Distribution (CS-TD) mechanism was proposed. Firstly, an overall cost model of perceived task was proposed. In this model, the number of nodes participating in a perceived task, the number of nodes perceived and data uploaded were comprehensively considered. Then based on cost model, the daily movement trajectory of sensory node was analyzed, by combining with the compressed sensing data acquisition technology, a compressed sensing sampling method based on perceived node trajectory was proposed. Secondly, the optimal node set was selected by the Region Covers Least Nodes (RCLN) algorithm, the tasks were assigned to the nodes, and then the compressed sensing technology was used to recover node data. Finally, the trustworthiness of perceived node was evaluated in iteration of multiple perceived tasks to ensure the optimality of task plan. The CS-TD distribution model was tested several times. Compared with the existing CrowdTasker algorithm, the average cost of CS-TD algorithm is reduced by more than 30%. CS-TD model can effectively reduce consumption of sensing node and reduce overall perceived cost in full coverage sensing task.

Reference | Related Articles | Metrics
Embedded real-time compression for hyper-spectral images based on KLT and HEVC
LI Zhuo, XU Zhe, CHEN Xin, LI Shuqin
Journal of Computer Applications    2018, 38 (8): 2393-2397.   DOI: 10.11772/j.issn.1001-9081.2018010241
Abstract401)      PDF (907KB)(375)       Save
The existing hyperspectral image compression algorithms that aim at high compression quality generally have problems such as high computational complexity, off-line processing, and difficulty in implementing an embedded platform. They are difficult to be implemented in practical applications at present. To resolve the above problems, a real-time compression method for embedded hyperspectral images based on Karhunen-Loeve Transform (KLT) and HEVC (High Efficiency Video Coding) was designed. Firstly, the inter-spectral correlation was reduced by KLT. Then, the spatial correlation was removed by HEVC. Finally, the process of quantization and entropy coding was accomplished by HEVC. Based on NVIDIA Jetson TX1 platform, a heterogeneous parallel compression system which utilizes both the CPU and GPU was designed and implemented. Using real data sets, the performance of the designed algorithm and the practicability of the implemented platform were verified. The experimental results show that compared with the Discrete Wavelet Transform (DWT)+JPEG2000 algorithm, the reconstruction accuracy is improved significantly under the same compression ratio. The Peak Signal-to-Noise Ratio (PSNR) is increased by 1.36 dB on average; at the same time, compared with CPU, performing KLT calculations on GPU can also reduce the runtime by 33% at most.
Reference | Related Articles | Metrics
Feature detection and description algorithm based on ORB-LATCH
LI Zhuo, LIU Jieyu, LI Hui, ZHOU Xiaogang, LI Weipeng
Journal of Computer Applications    2017, 37 (6): 1759-1762.   DOI: 10.11772/j.issn.1001-9081.2017.06.1759
Abstract656)      PDF (794KB)(643)       Save
The binary descriptor based on Learned Arrangements of Three Patch Codes (LATCH) lacks of scale invariance and its rotation invariance depends upon feature detector, so a new feature detection and description algorithm was proposed based on Oriented fast and Rotated Binary robust independent elementary feature (ORB) and LATCH. Firstly, the Features from Accelerated Segment Test (FAST) was adopted to detect corner feature on the scale space of image pyramid. Then, the intensity centroid method of ORB was used to obtain orientation compensation. Finally, the LATCH was used to describe the feature. The experimental results indicate that, the proposed algorithm has the characteristics of low computational complexity, high real-time performance, rotation invariance and scale invariance. Under the same accuracy, the recall rate of the proposed algorithm is better than ORB and HARRIS-LATCH algorithm, the matching inner rate of the proposed algorithm is higher than ORB algorithm by 4.2 percentage points. In conclusion, the proposed algorithm can reduce the performance gap with histogram based algorithms such as Scale Invariant Feature Transform (SIFT) and Speeded Up Robust Feature (SURF) while maintaining the real-time property, and it can deal with image sequence in real-time quickly and exactly.
Reference | Related Articles | Metrics
Distributed neural network for classification of attack behavior to social security events
XIAO Shenglong, CHEN Xin, LI Zhuo
Journal of Computer Applications    2017, 37 (10): 2794-2798.   DOI: 10.11772/j.issn.1001-9081.2017.10.2794
Abstract609)      PDF (937KB)(483)       Save
In the era of big data, the social security data becomes more diverse and its amount increases rapidly, which challenges the analysis and decision of social security events significantly. How to accurately categorize the attack behavior in a short time and support the analysis and decision making of social security events becomes an urgent problem needed to be solved in the field of national and cyberspace security. Aiming at the behavior of aggression in social security events, a new Distributed Neural Network Classification (DNNC) algorithm was proposed based on the Spark platform. The DNNC algorithm was used to analyze the related features of the attack behavior categories, and the features were used as the input of the neural network. Then the function relationship between the individual features and attack categories were established, and a neural network classification model was generated to classify the attack categories of social security events. Experimental results on the data provided by the global terrorism database show that the proposed algorithm can improve the average accuracy by 15.90 percentage points compared with the decision tree classification, and by 8.60 percentage points compared with the ensemble decision tree classification, only decreases the accuracy on part attack type.
Reference | Related Articles | Metrics
Multi-task assignment algorithm for mobile crowdsensing
XU Zhe, LI Zhuo, CHEN Xin
Journal of Computer Applications    2017, 37 (1): 18-23.   DOI: 10.11772/j.issn.1001-9081.2017.01.0018
Abstract670)      PDF (1176KB)(929)       Save
Data transmission based on opportunistic communication in mobile crowdsensing may take a long period of time. To address this issue, a new Hub-based multi-Task Assignment (HTA) algorithm was proposed. In this algorithm, some nodes were selected to perform as the hubs which could help the requester node to deliver the tasks, according to the different characteristics of the social relationship of the nodes in mobile networks. When the task requester encountered a hub node, the hub node itself and its slave nodes were assigned tasks. After that, the hub node would distribute the tasks to the salve nodes, and received the results from them. Simulations were conducted on The ONE simulator. Compared with the oNline Task Assignment (NTA) algorithm, HTA algorithm reduced the time cost by 24.9% on average and improved the task completion ratio by 150% on average. The experimental results demonstrate that HTA algorithm can accelerate the accomplishment speed of the task and reduce the time cost.
Reference | Related Articles | Metrics
Image classification approach based on statistical features of speed up robust feature set
WANG Shu, LYU Xueqiang, ZHANG Kai, LI Zhuo
Journal of Computer Applications    2015, 35 (1): 224-230.   DOI: 10.11772/j.issn.1001-9081.2015.01.0224
Abstract527)      PDF (1151KB)(19376)       Save

The current method of image classification which uses the Speed Up Robust Feature (SURF) is low in efficiency and accuracy. To overcome these shortages, this paper proposed an approach for image classification which uses the statistical features of the SURF set. This approach took all dimensions and scale information of the SURF as independent random variables, and split the data with the sign of Laplace response. Firstly, the SURF vector set of the image was got. Then the feature vector was constructed with the first absolute order central moments and weighted first absolute order central moments of each dimision. Finally, the Support Vector Machine (SVM) accomplished the image classification process with this vector. The experimental results show that the precision of this approach is better than that of the methods of SURF histogram and 3-channel-Gabor texture features by increases of 17.6% and 5.4% respectively. By combining this approach with the HSV histogram, a high-level feature fusion method was got, and good classification performance was obtained. Compared with the fused method of the SURF histogram and HSV histogram, the fused method of 3-channel-Gabor texture features and HSV histogram, and the multiple-instance-learning method based on the model of Bag of Visual Word (BoVW), the fused method of this approach and HSV histogram has better precision with the increases of 5.2%, 6.8% and 3.2% respectively.

Reference | Related Articles | Metrics
Bursty topics detection approach on Chinese microblog based on burst words clustering
GUO Yixiu LYU Xueqiang LI Zhuo
Journal of Computer Applications    2014, 34 (2): 486-490.  
Abstract505)      PDF (951KB)(761)       Save
Bursty topics detection on microblog is an import branch of online public opinion analysis, and has attracted much attention from international scholars. In this paper, a new approach of calculating users' influence was proposed based on the analysis of users' behavior characteristics. Combining the user influence with text features and propagation features, this paper defined a concept named Bursty which is used to judge if a word was a burst word. Being judged by Bursty, burst words can be extracted from microblog corpus. Hierarchical clustering algorithm was introduced to cluster the burst words and chose appropriate burst word clusters to describe bursty topics on microblog in order to realize bursty topics detection on microblog. In experiments, the precision, recall and F-measure reached 63.64%,87.5% and 74% respectively. The method is proved effective on bursty topic detection based on mass microblog data.
Related Articles | Metrics
Parallel recognition of illegal Web pages based on improved KNN classification algorithm
XU Yabin LI Zhuo CHEN Junyi
Journal of Computer Applications    2013, 33 (12): 3368-3371.  
Abstract694)      PDF (828KB)(445)       Save
There are many illegal Web pages on the Internet, which may have pornographic, violent, gambling or reactionary content. Without being filtered effectively, they will exercise a malign influence on the searching services. An improved K-Nearest Neighbors (KNN) classification algorithm to promote the recognition accuracy was proposed and implemented on a virtualized platform following the MapReduce model provided by the open source software Hadoop, which made it distributed and parallel. Through experiments and comparison with the existing work, it is proved that the proposed recognition method improves the accuracy and efficiency greatly. The algorithm is implemented on a virtualized platform following the MapReduce model provided by the open source software Hadoop, which makes it distributed and parallel. Through experiments and comparison with existing work, it is proved that the recognition method we propose improves the accuracy and efficiency greatly.
Related Articles | Metrics
Analysis of characteristics of social networks in terms of microblog impact
LV Feifei XU Yabin LI Zhuo WU Zhuang
Journal of Computer Applications    2013, 33 (12): 3359-3362.  
Abstract537)      PDF (794KB)(484)       Save
The influence of social network is closely related with its structural characteristics. Based on the data from Sina microblog, the distributions of the number of followers and followings were analyzed and found that the number of followers and followings both were power-law distributed. The distance characteristic between different pairs of nodes was discussed, and it was found and proved that there was "small-world" phenomenon in the microblog network. At last, the links between nodes in the network were investigated and found that the formation of the link satisfied triple closure principle. The investigation results on the above three topics are important for us to explore the relationship between the influence of micro-blog and the structural characteristics of its underlying social network, as well as to the design of mechanisms to control the influence.
Related Articles | Metrics
Two-hop incentive compatible routing protocol in disruptiontolerant networks
WEN Ding CAI Ying LI Zhuo
Journal of Computer Applications    2013, 33 (06): 1500-1504.   DOI: 10.3724/SP.J.1087.2013.01500
Abstract820)      PDF (746KB)(728)       Save
A Two-hop Incentive Compatible (TIC) routing protocol was proposed for DisruptionTolerant Networks (DTN) to defend the degradation of communication performance caused by selfish nodes. TIC selected the optimal relay node, which took both the encounter probability and transmission cost into account and ensured that nodes could maximize their profit when they reported their encounter probability and transmission cost honestly. At the same time, a signature technology based on bilinear map was introduced to ensure the selected relay nodes to get the payment securely, which can effectively prevent the malicious nodes from tampering the messages.
Reference | Related Articles | Metrics
Routing algorithm based on link bandwidth utilization rate
YANG Xiao-qin ZHANG Li-fang CAO Qing-huang SUN Hai-yan LI Zhuo-qing
Journal of Computer Applications    2012, 32 (09): 2422-2425.   DOI: 10.3724/SP.J.1087.2012.02422
Abstract1323)      PDF (618KB)(601)       Save
In order to avoid network congestion, concerning that the current algorithms have not considered the aspects of network flow distribution and user's perception, a routing algorithm which can realize maximum load balance was proposed. The algorithm can decrease the maximal bandwidth utilization rate of network with delay guaranteed. The experiment based on real Abilene2 network topology shows that the proposed algorithm can alleviate the network congestion and improve the network utilization rate over 50% effectively. Compared with the existing algorithms, the proposed algorithm can meet two requirements of the bandwidth utilization and network delay. In addition, by adjusting the parameter values it can meet different business requirements in actual networks.
Reference | Related Articles | Metrics
Realization of IP data package analyzer for detecting distributed denial of service
LI De-chang,YAN Xi-ming,LI Zhuo
Journal of Computer Applications    2005, 25 (11): 2566-2567.  
Abstract1343)      PDF (426KB)(1151)       Save
The theory and the process of distributed denial of service attacks were analysed.A distributed model to detect distributed denial of service was put forward.IP data package analyzer Packview was developed.Current protocols,such as IP/TCP,UDP,ICMP and IGMP were analysed with Packview,and properly applied to identify attacks.
Related Articles | Metrics