Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
License plate detection algorithm in unrestricted scenes based on adaptive confidence threshold
LIU Xiaoyu, CHEN Huaixin, LIU Biyuan, LIN Ying, MA Teng
Journal of Computer Applications    2023, 43 (1): 67-73.   DOI: 10.11772/j.issn.1001-9081.2021111974
Abstract222)   HTML8)    PDF (2162KB)(59)       Save
Aiming at the problem of low generalization of the license plate detection model, which makes it difficult to reuse in different application scenes of smart transportation, a license plate detection algorithm in unrestricted scenes based on adaptive confidence threshold was proposed. Firstly, a multi-prediction head network model was constructed, in it, the segmentation prediction head was used to reduce the model reuse pre-processing work, the adaptive confidence threshold prediction head was used to improve the model detection ability, and the multi-scale fusion mechanism and bounding box regression prediction head were used to improve the model generalization ability. Secondly, a differentiable binary network training method was adopted to learn model parameters through differentiable binary transformation combined with the training of classification confidence and confidence threshold. Finally, the Connectivity Aware Non-Maximum Suppression (CANMS) method was used to improve the post-processing speed of license plate detection, and the lightweight network ResNet18 was introduced as the backbone network of feature extraction to reduce the model parameters and further improve the detection speed. Experimental results show that in 6 scenes with different constraints in Chinese City Parking Dataset (CCPD), the proposed algorithm can achieve the average precision of 99.5% and the recall of 99.8%, and achieves the efficient detection rate of 70 frames per second, which are better than the performance of anchor-based algorithms such as Faster Region-Conventional Neural Network (Faster R-CNN) and Single Shot MultiBox Detector (SSD). On the three supplementary scene test sets, the license plate detection accuracy of the proposed algorithm is higher than 90% in unrestricted scenes with different resolutions, different shooting distances, and different shooting angles of pitch. Therefore, the proposed algorithm has good detection performance and generalization ability in unrestricted scenes, and can meet the requirements of model reuse.
Reference | Related Articles | Metrics
Stock market volatility prediction method based on graph neural network with multi-attention mechanism
Xiaohan LI, Jun WANG, Huading JIA, Liu XIAO
Journal of Computer Applications    2022, 42 (7): 2265-2273.   DOI: 10.11772/j.issn.1001-9081.2021081487
Abstract1061)   HTML28)    PDF (2246KB)(361)       Save

Stock market is an essential element of financial market, therefore, the study on volatility of stock market plays a significant role in taking effective control of financial market risks and improving returns on investment. For this reason, it has attracted widespread attention from both academic circle and related industries. However, there are multiple influencing factors for stock market. Facing the multi-source and heterogeneous information in stock market, it is challenging to find how to mine and fuse multi-source and heterogeneous data of stock market efficiently. To fully explain the influence of different information and information interaction on the price changes in stock market, a graph neural network based on multi-attention mechanism was proposed to predict price fluctuation in stock market. First of all, the relationship dimension was introduced to construct heterogeneous subgraphs for the transaction data and news text of stock market, and multi-attention mechanism was adopted for fusion of the graph data. Then, the graph neural network Gated Recurrent Unit (GRU) was applied to perform graph classification. On this basis, prediction was made for the volatility of three important indexes: Shanghai Composite Index, Shanghai and Shenzhen 300 Index, Shenzhen Component Index. Experimental results show that from the perspective of heterogeneous information characteristics, compared with the transaction data of stock market, the news information of stock market has the lagged influence on stock volatility; from the perspective of heterogeneous information fusion, compared with algorithms such as Support Vector Machine (SVM), Random Forest (RF) and Multiple Kernel k-Means (MKKM) clustering, the proposed method has the prediction accuracy improved by 17.88 percentage points, 30.00 percentage points and 38.00 percentage points respectively; at the same time, the quantitative investment simulation was performed according to the model trading strategy.

Table and Figures | Reference | Related Articles | Metrics
Real-time fall detection method based on threshold and extremely randomized tree
LIU Xiaoguang, JIN Shaokang, WEI Zihui, LIANG Tie, WANG Hongrui, LIU Xiuling
Journal of Computer Applications    2021, 41 (9): 2761-2766.   DOI: 10.11772/j.issn.1001-9081.2020111816
Abstract290)      PDF (1152KB)(283)       Save
Aiming at the problem that wearable device-based fall detection cannot have good accuracy real-timely, a real-time fall detection method based on the fusion of threshold and extremely randomized tree was proposed. In this method, the wearable devices only needed to calculate the threshold value and did not need to ensure the accuracy of fall detection, which reduced the amount of calculation; at the same time, the host computer used the extremely randomized tree algorithm to ensure the accuracy of fall detection. Most of the daily actions were filtered by the wearable devices through the threshold method, so as to reduce the amount of action data detected by the host computer. In this way, the proposed method had high accuracy of fall detection in real time. In addition, in order to reduce the false positive rate of fall detection, the attitude angle sensor and the pressure sensor were integrated into the wearable devices, and the feedback mechanism was added to the host computer. When the detection result was false positive, the wrong detected sample was added to the non-fall dataset for retraining through the host computer. Through this kind of continuous learning, the model would generate an alarm model suitable for the individual. And this feedback mechanism provided a new idea for reducing the false positive rate of fall detection. Experimental results show that in 1 259 test samples, the proposed method has an average accuracy of 99.7% and the lowest false positive rate of 0.08%.
Reference | Related Articles | Metrics
Multi-person collaborative creation system of building information modeling drawings based on blockchain
SHEN Yumin, WANG Jinlong, HU Diankai, LIU Xingyu
Journal of Computer Applications    2021, 41 (8): 2338-2345.   DOI: 10.11772/j.issn.1001-9081.2020101549
Abstract441)      PDF (1810KB)(415)       Save
Multi-person collaborative creation of Building Information Modeling (BIM) drawings is very important in large building projects. However, the existing methods of multi-person collaborative creation of BIM drawings based on Revit and other modeling software or cloud service have the confusion of BIM drawing version, difficulty of traceability, data security risks and other problems. To solve these problems, a blockchain-based multi-person collaborative creation system for BIM drawings was designed. By using the on-chain and off-chain collaborative storage method, the blockchain and database were used to store BIM drawings information after each creation in the BIM drawing creation process and the complete BIM drawings separately. The decentralization, traceability and anti-tampering characteristics of the blockchain were used to ensure that the version of the BIM drawings is clear, and provide a basis for the future copyright division. These characteristics were also used to enhance the data security of BIM drawings information. Experimental results show that the average block generation time of the proposed system in the multi-user concurrent case is 0.467 85 s, and the maximum processing rate of the system is 1 568 transactions per second, which prove the reliability of the system and that the system can meet the needs of actual application scenarios.
Reference | Related Articles | Metrics
Personalized privacy protection for spatio-temporal data
LIU Xiangyu, XIA Guoping, XIA Xiufeng, ZONG Chuanyu, ZHU Rui, LI Jiajia
Journal of Computer Applications    2021, 41 (3): 643-650.   DOI: 10.11772/j.issn.1001-9081.2020091463
Abstract450)      PDF (1280KB)(841)       Save
Due to the popularity of smart mobile terminals, sensitive information such as personal location privacy, check-in data privacy and trajectory privacy in the collected spatio-temporal data are easy to be leaked. In the current researches, protection technologies are proposed for the above privacy leakages respectively, and there is not a personalized spatio-temporal data privacy protection method to prevent the above privacy leakages for users. Therefore, a personalized privacy protection model for spatio-temporal data named ( p, q, ε)-anonymity and a Personalized Privacy Protection for Spatio-Temporal Data (PPP ST) algorithm based on this model were proposed to protect the users' privacy data with personalized settings (location privacy, check-in data privacy and trajectory privacy). The heuristic rules were designed to generalize the spatio-temporal data to ensure the availability of the published data and realize the high availability of spatio-temporal data. In the comparison experiments, the data availability rate of PPP ST algorithm is about 4.66% and 15.45% higher than those of Information Data Used through K-anonymity (IDU-K) and Personalized Clique Cloak (PCC) algorithms on average respectively. At the same time, the generalized location search technology was designed to improve the execution efficiency of the algorithm. Experiments and analysis were conducted based on real spatio-temporal data. Experimental results show that PPP ST algorithm can effectively protect the privacy of personalized spatio-temporal data.
Reference | Related Articles | Metrics
Content distribution acceleration strategy in mobile edge computing
LIU Xing, YANG Zhen, WANG Xinjun, ZHU Heng
Journal of Computer Applications    2020, 40 (5): 1389-1391.   DOI: 10.11772/j.issn.1001-9081.2019091679
Abstract293)      PDF (490KB)(447)       Save

Focusing on the content distribution acceleration problem in Mobile Edge Computing (MEC), with the consideration of the influence of MEC server storage space limitation on content cache, with the object obtaining delays of the mobile users as optimization goal, an Interest-based Content Distribution Acceleration Strategy (ICDAS) was proposed. Considering the MEC server storage space, the interests of the mobile user groups on different objects and the file sizes of the objects, the objects were selectively cached on MEC servers, and the objects cached on MEC servers were timely updated in order to meet the content requirements of mobile user groups as more as possible. The experimental results show that the proposed strategy has good convergence performance, which cache hit ratio is relatively stable and significantly better than that of the existing strategies. When the system runs stably, compared with the existing strategies, this strategy can reduce the object data obtaining delay for users by 20%.

Reference | Related Articles | Metrics
3D model recognition based on capsule network
CAO Xiaowei, QU Zhijian, XU Lingling, LIU Xiaohong
Journal of Computer Applications    2020, 40 (5): 1309-1314.   DOI: 10.11772/j.issn.1001-9081.2019101750
Abstract510)      PDF (2645KB)(426)       Save

In order to solve the problem of feature information loss caused by the introduction of a large number of pooling layers in traditional convolutional neural networks, based on the feature of Capsule Network (CapsNet)——using vector neurons to save feature space information, a network model 3DSPNCapsNet (3D Small Pooling No dense Capsule Network) was proposed for recognizing 3D models. Using the new network structure, more representative features were extracted while the model complexity was reduced. And based on Dynamic Routing (DR) algorithm, Dynamic Routing-based algorithm with Length information (DRL) algorithm was proposed to optimize the iterative calculation process of capsule weights. Experimental results on ModelNet10 show that compared with 3DCapsNet (3D Capsule Network) and VoxNet, the proposed network achieves better recognition results, and has the average recognition accuracy on the original test set reached 95%. At the same time, the recognition ability of the network for the rotation 3D models was verified. After the rotation training set is appropriately extended, the average recognition rate of the proposed network for rotation models of different angles reaches 81%. The experimental results show that 3DSPNCapsNet has a good ability to recognize 3D models and their rotations.

Reference | Related Articles | Metrics
Local feature point matching algorithm with anti-affine property
QIU Yunfei, LIU Xing
Journal of Computer Applications    2020, 40 (4): 1133-1137.   DOI: 10.11772/j.issn.1001-9081.2019091588
Abstract384)      PDF (635KB)(373)       Save
In order to solve the problems that the existing local feature matching algorithm has poor matching effect and high time cost on affine images,and RANdom SAmple Consensus(RANSAC)algorithm cannot obtain a good parameter model on affine image matching,Affine Accelerated KAZE(A-AKAZE)algorithm with anti-affine property was proposed and the vector field consistency was used to screen interior points. Firstly,the scale space was constructed by using the nonlinear function,then the feature points were detected by Hessian matrix,and the appropriate areas were selected as the feature sampling windows with the feature points as the centers. Secondly,the feature sampling windows were projected on longitude and latitude to simulate the influence of different angles on the image,and then the Affine Modified-Local Difference Binary(A-MLDB)descriptors with anti-affine property were extracted from the projection region. Finally,the interior points were extracted by the vector field consistency algorithm. Experimental results show that the correct matching rate of A-AKAZE algorithm is more than 20% higher than that of AKAZE algorithm,is about 15% higher than that of AKAZE+RANSAC algorithm,is about 10% higher than that of Affine Scale-Invariant Feature Transform(ASIFT)algorithm, and is 5% higher than that of ASIFT+RANSAC algorithm;at the same time,A-AKAZE algorithm has the matching speed much higher than AKAZE+RANSAC,ASIFT and ASIFT+RANSAC algorithms.
Reference | Related Articles | Metrics
Wireless sensor deployment optimization based on improved IHACA-CpSPIEL algorithm
DUAN Yujun, WANG Yaoli, CHANG Qing, LIU Xing
Journal of Computer Applications    2020, 40 (3): 793-798.   DOI: 10.11772/j.issn.1001-9081.2019071201
Abstract312)      PDF (747KB)(285)       Save
Aiming at the problems of low coverage and high communication cost for wireless sensor deployment, an Improved Heuristic Ant Colony Algorithm (IHACA) merging Chaos optimization of padded Sensor Placements at Informative and cost-Effective Locations algorithm (IHACA-CpSPIEL) method for sensor deployment was proposed. Firstly, the correlation between observation points and unobserved points was established by mutual information, and the communication cost was described in the form of graph theory to establish the mathematical model with submodularity. Secondly, chaos operator was introduced to improve the global searching ability of pSPIEL (padded Sensor Placements at Informative and cost-Effective Locations) algorithm for local parameters, and then the optimal number of clusters was found. Then, the factors of the colony distance heuristic function and the pheromone updating mechanism were changed to jump out of the local solution of communication cost. Finally, Chaos optimization of pSPIEL algorithm (CpSPIEL) was integrated with the IHACA to determine the shortest path, so as to achieve the purpose of low-cost deployment. The experimental results show that the proposed algorithm can jump out of the local optimal solution well, and the communication cost is reduced by 6.5% to 24.0% compared with the pSPIEL algorithm, and has a faster search speed.
Reference | Related Articles | Metrics
Distributed denial of service attack detection method based on software defined Internet of things
LIU Xiangju, LIU Pengcheng, XU Hui, ZHU Xiaojuan
Journal of Computer Applications    2020, 40 (3): 753-759.   DOI: 10.11772/j.issn.1001-9081.2019091611
Abstract582)      PDF (872KB)(359)       Save
Due to the large number, wide distribution and complex environments of Internet of Things (IoT) devices, IoT is more vulnerable to DDoS (Distributed Denial of Service) attacks than traditional networks. Concerning this problem, a Distributed Denial of Service (DDoS) attack detection method based on Equal Length of Value Range K-means (ELVR- Kmeans) algorithm in Software Defined IoT (SD-IoT) architecture was proposed. Firstly, the centralized control characteristic of the SD-IoT controller was used to extract the flow tables of the OpenFlow switch to analyze the DDoS attack traffic characteristics in SD-IoT environment and extract the seven-tuple features related to the DDoS attack traffic. Secondly, the obtained flow tables were classified by the ELVR- Kmeans algorithm to detect whether a DDoS attack had occurred. Finally, the simulation experiment environment was built to test the detection rate, accuracy and error rate of the method. The simulation results show that the proposed method can effectively detect DDoS attacks in SD-IoT environment with detection rate and accuracy of 96.43% and 98.71% respectively, and error rate of 1.29%.
Reference | Related Articles | Metrics
Next location recommendation based on spatiotemporal-aware GRU and attention
LI Quan, XU Xinhua, LIU Xinghong, CHEN Qi
Journal of Computer Applications    2020, 40 (3): 677-682.   DOI: 10.11772/j.issn.1001-9081.2019071289
Abstract729)      PDF (669KB)(431)       Save
Aiming at the problem that the influence of time and space information of the location was not considered when making the location recommendation by Gated Recurrent Unit (GRU) of recurrent neural network, the spatiotemporal-aware GRU model was proposed. In addition, aiming at the noise problem generated by the unrelated check-in data in check-in sequence, the next location recommendation method of SpatioTemporal-aware GRU and Attention (ST-GRU+Attention) was proposed. Firstly, time gate and distance gate were added in the GRU model by counting the time slot and distance gap between two locations. The influence of time and space information on recommending next location was controlled by setting the weight matrices. Secondly, the attention mechanism was introduced. The attention weight coefficients of the user were obtained by calculating the attention weight scores of the user preferences, and the personalized preference of the user was obtained. Finally, the objective function was constructed and the model parameters were learned by Bayesian Personalized Ranking (BPR) algorithm. The experimental results show that the accuracy of ST-GRU+Attention is improved significantly compared to the recommendation methods of Factorizing Personalized Markov Chain and Localized Region (FPMC-LR), Personalized Ranking Metric Embedding (PRME) and Spatial Temporal Recurrent Neural Network (ST-RNN), and the precision and recall of ST-GRU+Attention are increased by 15.4% and 17.1% respectively compared to those of ST-RNN which is the best of the three methods. The recommendation method of ST-GRU+Attention can effectively improve the effect of next location recommendation.
Reference | Related Articles | Metrics
Face recognition security system based on liveness detection and authentication
CHEN Fang, LIU Xiaorui, YANG Mingye
Journal of Computer Applications    2020, 40 (12): 3666-3672.   DOI: 10.11772/j.issn.1001-9081.2020040478
Abstract470)      PDF (1545KB)(494)       Save
Face recognition is widely applied in various practical conditions such as entrance guard due to its convenience and practicability. But it is vulnerable to various forms of spoofing attacks (such as photo attacks and video attacks). The liveness detection based on deep Convolution Neural Network (CNN) can solve the above problem but has disadvantages such as high calculation cost, unfriendly interaction mode and difficult deployment on embedded devices. Therefore, a real-time and lightweight security classification method of face recognition was proposed. The face liveness detection algorithm based on color and texture analysis was integrated with the face authentication algorithm, and a face recognition algorithm performing face liveness detection and face authentication in the situation of monocular camera without user cooperation was proposed. The proposed algorithm can support real-time face recognition and has higher liveness recognition rate and robustness. In order to validate the performance of the proposed algorithm, Chinese Academy of Sciences Institute of Automation-Face Anti-Spoofing Dataset (CASIA-FASD) and Replay-Attack dataset were utilized as the benchmark datasets of the experiment. The experimental results show that, in the liveness detection, the proposed algorithm has the Half Total Error Rate (HTER) of 9.7% and Equal Error Rate (EER) of 5.5% respectively, and has the time cost of 0.12 s to process a frame of image in the whole process. The above results verify the feasibility and effectiveness of the proposed algorithm.
Reference | Related Articles | Metrics
Indoor robot simultaneous localization and mapping based on RGB-D image
ZHAO Hong, LIU Xiangdong, YANG Yongjuan
Journal of Computer Applications    2020, 40 (12): 3637-3643.   DOI: 10.11772/j.issn.1001-9081.2020040518
Abstract344)      PDF (1227KB)(515)       Save
Simultaneous Localization and Mapping (SLAM) is a key technology for robots to realize autonomous navigation in unknown environments. Aiming at the poor real-time performance and low accuracy of the commonly used RGB-Depth (RGB-D) SLAM system, a new RGB-D SLAM system was proposed to further improve the real-time performance and accuracy. Firstly, the Oriented FAST and Rotated BRIEF (ORB) algorithm was used to detect the image feature points, and the extracted feature points were processed by using the quadtree-based homogenization strategy, and the Bag of Words (BoW) was used to perform feature matching. Then, in the stage of system camera pose initial value estimation, an initial value which was closer to the optimal value was provided for back-end optimization by combining the Perspective n Point (P nP) and nonlinear optimization methods. In the back-end optimization, the Bundle Adjustment (BA) was used to optimize the initial value of the camera pose iteratively for obtaining the optimal value of the camera pose. Finally, according to the correspondence between the camera pose and the point cloud map of each frame, all the point cloud data were registered in a coordinate system to obtain the dense point cloud map of the scene, and the octree was used to compress the point cloud map recursively, so as to obtain a 3D map for robot navigation. On the TUM RGB-D dataset, the proposed RGB-D SLAM system, RGB-D SLAMv2 system and ORB-SLAM2 system were compared. Experimental results show that the proposed RGB-D SLAM system has better comprehensive performance on real-time and accuracy.
Reference | Related Articles | Metrics
Icing prediction of wind turbine blade based on stacked auto-encoder network
LIU Juan, HUANG Xixia, LIU Xiaoli
Journal of Computer Applications    2019, 39 (5): 1547-1550.   DOI: 10.11772/j.issn.1001-9081.2018102230
Abstract546)      PDF (630KB)(384)       Save
Aiming at the problem that wind turbine blade icing seriously affects the generating efficiency, safety and economy of wind turbines, a Stacked AutoEncoder (SAE) network based prediction model was proposed based on SCADA (Supervisory Control And Data Acquisition) data. The unsupervised method of encoding-decoding was utilized to pre-train the unlabeled dataset, and then the back propagation algorithm was utilized to train and fine tune the labeled dataset to achieve adaptive fault feature extraction and fault state classification. The complexy of the traditional prediction models was simplified effectively, and the influence of artificial feature extraction was avoided on model performance. The historical data of wind turbine No.15 collected by SCADA system was used for training and testing. The accuracy of the test results was 97.28%. Compared with the models based on Support Vector Machine (SVM) and Principal Component Analysis-Support Vector Machine (PCA-SVM), which accuracies are 91% and 93% respectively, the result indicates that the proposed model is more accurate than the other two.
Reference | Related Articles | Metrics
Dense subgraph based telecommunication fraud detection approach in bank
LIU Xiao, WANG Xiaoguo
Journal of Computer Applications    2019, 39 (4): 1214-1219.   DOI: 10.11772/j.issn.1001-9081.2018091861
Abstract742)      PDF (890KB)(318)       Save
Lack of labeled data accumulated for telecommunication fraud in the bank and high cost of manually labeling cause the insufficiency of labeled data that can be used in supervised learning methods for telecommunication fraud detection. To solve this problem, an unsupervised learning method based on dense subgraph was proposed to detect telecommunication fraud. Firstly, subgraphs with high anomaly degree in the network of accounts and resources (IP addresses and MAC addresses) were searched to identify fraud accounts. Then, a subgraph anomaly degree metric satisfying the features of telecommunication fraud was designed. Finally, a suspicious subgraph searching algorithm with resident disk, efficient memory and theory guarantee was proposed. On two synthetic datasets, the F1-scores of the proposed method are 0.921 and 0.861, which are higher than those of CrossSpot, fBox and EvilCohort algorithms while very close to those of M-Zoom algorithm (0.899 and 0.898), but the average running time and memory consumption peak of the proposed method are less than those of M-Zoom algorithm. On real-world dataset, F1-score of the proposed method is 0.550, which is higher than that of fBox and EvilCohort while very close to that of M-Zoom algorithm (0.529). Theoretical analysis and simulation results show that the proposed method can be applied to telecommunication fraud detection in the bank effectively, and is suitable for big datasets in practice.
Reference | Related Articles | Metrics
Node recognition for different types of sugarcanes based on machine vision
SHI Changyou, WANG Meili, LIU Xinran, HUANG Huili, ZHOU Deqiang, DENG Ganran
Journal of Computer Applications    2019, 39 (4): 1208-1213.   DOI: 10.11772/j.issn.1001-9081.2018092016
Abstract574)      PDF (917KB)(319)       Save
The sugarcane node is difficult to recognize due to the diversity and complexity of surface that different types of sugarcane have. To solve the problem, a sugarcane node recognition method suitable for different types of sugarcane was proposed based on machine vision. Firstly, by the iterative linear fitting algorithm, the target region was extracted from the original image and its slope angle to horizontal axis was estimated. According to the angle, the target was rotated to being nearly parallel to the horizontal axis. Secondly, Double-Density Dual Tree Complex Wavelet Transform (DD-DTCWT) was used to decompose the image, and the image was reconstructed by using the wavelet coefficients that were perpendicular or approximately perpendicular to the horizontal axis. Finally, the line detection algorithm was used to detect the image, and the lines near the sugarcane node were obtained. The recognition was realized by further verifying the density, length and mutual distances of the edge lines. Experimental results show that the complete recognition rate reaches 92%, the localization accuracy of about 80% of nodes is less than 16 pixels, and the localization accuracy of 95% nodes is less than 32 pixels. The proposed method realizes node recognition for different types of sugarcane under different background with high position accuracy.
Reference | Related Articles | Metrics
Optimization of data retransmission algorithm in information centric networking
XIN Yingying, LIU Xiaojuan, FANG Chunlin, LUO Huan
Journal of Computer Applications    2019, 39 (3): 829-833.   DOI: 10.11772/j.issn.1001-9081.2018071492
Abstract412)      PDF (786KB)(214)       Save

Aiming at the problem of low network bandwidth utilization rate of the original data recovery mechanism in Information Centric Networking (ICN), a Network Coding based Real-time Data Retransmission (NC-RDR) algorithm was proposed. Firstly, the lost data packets in the network were counted according to the real-time status of the network. Then, network coding was combined into ICN, and the statistical lost data packets were combinatorially coded. Finally, the encoded data packets were retransmitted to the receiver. The simulation results show that compared with NC-MDR (Network Coding based Multicast Data Recovery) algorithm, in the transmission bandwidth aspect, the average number of transmissions was reduced by about 30%. In ICN, the proposed algorithm can effectively reduce the number of data re-transmissions, improveing network transmission efficiency.

Reference | Related Articles | Metrics
Authentication scheme for smart grid communication based on elliptic curve cryptography
LIU Xindong, XU Shuishuai, CHEN Jianhua
Journal of Computer Applications    2019, 39 (3): 779-783.   DOI: 10.11772/j.issn.1001-9081.2018071486
Abstract484)      PDF (801KB)(276)       Save
To ensure the security and reliability of communication in the smart grid, more and more authentication protocols have been applied in the communication process. For the authentication protocol proposed by Mahmood et al. (MAHMOOD K, CHAUDHRY S A, NAQVI H, et al. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Generation Computer Systems. 2018,81:557-565), some defects were pointed out. For example, this protocol can be easily attacked by internal privileged personnel, is lack of password replacement phase and unfriendly to users, in which unique username cannot be guaranteed, even a formula error exists. To improve this protocol, an authentication protocol based on elliptic curve was proposed. Firstly, a login phase between the user and the device was added in the improved protocol. Secondly, elliptic curve cryptography puzzle was used to realize information exchange. Finally, the password replacement phase was added. Through the formal analysis by BAN (Burrows-Abadi-Needha) logic, the improved protocol is safe and feasible, which can resist internal personnel attacks, has password replacement and unique username, and is more friendly to users.
Reference | Related Articles | Metrics
Firefly fuzzy clustering algorithm based on Levy flight
LIU Xiaoming, SHEN Mingyu, HOU Zhengfeng
Journal of Computer Applications    2019, 39 (11): 3257-3262.   DOI: 10.11772/j.issn.1001-9081.2019040634
Abstract487)      PDF (858KB)(324)       Save
Fuzzy C-Means (FCM) clustering algorithm is sensitive to the initial clustering center and is easy to fall into local optimum. Therefore, a Firefly Fuzzy C-Means clustering Algorithm based on Levy flight (LFAFCM) was proposed. In LFAFCM, the random movement strategy of firefly algorithm was changed to balance the algorithm's local search and global search capabilities, the Levy flight mechanism was introduced during the firefly position update process to improve the global optimization ability, and the scale coefficient of each firefly was dynamically adjusted according to the number of iterations and the firefly position to limit the searchable range of Levy flight and speed up the convergence of the algorithm. The algorithm was validated by using five UCI datasets. The experimental results show that the algorithm avoids the local optimum and has a fast convergence speed.
Reference | Related Articles | Metrics
Point-of-Interest recommendation algorithm combining location influence
XU Chao, MENG Fanrong, YUAN Guan, LI Yuee, LIU Xiao
Journal of Computer Applications    2019, 39 (11): 3178-3183.   DOI: 10.11772/j.issn.1001-9081.2019051087
Abstract397)      PDF (935KB)(276)       Save
Focused on the issue that Point-Of-Interest (POI) recommendation has low recommendation accuracy and efficiency, with deep analysis of the influence of social factors and geographical factors in POI recommendation, a POI recommendation algorithm combining location influence was presented. Firstly, in order to solve the sparseness of sign-in data, the 2-degree friends were introduced into the collaborative filtering algorithm to construct a social influence model, and the social influence of the 2-degree friends on the users were obtained by calculating experience and friend similarity. Secondly, by deep consideration of the influence of geographical factors on POI, a location influence model was constructed based on the analysis of social networks. The users' influences were discovered through the PageRank algorithm, and the location influences were calculated by the POI sign-in frequency, obtaining overall geographical preference. Moreover, kernel density estimation method was used to model the users' sign-in behaviors and obtain the personalized geographical features. Finally, the social model and the geographic model were combined to improve the recommendation accuracy, and the recommendation efficiency was improved by constructing the candidate POI recommendation set. Experiments on Gowalla and Yelp sign-in datasets show that the proposed algorithm can quickly recommend POIs for users, and has high accuracy and recall rate than Location Recommendation with Temporal effects (LRT) algorithm and iGSLR (Personalized Geo-Social Location Recommendation) algorithm.
Reference | Related Articles | Metrics
Network negative energy propagation dynamics model and simulation
LIU Chao, HUANG Shiwen, YANG Hongyu, CAO Qiong, LIU Xiaoyang
Journal of Computer Applications    2019, 39 (10): 2966-2972.   DOI: 10.11772/j.issn.1001-9081.2019040664
Abstract388)      PDF (1008KB)(230)       Save
In view of the problem that the existing researches do not consider the refinement of the factors affecting the network negative energy propagation and construct a propagation dynamics model for analysis, a Weak-Strong-Received-Infected-Evil (WSRIE) model of network negative energy propagation was proposed. Firstly, considering the difference of negative energy immunity and propagation ability of network users, the vulnerable states were divided into weak immunity and strong immunity, and the infectious states were divided into weak infection, strong infection and malicious propagation with unchanged scale. Secondly, according to the negative energy infection mechanism of the network, the state transition law was proposed. Finally, a dynamics model of network negative energy propagation for complex networks was constructed. The simulation comparison experiments on NW small world network and BA scale-free network were carried out. The simulation results show that under the same parameters, the weak immune node density of the NW network is 9 percentage points lower than that of the BA network, indicating that the network with small world characteristics is more susceptible to negative energy. In the BA network, the density of infected nodes with the malicious node degree of 200 is 5 percentage points higher than that with the node degree of 0, indicating that the greater the node degree of the network red opinion leader, the more network users affected by the network negative energy.
Reference | Related Articles | Metrics
Euclidean embedding recommendation algorithm by fusing trust information
XU Lingling, QU Zhijian, XU Hongbo, CAO Xiaowei, LIU Xiaohong
Journal of Computer Applications    2019, 39 (10): 2829-2833.   DOI: 10.11772/j.issn.1001-9081.2019040597
Abstract312)      PDF (819KB)(242)       Save
To solve the sparse and cold start problems of recommendation system, a Trust Regularization Euclidean Embedding (TREE) algorithm by fusing trust information was proposed. Firstly, the Euclidean embedding model was employed to embed the user and project in the unified low-dimensional space. Secondly, to measure the trust information, both the project participation degree and user common scoring factor were brought into the user similarity calculation formula. Finally, a regularization term of social trust relationship was added to the Euclidean embedding model, and trust users with different preferences were used to constrain the location vectors of users and generate the recommendation results. In the experiments, the proposed TREE algorithm was compared with the Probabilistic Matrix Factorization (PMF), Social Regularization (SoReg), Social Matrix Factorization (SocialMF) and Recommend with Social Trust Ensemble (RSTE) algorithms. When dimensions are 5 and 10, TREE algorithm has the Root Mean Squared Error (RMSE) decreased by 1.60% and 5.03% respectively compared with the optimal algorithm RSTE on the dataset Filmtrust.While on the dataset Epinions, the RMSE of TREE algorithm was respectively 1.12% and 1.29% lower than that of the optimal algorithm SocialMF. Experimental results show that TREE algorithm further alleviate the sparse and cold start problems and improves the accuracy of scoring prediction.
Reference | Related Articles | Metrics
Train interval optimization of rail transit based on artificial bee colony algorithm
FANG Chunlin, LIU Xiaojuan, XIN Yingying, LUO Huan
Journal of Computer Applications    2018, 38 (9): 2725-2729.   DOI: 10.11772/j.issn.1001-9081.2018020493
Abstract624)      PDF (878KB)(525)       Save
As the core of the operation and management of a rail transit enterprise, the rail transit operation organization plays a very important role in reducing the operation cost of the enterprise, improving the service level and the travel efficiency of passengers. A strategy based on Artificial Bee Colony (ABC) optimization algorithm was proposed to optimize the train traffic interval. Based on the consideration of the respective interests of operators and passengers, the train departure interval was taken as the decision variable to establish a bi-objective nonlinear programming model for the lowest average passenger waiting time and the largest train waiting time. Artificial Bee Colony (ABC) algorithm was used to optimize the model. The simulation results on Beijing-Tianjin inter-city passenger flow at different times of a day demonstrate the effectiveness of the proposed algorithms and models.
Reference | Related Articles | Metrics
Application of binocular stereo vision technology in key dimension detection of CRH body
GAO Jingang, LIU Zhiyong, ZHANG Shuang, HOU Daishuang, LIU Xiaofeng
Journal of Computer Applications    2018, 38 (9): 2673-2677.   DOI: 10.11772/j.issn.1001-9081.2018020479
Abstract735)      PDF (1010KB)(363)       Save
It is difficult to realize on-line measurement for the large dimension range of China Railway High-speed (CRH) body, the complexity of testing items and the variety of vehicles. Firstly, a measurement scheme of key dimensions for a large-scale bullet train was proposed, where binocular Charge Coupled Device (CCD) stereo vision was used to set up the measuring sub stations of each key dimension, and the laser tracker and coordinate transformation algorithm were used to complete the global calibration of each CCD camera's measuring sub station. In each measuring sub station, the stereo spatial ball detection technology was used to measure local key dimensions. At the same time, a neural network temperature error compensation model based on wavelet analysis was constructed, and the precision of space distance compensation reached 0.05 mm. The comparison between the proposed method and three-coordinate measuring machine, shows that the proposed method is simple in operation, high in flexibility and high in precision, which can effectively solve the key dimension detection problem of CRH body.
Reference | Related Articles | Metrics
Dynamic multi-subgroup collaborative barebones particle swarm optimization based on kernel fuzzy clustering
YANG Guofeng, DAI Jiacai, LIU Xiangjun, WU Xiaolong, TIAN Yanni
Journal of Computer Applications    2018, 38 (9): 2568-2574.   DOI: 10.11772/j.issn.1001-9081.2018030638
Abstract379)      PDF (1251KB)(241)       Save
To solve problems such as easily getting trapped in local optimum and slow convergence rate in BareBones Particle Swarm Optimization (BBPSO) algorithm, a dynamic Multi-Subgroup collaboration Barebones Particle Swarm Optimization based on Kernel Fuzzy Clustering (KFC-MSBPSO) was proposed. Based on the standard BBPSO algorithm, firstly, kernel fuzzy clustering method was used to divide the main group into several subgroups, and the subgroups optimized collaboratively to improve the searching efficiency. Then, nonlinear dynamic mutation factor was introduced to control subgroup mutation probabilities according to the number of particles and convergence conditions, the main group was reconstructed by means of particle mutation and the exploration ability was improved. The main group particle absorption strategy and subgroup merge strategy were proposed to strengthen the information exchange between main group and subgroups and enhanced the stability of the algorithm. Finally, the subgroup reconstruction strategy was used to adjust the iterations of subgroup reconstruction by combining the optimal solutions. The results of experiments on six benchmark functions, such as Sphere, show that the accuracy of KFC-MSBPSO algorithm has improved by at least 11.1% compared with classical BBPSO algorithm, Opposition-Based Barebones Particle Swarm Optimization (OBBPSO) algorithm and other improved algorithms. The best mean value in high dimensional space accounts for 83.33% and has a faster convergence rate. This indicates that KFC-MSBPSO algorithm has good search performance and robustness, which can be applied to the optimization of high dimensional complex functions.
Reference | Related Articles | Metrics
Ignorant-Lurker-Disseminator-Removed propagation model of spam information on Internet
CAI Xiumei, LIU Chao, HUANG Xianying, LIU Xiaoyang, YANG Hongyu
Journal of Computer Applications    2018, 38 (8): 2316-2322.   DOI: 10.11772/j.issn.1001-9081.2018010259
Abstract468)      PDF (999KB)(301)       Save
For the problem that qualitative analysis methods are mostly adopted for the study of spam information propagation and it is difficult to reveal intrinsic propagation rules of spam information propagation, an ILDR (Ignorant-Lurker-Disseminator-Removed) model of spam information was proposed based on the idea of virus propagation modeling by considering the actual factors such as different input rates and removal rates. Firstly, the equilibrium point and the propagation threshold were calculated, and the stability conditions of the equilibrium point were given. Secondly, the local stability of non-spam information and spam information was proved by the Routh-Hurwitz criterion, then the global stability of non-spam information was certified via the invariance principle of LaSlle, which was proved based on the Bendixson criterion. Theoretical research shows that the non-spam information equilibrium is global asymptotically stable when propagation threshold is less than 1; the spam information equilibrium is global asymptotically stable when propagation threshold is greater than 1. The numerical simulation validates that the value of the propagation threshold can be decreased when decreasing the transfer rate from the lurker to the disseminator, increasing the transfer rate from the ignorant to the remover and the transfer rate from the lurker to the remover; the value of the disseminator can be decreased via increasing the proportionality coefficient from the ignorant to the lurker, or increasing the transfer rate of the disseminator to the remover and the system removal rate.
Reference | Related Articles | Metrics
Proximal smoothing iterative algorithm for magnetic resonance image reconstruction based on Moreau-envelope
LIU Xiaohui, LU Lijun, FENG Qianjin, CHEN Wufan
Journal of Computer Applications    2018, 38 (7): 2076-2082.   DOI: 10.11772/j.issn.1001-9081.2017122980
Abstract547)      PDF (1157KB)(301)       Save
To solve the problem of two non-smooth regularization terms in sparse reconstruction of Magnetic Resonance Imaging (MRI) based on Compressed Sensing (CS), a new Proximal Smoothing Iterative Algorithm (PSIA) based on Moreau-envelope was proposed. The classical sparse reconstruction for MRI based on CS is a problem of minimizing the objective function with a linear combination of three terms:the least square data fidelity term, the sparse regularization term of wavelet transform, and the Total Variation (TV) regularization term. Firstly, the proximal smoothing of the wavelet transform regularization term in the objective function was carried out. Then, the linear combination of the data fidelity term and the wavelet transform regularization term after smooth approximation was considered as a new convex function that could be continuously derived. Finally, PSIA was used to solve the new optimization problem. The proposed algorithm can not only cope with the two regularization constraints simultaneously in the optimization problem, but also avoid the algorithm robustness problem caused by fixed weights. The experimental results on simulated phantom images and real MR images show that, compared with four classical sparse reconstruction algorithms such as Conjugate Gradient (CG) decent algorithm, TV l1 Compressed MRI (TVCMRI) algorithm, Reconstruction From Partial k space algorithm (RecPF) and Fast Composite Smoothing Algorithm (FCSA), the proposed algorithm has better reconstruction results of image signal-to-noise ratio, relative error and structural similarity index, and its algorithm complexity is comparable to the existing fastest reconstruction algorithm FCSA.
Reference | Related Articles | Metrics
Improvement of Niederreiter public key cryptosystem
LIU Xiangxin, YANG Xiaoyuan
Journal of Computer Applications    2018, 38 (7): 1956-1959.   DOI: 10.11772/j.issn.1001-9081.2018010033
Abstract556)      PDF (625KB)(273)       Save
Aiming at the current status of Niederreiter public key cryptosystem which is vulnerable to distinguishing attack and ISD (Information Set Decoding), an improved Niederreiter public key cryptosystem was proposed. Firstly, the permutation matrix in the Niederreiter cryptography scheme was improved, and the original permutation matrix was replaced by a random matrix. Secondly, the error vector in the Niederreiter cryptography scheme was randomly divided to conceal the Hamming weight. Finally, the encryption and decryption processes of the Niederreiter cryptography scheme were improved to improve the security. The analysis shows that the improved scheme can resist the distinguishing attack and ISD. The public key size of the improved scheme is smaller than that of the scheme proposed by Baldi, et al. (BALDI M, BIANCHI M, CHIARALUCE F, et al. Enhanced public key security for the McEliece cryptosystem. Journal of Cryptology, 2016, 29(1):1-27). At the 80-bit security level, the public key of the improved scheme is reduced from 28408 bits to 4800 bits. At the 128-bit security level, the public key size of the improved scheme is reduced from 57368 bits to 12240 bits. As one of the anti-quantum cryptography schemes, the viability and competitiveness of the improved scheme are enhanced.
Reference | Related Articles | Metrics
Semantic matching model of knowledge graph in question answering system based on transfer learning
LU Qiang, LIU Xingyu
Journal of Computer Applications    2018, 38 (7): 1846-1852.   DOI: 10.11772/j.issn.1001-9081.2018010186
Abstract1527)      PDF (1183KB)(633)       Save
To solve the problem that semantic matching between questions and relations in a single fact-based question answering system is difficult to obtain high accuracy in small-scale labeled samples, a transfer learning model based on Recurrent Neural Network (RNN) was proposed. Firstly, by the way of reconstructing sequences, an RNN-based sequence-to-sequence unsupervised learning algorithm was used to learn the semantic distribution (word vector and RNN) of questions in a large number of unlabeled samples. Then, by assigning values to the parameters of a neural network, the semantic distribution was used as the parameters of the supervised semantic matching algorithm. Finally, by the inner product of the question features and relation features, the semantic matching model was trained and generated in labeled samples. The experimental results show that compared with the supervised learning method Embed-AVG and RNNrandom, the accuracy of semantic matching of the proposed model is averagely increased by 5.6 and 8.8 percentage points respectively in an environment with a small number of labeled samples and a large number of unlabeled samples. The proposed model can significantly improve the accuracy of semantic matching in an environment with labeled samples by pre-learning the semantic distribution of a large number of unlabeled samples.
Reference | Related Articles | Metrics
Improvement of hybrid encryption scheme based on Niederreiter coding
LIU Xiangxin, YANG Xiaoyuan
Journal of Computer Applications    2018, 38 (6): 1644-1647.   DOI: 10.11772/j.issn.1001-9081.2017122960
Abstract396)      PDF (612KB)(336)       Save
Coding-based encryption scheme, with the advantages of anti-quantum feature and fast encryption and decryption speed, is one of the candidate schemes for anti-quantum cryptography. The existing coding-based hybrid encryption schemes have the INDistinguishability under Chosen Ciphertext Attack (IND-CCA) security, which have the disadvantage that the public key size used to encrypt the shared secret key of the sender and receiver is large. The problem of large size of public key in hybrid encryption scheme based on Niederreiter coding was solved by the following three steps. Firstly, the private key of Niederreiter coding scheme was randomly split. Then, the plaintext of Niederreiter coding scheme was split randomly. Finally, the encryption and decryption processes of Niederreiter coding scheme were improved. It is concluded through analysis that, the public key size of the improved scheme is less than that of Maurich scheme. Compared with Maurich scheme, the public key of the improved scheme is reduced from 4801 bits of the original scheme to 240 bits under the security level of 80 bits, and the public key of the improved scheme is reduced from 9857 bits to 384 bits under the security level of 128 bits. Although the improved scheme is more complicated than the original scheme, its storage cost and calculation cost are smaller, and the practicability of the improved scheme is enhanced.
Reference | Related Articles | Metrics