Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Object detection algorithm for remote sensing images based on geometric adaptation and global perception
Yongxiang GU, Xin LAN, Boyi FU, Xiaolin QIN
Journal of Computer Applications    2023, 43 (3): 916-922.   DOI: 10.11772/j.issn.1001-9081.2022010071
Abstract502)   HTML20)    PDF (2184KB)(254)       Save

Aiming at the problems such as small object size, arbitrary object direction and complex background of remote sensing images, on the basis of YOLOv5 (You Only Look Once version 5) algorithm, an algorithm involved with geometric adaptation and global perception was proposed. Firstly, deformable convolutions and adaptive spatial attention modules were stacked alternately in series through dense connections. As a result, a Dense Context-Aware Module (DenseCAM) which can model local geometric features was constructed on the basis of taking full advantage of different levels of semantic and location information. Secondly, by introducing Transformer in the end of the backbone network, the global perception ability of the model was enhanced at a low cost and the relationships between objects and scenario content were modeled. On UCAS-AOD and RSOD datasets, compared with YOLOv5s6 algorithm, the proposed algorithm has the mean Average Precision (mAP) increased by 1.8 percentage points and 1.5 percentage points, respectively. Experimental results show that the proposed algorithm can effectively improve the precision of object detection in remote sensing images.

Table and Figures | Reference | Related Articles | Metrics
Survey of label noise learning algorithms based on deep learning
Boyi FU, Yuncong PENG, Xin LAN, Xiaolin QIN
Journal of Computer Applications    2023, 43 (3): 674-684.   DOI: 10.11772/j.issn.1001-9081.2022020198
Abstract895)   HTML69)    PDF (2083KB)(530)    PDF(mobile) (733KB)(45)    Save

In the field of deep learning, a large number of correctly labeled samples are essential for model training. However, in practical applications, labeling data requires high labeling cost. At the same time, the quality of labeled samples is affected by subjective factors or tool and technology of manual labeling, which inevitably introduces label noise in the annotation process. Therefore, existing training data available for practical applications is subject to a certain amount of label noise. How to effectively train training data with label noise has become a research hotspot. Aiming at label noise learning algorithms based on deep learning, firstly, the source, classification and impact of label noise learning strategies were elaborated; secondly, four label noise learning strategies based on data, loss function, model and training method were analyzed according to different elements of machine learning; then, a basic framework for learning label noise in various application scenarios was provided; finally, some optimization ideas were given, and challenges and future development directions of label noise learning algorithms were proposed.

Table and Figures | Reference | Related Articles | Metrics
Review of interactive machine translation
Xingbin LIAO, Xiaolin QIN, Siqi ZHANG, Yangge QIAN
Journal of Computer Applications    2023, 43 (2): 329-334.   DOI: 10.11772/j.issn.1001-9081.2021122067
Abstract738)   HTML96)    PDF (1870KB)(506)       Save

With the development and maturity of deep learning, the quality of neural machine translation has increased, yet it is still not perfect and requires human post-editing to achieve acceptable translation results. Interactive Machine Translation (IMT) is an alternative to this serial work, that is performing human interaction during the translation process, where the user verifies the candidate translations produced by the translation system and, if necessary, provides new input, and the system generates new candidate translations based on the current feedback of users, this process repeats until a satisfactory output is produced. Firstly, the basic concept and the current research progresses of IMT were introduced. Then, some common methods and state-of-the-art works were suggested in classification, while the background and innovation of each work were briefly described. Finally, the development trends and research difficulties of IMT were discussed.

Table and Figures | Reference | Related Articles | Metrics
Multi-track music generative adversarial network based on Transformer
Tao WANG, Cong JIN, Xiaobing LI, Yun TIE, Lin QI
Journal of Computer Applications    2021, 41 (12): 3585-3589.   DOI: 10.11772/j.issn.1001-9081.2021060909
Abstract779)   HTML20)    PDF (639KB)(328)       Save

Symbolic music generation is still an unsolved problem in the field of artificial intelligence and faces many challenges. It has been found that the existing methods for generating polyphonic music fail to meet the marke requirements in terms of melody, rhythm and harmony, and most of the generated music does not conform to basic music theory knowledge. In order to solve the above problems, a new Transformer-based multi-track music Generative Adversarial Network (Transformer-GAN) was proposed to generate music with high musicality under the guidance of music rules. Firstly, the decoding part of Transformer and the Cross-Track Transformer (CT-Transformer) adapted on the basis of Transformer were used to learn the information within a single track and between multiple tracks respectively. Then, a combination of music rules and cross-entropy loss was employed to guide the training of the generative network, and the well-designed objective loss function was optimized while training the discriminative network. Finally, multi-track music works with melody, rhythm and harmony were generated. Experimental results show that compared with other multi-instrument music generation models, for piano, guitar and bass tracks, Transformer-GAN improves Prediction Accuracy (PA) by a minimum of 12%, 11% and 22%, improves Sequence Similarity (SS) by a minimum of 13%, 6% and 10%, and improves the rest index by a minimum of 8%, 4% and 17%. It can be seen that Transformer -GAN can effectively improve the indicators including PA and SS of music after adding CT-Transformer and music rule reward module, which leads to a relatively high overall improvement of the generated music.

Table and Figures | Reference | Related Articles | Metrics
Cloud data assured deletion scheme based on key distribution and ciphertext sampling
WANG Minshen, XIONG Jinbo, LIN Qian, WANG Lili
Journal of Computer Applications    2018, 38 (1): 194-200.   DOI: 10.11772/j.issn.1001-9081.2017071751
Abstract385)      PDF (1088KB)(336)       Save
If cloud data is not deleted in time after expiration, it may lead to unauthorized access and privacy leakage. For above issue, a cloud data assured deletion scheme based on key distribution and ciphertext sampling was proposed. It was composed of the encryption algorithm and Distributed Hash Table (DHT) network. Firstly, the plaintext was encrypted into the ciphertext. The ciphertext was sampled by random sampling algorithm. The incomplete ciphertext was uploaded to the cloud. Secondly, The trust value of each node in the DHT network was evaluated by evaluative method. The encryption key was processed into the subkeys by Shamir secret sharing algorithm, and the subkeys were distributed into the nodes with high trust degree. Finally, the encryption key was automatically deleted by the periodic self-updating function of the DHT network. The ciphertext in the cloud was overwritten by uploading random data through the Hadoop Distributed File System (HDFS)'s interface. Assured deletion of cloud data was done by deleting the encryption key and the ciphertext. The security analysis and performance analysis demonstrate that the proposed scheme is secure and efficient.
Reference | Related Articles | Metrics
Hardware acceleration model of MD5 algorithm based on NetMagic platform
MENG Xiangyang, LIN Qi
Journal of Computer Applications    2015, 35 (4): 991-995.   DOI: 10.11772/j.issn.1001-9081.2015.04.0991
Abstract508)      PDF (719KB)(508)       Save

Aiming at the disadvantages of MD5 software such as large occupancy of resources and poor security, a hardware acceleration model of MD5 was put forward based on NetMagic platform, and then the non-streamlined and streamlined hardware acceleration models were verified and analyzed based on ModelSim and NetMagic platforms. Compared to non-streamlined acceleration model, the streamlined acceleration model can improve the operation efficiency of MD5 for five times. Its achievement can be applied to hardware encryption engine such as the network processor, which can effectively improve the security and processing efficiency of hardware equipment including the network processor.

Reference | Related Articles | Metrics
Dual-cluster-head routing algorithm based on location information
LIN Qizhong, ZHANG Dongmei, WANG Cong, XU Kui
Journal of Computer Applications    2015, 35 (3): 606-609.   DOI: 10.11772/j.issn.1001-9081.2015.03.606
Abstract543)      PDF (796KB)(433)       Save

To deal with the energy-efficient routing selection problem of the Wireless Sensor Network (WSN), an Energy-Efficient routing algorithm with Location information and Double cluster heads based on Hybrid Energy-Efficient Distributed clustering (HEED-EELD) was proposed. Assuming that all the network nodes had location awareness capabilities, the network was divided into different hierarchies according to the best single-hop distance, so the nodes determined their hierarchies based on their locations. Double cluster heads were selected to share a single cluster head's work and to balance the energy consumption. In the inter-cluster multi-hop routing, the cluster head selected the optimal route based on location, distance and cost function about residual energy. Matlab simulation results show that, compared with Low Energy Adaptive Clustering Hierarchy (LEACH) algorithm, HEED algorithm, HEED-EELD has obvious advantages in terms of network lifetime, energy efficiency and energy balancing.

Reference | Related Articles | Metrics
Fast intra prediction algorithm for high efficiency video coding
XU Dongxu LIN Qiwei
Journal of Computer Applications    2014, 34 (8): 2375-2379.   DOI: 10.11772/j.issn.1001-9081.2014.08.2375
Abstract217)      PDF (740KB)(530)       Save

To further reduce the great computational complexity for High Efficiency Video Coding (HEVC) intra prediction, a novel algorithm was proposed in this paper. First, in Coding Unit (CU) level, the minimum Sum of Absolute Transformed Difference (SATD) of current CU was used to decide an early termination for the split of this CU at each depth level: if the minimum SATD of this CU is smaller than the given threshold value. Meanwhile, based on statistical analysis, the probabilities of each candidate prediction modes being optimal mode were used to further reduce the number of candidate modes which have almost no chance to be selected as the best mode. The experimental results show that, the proposed algorithm can save an average of 30.5% of the encoding time with negligible loss of coding efficiency (only 0.02dB Y-PSNR(Y-Peak Signal-to-Noise Ratio) loss) compared with the reference model HM10.1. Besides, the proposed algorithm is easy to provide software and hardware implementations, and it is also easy to be combined with other methods to further reduce the great computational complexity for HEVC intra coding.

Reference | Related Articles | Metrics
Application of biclustering algorithm in high-value telecommunication customer segmentation
LIN Qin XUE Yun
Journal of Computer Applications    2014, 34 (6): 1807-1811.   DOI: 10.11772/j.issn.1001-9081.2014.06.1807
Abstract256)      PDF (773KB)(356)       Save

To improve the accuracy of traditional method for customer segmentation, the Large Average Submatrix (LAS) biclustering algorithm was used, which performed clusting on customer samples and consumer attributes simultaneously to identify the upscale and high-value customers. By introducing a new value yardstick and a novel index named PA, the LAS biclustering algorithm was compared with K-means clustering algorithm based on a simulation experiment on consumption data of a telecom corporation. The experimental result shows that the LAS biclustering algorithm finds more groups of high-value customers and obtains more accurate clusters. Therefore, it is more suitable for recognition and segmentation of high-value customers.

Reference | Related Articles | Metrics
Priority-based device-to-device data forwarding strategy in cluster
WANG Junyi GONG Zhishuai FU Jielin QIU Hongbing
   2014, 34 (11): 3192-3195.  
Abstract181)      PDF (629KB)(340)       Save
In cellular networks, users requesting the same data from base station can be grouped into a cluster, and Device-to-Device (D2D) links can be utilized to improve data dissemination efficiency. However, the difference of D2D links may be the bottleneck that results in conservative resource utilization. To solve this problem, a priority-based D2D relay scheme was proposed. The proposed scheme first set an optimal threshold by traversing the D2D links quality matrix, and then preferentially selected the D2D links with high achievable data rates to forward the data. In simulation experiment, compard with the traditional scheme without priority, the proposed scheme consumed less time and frequency resources with a higher efficiency especially when the ratio of ACK users and NACK users decreasing; meanwhile, the size of the cluster also influenced the improvement of resource efficiency. The results show that the proposed priority-based scheme improves resource efficiency when there is a small number of users, especially the users of NACK are more than that of ACK.
Related Articles | Metrics
Fatigue behavior detection by mining keyboard and mouse events
WANG Tianben WANG Haipeng ZHOUXingshe NI Hongbo LIN Qiang
Journal of Computer Applications    2014, 34 (1): 227-231.   DOI: 10.11772/j.issn.1001-9081.2014.01.0227
Abstract483)      PDF (747KB)(388)       Save
Long-term continuous use of computers would bring negative effects on users' health. In order to detect users fatigue level in a non-invasive manner, an approach that is able to measure fatigue level on hand muscle based on the keyboard and mouse events was proposed. The proposed method integrated keying action match, data noise filtering, and feature vector extraction/classification together to collect and analyze the delay characteristics of both keying and hitting actions, upon which the detection of fatigue level on hand muscle could be enabled. With the detected fatigue level, friends belonging to the same virtual community on current social networks could be, in real-time, alerted and persuaded to take a health-conscious way in their daily use of computers. Particularly, an interesting conclusion has been made that there is an obvious negative correlation between keying (hitting) delay and fatigue level of hand muscle. The experimental validation conducted on two-week data collected from 15 participants shows that the proposed method is effective in detecting users fatigue level and distributing fatigue-related health information on social network platform.
Related Articles | Metrics
Chinese story link detection based on extraction of elements correlative word
CHEN Zhimin MENG Zuqiang LIN Qifeng
Journal of Computer Applications    2013, 33 (01): 182-185.   DOI: 10.3724/SP.J.1087.2013.00182
Abstract871)      PDF (686KB)(521)       Save
At present, the cost of Chinese story link detection is high,since the miss rate and false rate are high. Concerning this problem, based on multi-vector space model, the paper joined elements (time, site, people, content) correlative word to represent the relevance of the different elements, integrated coherence similarity and cosine similarity with Support Vector Machine (SVM), and then proposed an algorithm which was based on the extraction of elements correlative word. The proposed algorithm complementally expressed the story and provided more evidence for detection; the detection cost was decreased by nearly 11%. Finally, the experimental results show the validity of the proposed algorithm.
Reference | Related Articles | Metrics
Improved sliding window non-parameter cumulation sum algorithm
CHEN Bo MAO Jianlin QIAO Guanhua DAI Ning
Journal of Computer Applications    2013, 33 (01): 88-91.   DOI: 10.3724/SP.J.1087.2013.00088
Abstract861)      PDF (726KB)(567)       Save
To solve the detection problem of selfish behavior in IEEE802.15.4 Wireless Sensor Network (WSN), an improved Sliding Window Non-parameter Cumulation Sum (SWN-CUSUM) algorithm based on statistics was proposed to decrease the detection delay. By tracing the delay characteristic sequence between successful transmissions, the algorithm could distinguish if there was a selfish behavior in the WSNs. The NS2 simulation tool was conducted to validate the feasibility of the proposed algorithm. The experimental results show that the improved algorithm not only weakens the impact of the threshold on the performance of the algorithm, but also reduces the size of sliding window used to detect selfish behavior, and the improved algorithm makes improvement in the calculation and the detection delay than the primitive SWN-CUSUM algorithm, so the improved algorithm can detect effectively and rapidly the selfish behavior of nodes in IEEE802.15.4 WSNs.
Reference | Related Articles | Metrics
Atmospheric monitoring network system based on cloud computing
CHEN Lin QI Wen-xin QI Yu
Journal of Computer Applications    2012, 32 (05): 1415-1417.  
Abstract1055)      PDF (1722KB)(791)       Save
In order to solve the problems of high hardware cost and information isolated island in the constructing and operating of atmospheric monitoring network system, this paper proposed an atmospheric monitoring network system based on Microsoft's Windows Azure cloud computing platform. This system provided access for automatic weather stations by General Packet Radio Service (GPRS) network technology, adopted Microsoft's Blob, Table storage and SQL Azure database to store massive data, developed and established Web portal on Windows Azure platform with ASP.NET and Flash technology, realized a unified access platform for users. The results demonstrate that this system can effectively solve the problem and create constructive value for establishing atmospheric monitoring network system in various ranges.
Reference | Related Articles | Metrics
Preferable selection of offensive mine-laying plans for unmanned aerial vehicles based on set pair analysis
DONG Wen-hong YI Bo LIN Qiang
Journal of Computer Applications    2011, 31 (10): 2818-2820.   DOI: 10.3724/SP.J.1087.2011.02818
Abstract803)      PDF (410KB)(536)       Save
In order to solve the preferable selection problem of offensive mine-laying plans for unmanned aerial vehicles, the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) based on connection number was adopted. With reference to the traditional essential factors for evaluation of mine-laying plans, the synthesized parameter of Unmanned Aerial Vehicle (UAV) was also selected as the main index to scale the effect of mine-laying platform. Then the connection number was used to describe the identity-contrary degree based on integrated plan, while the information entropy weight of each factor was calculated. For the reliability of the ranking process, the relative certainty probability power was improved with the stabilization coefficient, which could be used to evaluate and rank the mine-laying plans. The simulation results indicate the availability of this algorithm.
Related Articles | Metrics
High performance implementation of factoring multivariate polynomials based on NTL
Xiao-lin QIN Yong FENG Jun LI
Journal of Computer Applications   
Abstract1352)      PDF (433KB)(1030)       Save
Due to the difficulty of factoring multivariate polynomials, a new implementation of high performance named HPFMF was proposed based on NTL and the existence of factorization algorithms. The NTL was introduced and how to apply the library to implement the algorithms of number theory and computer algebra was discussed. The factoring multivariate polynomials was successfully designed and implemented. Experimental results show that the method is more efficient than factor in Maple 11 for multivariate polynomials.
Related Articles | Metrics
Formal description and test cases generation of protocols based on input/output sequence
Xiang GU Jian-lin QIU Yan YAN
Journal of Computer Applications   
Abstract1516)      PDF (608KB)(925)       Save
How to use RAISE Specification Language (RSL) to describe protocols was discussed. Description model was input/output sequence based, in which protocols actions were divided into input actions and output actions. All those actions would be elements of describtion. The core of description was central process. A new method to generate testing cases based on formal description using RSL was also discussed. The method was a kind of recursion procedure. Testing cases produced by the method were sound and exhaustive. The research provides a new direction for the protocol formal description and testing.
Related Articles | Metrics
Research of protocol formal description based on RSL
Xiang GU Jianlin Qiu
Journal of Computer Applications   
Abstract1790)      PDF (590KB)(954)       Save
RAISE Specification Language (RSL) was introduced into protocol engineering, and a new approach to protocol description was discussed. In order to make RSL suitable for protocol description, some extension was done such as time mechanism. The extension should be minimum so the original semantic structure of RSL will not be infected. This paper also studies two kinds of models to descript protocols — one based on status machine and the other based on processes. As an example, the description of routed arithmetic of RIP with RSL was given. Extended RSL has stronger description ability and is more flexible. It can support protocol verification and protocol testing better.
Related Articles | Metrics
Study and implementation of security protocols for wireless local network
LIN Qin,ZHANG Hao-jun, YANG Feng, ZHANG Quan-lin
Journal of Computer Applications    2005, 25 (01): 160-162.   DOI: 10.3724/SP.J.1087.2005.0160
Abstract976)      PDF (153KB)(1756)       Save
Development of WLAN and its security protocols were presented. Then researches were made on some of the most important security standards formed in the development. Finally, based on the characteristics of these protocols the implementation was displayed.
Related Articles | Metrics
Research and implementation of process automation system oriented dynamic compounding of Web service
ZHOU Kun,DENG Bao-hua,LIN Qi-sheng,YAO Dan-lin
Journal of Computer Applications    2005, 25 (01): 85-87.   DOI: 10.3724/SP.J.1087.2005.00085
Abstract1223)      PDF (206KB)(1074)       Save
Combining the Web services with the workflow, WSBPMS which supported dynamical compounding of Web services was designed and realized. General architecture of WSBPMS and its critical techniques were introduced, including dynamical binding Web services to the workflow, supporting automatic and half-automatic execution of process and optimizing choices of Web services by QoS.
Related Articles | Metrics