Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Reliability evaluation of multi-component system based on time-varying Copula function
Lei WANG, Shijuan CHENG, Yu HAN
Journal of Computer Applications    2024, 44 (3): 953-959.   DOI: 10.11772/j.issn.1001-9081.2023040459
Abstract65)   HTML0)    PDF (1746KB)(19)       Save

Aiming at the mechanical system related to multi-component failure, a reliability evaluation method of multi-component system based on time-varying Copula function was proposed. Firstly, the nonlinear Wiener process was introduced to characterize the performance degradation process, and the Copula function was used to characterize the correlation between multiple component failures. Secondly, based on the evolutionary equation of the Copula function approximation of the Fourier series, the fitting effects of the Fourier series on common time-varying forms were verified by Monte Carlo (MC) simulation. In addition, the likelihood ratio statistic was used to test the existence of time-varying correlation, indicating the necessity of time-varying correlation research. The example analysis shows that compared with the static correlation model, the time-varying correlation model has the log-likelihood function value increased by 4.36%, and the Akaike Information Criterion (AIC) decreased by 3.81%, achieving more accurate reliability evaluation results.

Table and Figures | Reference | Related Articles | Metrics
Multimodal knowledge graph representation learning: a review
Chunlei WANG, Xiao WANG, Kai LIU
Journal of Computer Applications    2024, 44 (1): 1-15.   DOI: 10.11772/j.issn.1001-9081.2023050583
Abstract862)   HTML69)    PDF (3449KB)(821)       Save

By comprehensively comparing the models of traditional knowledge graph representation learning, including the advantages and disadvantages and the applicable tasks, the analysis shows that the traditional single-modal knowledge graph cannot represent knowledge well. Therefore, how to use multimodal data such as text, image, video, and audio for knowledge graph representation learning has become an important research direction. At the same time, the commonly used multimodal knowledge graph datasets were analyzed in detail to provide data support for relevant researchers. On this basis, the knowledge graph representation learning models under multimodal fusion of text, image, video, and audio were further discussed, and various models were summarized and compared. Finally, the effect of multimodal knowledge graph representation on enhancing classical applications, including knowledge graph completion, question answering system, multimodal generation and recommendation system in practical applications was summarized, and the future research work was prospected.

Table and Figures | Reference | Related Articles | Metrics
Software Guard Extensions-based secure data processing framework for traffic monitoring of internet of vehicles
Ruiqi FENG, Leilei WANG, Xiang LIN, Jinbo XIONG
Journal of Computer Applications    2023, 43 (6): 1870-1877.   DOI: 10.11772/j.issn.1001-9081.2022050734
Abstract401)   HTML6)    PDF (1801KB)(240)       Save

Internet of Vehicles (IoV) traffic monitoring requires the transmission, storage and analysis of private data of users, making the security guarantee of private data particularly crucial. However, traditional security solutions are often hard to guarantee real-time computing and data security at the same time. To address the above issue, security protocols, including two initialization protocols and a periodic reporting protocol, were designed, and a Software Guard Extensions (SGX)-based IoV traffic monitoring Secure Data Processing Framework (SDPF) was built. In SDPF, the trusted hardware was used to enable the plaintext computation of private data in Road Side Unit (RSU), and efficient operation and privacy protection of the framework were ensured through security protocols and hybrid encryption scheme. Security analysis shows that SDPF is resistant to eavesdropping, tampering, replay, impersonation, rollback, and other attacks. Experiment results show that all computational operations of SDPF are at millisecond level, specifically, all data processing overhead of a single vehicle is less than 1 millisecond. Compared with PFCF (Privacy-preserving Fog Computing Framework for vehicular crowdsensing networks) based on fog computing and PPVF (Privacy-preserving Protocol for Vehicle Feedback in cloud-assisted Vehicular Ad hoc NETwork (VANET)) based on homomorphic encryption, SDPF has the security design more comprehensive: the message length of a single session is reduced by more than 90%, and the computational cost is reduced by at least 16.38%.

Table and Figures | Reference | Related Articles | Metrics
Weakly-supervised text classification with label semantic enhancement
Chengyu LIN, Lei WANG, Cong XUE
Journal of Computer Applications    2023, 43 (2): 335-342.   DOI: 10.11772/j.issn.1001-9081.2021122221
Abstract434)   HTML66)    PDF (1987KB)(323)       Save

Aiming at the problem of category vocabulary noise and label noise in weakly-supervised text classification tasks, a weakly-supervised text classification model with label semantic enhancement was proposed. Firstly, the category vocabulary was denoised on the basis of the contextual semantic representation of the words in order to construct a highly accurate category vocabulary. Then, a word category prediction task based on MASK mechanism was constructed to fine-tune the pre-training model BERT (Bidirectional Encoder Representations from Transformers), so as to learn the relationship between words and categories. Finally, a self-training module with label semantics introduced was used to make full use of all data information and reduce the impact of label noise in order to achieve word-level to sentence-level semantic conversion, thereby accurately predicting text sequence categories. Experimental results show that compared with the current state-of-the-art weakly-supervised text classification model LOTClass (Label-name-Only Text Classification), the proposed method improves the classification accuracy by 5.29, 1.41 and 1.86 percentage points respectively on the public datasets THUCNews, AG News and IMDB.

Table and Figures | Reference | Related Articles | Metrics
Long short-term session-based recommendation algorithm combining paired coding scheme and two-dimensional conventional neural network
Xueqin CHEN, Tao TAO, Zhongwang ZHANG, Yilei WANG
Journal of Computer Applications    2022, 42 (5): 1347-1354.   DOI: 10.11772/j.issn.1001-9081.2021030467
Abstract293)   HTML9)    PDF (1011KB)(105)       Save

The session-based recommendation algorithm based on Recurrent Neural Network (RNN) can effectively model the long-term dependency in the session, and can combine the attention mechanism to describe the main purpose of the user in the session. However, it cannot bypass the items that are not related to the user’s main purpose in the process of session modeling, and is susceptible to their influence to reduce the recommendation accuracy. In order to solve problems, a new paired coding scheme was designed, which transformed the original input sequence embedding vector into a three-dimensional tensor representation, so that non-adjacent behaviors were also able to be linked. The tensor was processed by a two-dimensional Conventional Neural Network (CNN) to capture the relationship between non-adjacent items, and a Neural Attentive Recommendation Machine introducing two-dimensional COnvolutional neural network for Session-based recommendation (COS-NARM) model was proposed. The proposed model was able to effectively skip items that were not related to the user’s main purpose in the sequence. Experimental results show that the recall and Mean Reciprocal Rank (MRR) of the COS-NARM model on multiple real datasets such as DIGINETICA are improved to varying degrees, and they are better than those of all baseline models such as NARM and GRU-4Rec+. On the basis of the above research, Euclidean distance was introduced into the COS-NARM model, and the OCOS-NARM model was proposed. Euclidean distance was used to directly calculate the similarity between interests at different times to reduce the parameters of model and reduce the complexity of model. Experimental results show that the introduction of Euclidean distance further improves the recommendation effect of the OCOS-NARM model on multiple real datasets such as DIGINETICA, and makes the training time of the OCOS-NARM model shortened by 14.84% compared with that of the COS-NARM model, effectively improving the training speed of model.

Table and Figures | Reference | Related Articles | Metrics
Variable convolutional autoencoder method based on teaching-learning-based optimization for medical image classification
Wei LI, Yaochi FAN, Qiaoyong JIANG, Lei WANG, Qingzheng XU
Journal of Computer Applications    2022, 42 (2): 592-598.   DOI: 10.11772/j.issn.1001-9081.2021061109
Abstract308)   HTML11)    PDF (634KB)(97)       Save

In order to solve the problems such as high time cost, inaccuracy and influence of parameter setting on algorithm performance when optimizing parameters of Convolutional Neural Network (CNN) by traditional manual methods, a variable Convolutional AutoEncoder (CAE) method based on Teaching-Learning-Based Optimization (TLBO) was proposed. In the algorithm, a variable-length individual encoding strategy was designed to quickly construct the CAE structure, and stack CAEs to a CNN. In addition, the excellent individual structure information was fully utilized to guide the algorithm to search the regions with more possibility, thereby improving the algorithm performance. Experimental results show that the classification accuracy of the proposed algorithm achieves 89.84% when solving medical image classification problems, which is higher than those of traditional CNN and similar neural networks. The proposed algorithm solves the medical image classification problems by optimizing the CAE structure and stacking CNN, and effectively improves the classification accuracy of medical image classification.

Table and Figures | Reference | Related Articles | Metrics
Incremental attribute reduction method for set-valued decision information system with variable attribute sets
Chao LIU, Lei WANG, Wen YANG, Qiangqiang ZHONG, Min LI
Journal of Computer Applications    2022, 42 (2): 463-468.   DOI: 10.11772/j.issn.1001-9081.2021051024
Abstract240)   HTML10)    PDF (511KB)(64)       Save

In order to solve the problem that static attribute reduction cannot update attribute reduction efficiently when the number of attributes in the set-valued decision information system changes continuously, an incremental attribute reduction method with knowledge granularity as heuristic information was proposed. Firstly, the related concepts of the set-valued decision information system were introduced, then the definition of knowledge granularity was introduced, and its matrix representation method was extended to this system. Secondly, the update mechanism of incremental reduction was analyzed, and an incremental attribute reduction method was designed on the basis of knowledge granularity. Finally, three different datasets were selected for the experiments. When the number of attributes of the three datasets increased from 20% to 100%, the reduction time of the traditional non-incremental method was 54.84 s, 108.01 s, and 565.93 s respectively, and the reduction time of the incremental method was 7.57 s, 4.85 s, and 50.39 s respectively. Experimental results demonstrate that the proposed incremental method is more faster than the non-incremental method under the condition that the accuracy of attribute reduction is not affected.

Table and Figures | Reference | Related Articles | Metrics
Design of positioning and attitude data acquisition system for geostress monitoring
GU Jingbo GUAN Guixia ZHAO Haimeng TAN Xiang YAN Lei WANG Wenxiang
Journal of Computer Applications    2014, 34 (9): 2752-2756.   DOI: 10.11772/j.issn.1001-9081.2014.09.2752
Abstract215)      PDF (944KB)(568)       Save

Aiming at efficient data acquisition, real-time precise positioning and attitude measurement problems of geostress low-frequency electromagnetic monitoring, real-time data acquisition system was designed and implemented in combination with positioning and attitude measurement module. The hardware system took ARM microprocessor (S3C6410) as control core based on embedded Linux. The hardware and software design architecture were introduced in detail. In addition, the algorithm of positioning and attitude measurement characteristics data extraction was proposed. Monitoring terminal of data acquisition and processing was designed using Qt/Embedded GUI programming technique based on LCD (Liquid Crystal Display) and achieved human-computer interaction. Meanwhile, the required data could be real-time stored to SD card. The results of system debugging and actual field experiments indicate that the system can complete the positioning and attitude data acquisition and processing, effectively solve the problem of real-time positioning for in-situ monitoring. It also can realize geostress low-frequency electromagnetic monitoring with high-speed, real-time and high reliability.

Reference | Related Articles | Metrics
Cross-site scripting detection in online social network based on classifiers and improved n-gram model
LI Ruilei WANG Rui JIA Xiaoqi
Journal of Computer Applications    2014, 34 (6): 1661-1665.   DOI: 10.11772/j.issn.1001-9081.2014.06.1661
Abstract293)      PDF (807KB)(411)       Save

Due to the threats of Cross-Site Scripting (XSS) attack in Online Social Network (OSN), a approach combined classifiers and improved n-gram model was proposed to detect the malicious OSN webpages infected with XSS code. Firstly, similarity-based features and difference-based features were extracted to build classifiers and the improved n-gram model. After that, the classifiers and model were combined to detect malicious webpages in OSN. The experimental results show that compared with the traditional classifier detection methods, the proposed approach is more effective and the false positive rate is about 5%.

Reference | Related Articles | Metrics
Automated Fugl-Meyer assessment based on genetic algorithm and extreme learning machine
WANGJingli LI Liang YU Lei WANG Jiping FANG Qiang
Journal of Computer Applications    2014, 34 (3): 907-910.   DOI: 10.11772/j.issn.1001-9081.2014.03.0907
Abstract540)      PDF (775KB)(479)       Save

To realize automatic and quantitative assessment in home-based upper extremity rehabilitation for stroke, an Extreme Learning Machine (ELM) based prediction model was proposed to automatically estimate the Fugl-Meyer Assessment (FMA) scale score for shoulder-elbow section. Two accelerometers were utilized for data recording during performance of 4 tasks selected from shoulder-elbow FMA and 24 patients were involved in the study. Accelerometer-based estimation was obtained by preprocessing raw sensor data, extracting data features, selecting features based on Genetic Algorithm and ELM. Then 4 single-task models and a comprehensive model were built individually using the selected features. Results show that it is possible to achieve accurate estimation of shoulder-elbow FMA score from the analysis of accelerometer sensor data with a root mean squared prediction error value of 2.1849 points. This approach breaks through the subjective and time-consuming property of traditional outcome measures which rely on clinicians at hand and can be easily utilized in the home settings.

Related Articles | Metrics
Enhanced distributed mobility management based on host identity protocol
JIA Lei WANG Lingjiao GUO Hua XU Yawei LI Juan
Journal of Computer Applications    2014, 34 (2): 341-345.  
Abstract582)      PDF (724KB)(390)       Save
The Host Identity Protocol (HIP) macro mobility management was introduced into Distributed Mobility Management (DMM) architecture, and Rendezvous Server (RVS) was co-located with the DMM mobility access routing functionality in Distributed Access Gateway (D-GW). By extending the HIP protocol package header parameters, the HIP BEX messages carried host identifier tuple (HIT, IP address) to the D-GW new registered, and the new D-GW forwarded the IP address using the binding massage. Through the established tunnel, data cached in the front D-GW would be later loaded to the new D-GW. This paper proposed a handover mechanism to effectively ensure data integrity, and the simulation results show that this method can effectively reduce the total signaling overhead. Furthermore, the security of HIP-based mobility management can be guaranteed.
Related Articles | Metrics
Improved AdaBoost ensemble approach based on loss function
LEI Lei WANG Xiao-danWANG
Journal of Computer Applications    2012, 32 (10): 2916-2919.   DOI: 10.3724/SP.J.1087.2012.02916
Abstract928)      PDF (559KB)(490)       Save
As to the issue that the weight expansion for hardest samples can cause imbalance when updating the training sample in AdaBoost algorithm, an improved approach based on the Loss Function (LF) of the different patterns, namely, LF-AdaBoost, was proposed. The weight tuning was affected not only by the training error, but the performance of base classifiers for different classes, thus avoiding the excessive concentration phenomenon. The results based on UCI data sets and different base classifiers have shown that the approach can improve the speed of convergence and overcome the imbalance, as well as promote the generalization ability of ensemble classifier.
Reference | Related Articles | Metrics
Improved object tracking algorithm based on particle filter and Galerkin's method
LIANG Nan GAO Shi-wei GUO Lei WANG Ying
Journal of Computer Applications    2011, 31 (09): 2489-2492.   DOI: 10.3724/SP.J.1087.2011.02489
Abstract1238)      PDF (646KB)(368)       Save
In the particle filter framework, estimation accuracy strongly depends on the choice of proposal distribution. The traditional particle filter uses system transition probability as the proposal distribution without considering the new observing information; therefore, they cannot give accurate estimation. A new tracking framework applied with particle filter algorithm was proposed, which used Galerkin's method to construct proposal distribution. This proposal distribution enhanced the estimation accuracy compared to traditional filters. In the proposed framework, color model and shape model were adaptively fused, and a new model update scheme was also proposed to improve the stability of the object tracking. The experimental results demonstrate the availability of the proposed algorithm.
Related Articles | Metrics
Network anomaly detection based on anisotropic centroidal Voronoi diagram
LI Xiao-lei WANG Lei
Journal of Computer Applications    2011, 31 (09): 2359-2361.  
Abstract1658)      PDF (469KB)(433)       Save
Network anomaly detection is an important research topic in the field of intrusion detection. However, it is inefficient in practice because the detection rate and false alarm rate restrain each other. Based on the anisotropic centroidal Voronoi diagram, a new algorithm of network anomaly detection was proposed. In this new algorithm, the anisotropic centroidal Voronoi diagram was used in the clustering of data set at first, then the point density for each data point was computed out, which was used to determine whether the data point was normal or not. The laboratory tests on KDD Cup 1999 data sets show that the new algorithm has a higher detection rate and a lower false alarm rate.
Related Articles | Metrics
Bidirectional monitoring threat and simulation in IP Multimedia Subsystem
Xiao-lei WANG Yun-fei GUO Tao YANG
Journal of Computer Applications   
Abstract1761)      PDF (554KB)(972)       Save
Started with the IP Multimedia Subsystem (IMS) security mechanism, the flow of register and authentication in IMS were introduced; then combined with the ordinary threat in SIP protocol, the possibility of attack using the leak of SIP in IMS was analyzed. Based on this, adopting the theory of registration hijacking and server impersonating, a new threat named bidirectional monitoring was proposed. Function of CSCF in IMS was realized using Open SER. A network simulation environment was built to simulate the possibility of bidirectional monitoring. The result of the simulation proves that the threat of bidirectional monitoring is existent.
Related Articles | Metrics
Urban loop-road traffic-coordination-control system based on TWP-PSO
Chang-xi MA Yong-sheng QIAN Chun-lei WANG
Journal of Computer Applications   
Abstract1897)            Save
According to the loop characteristic of urban road network in some areas of our country, an urban looproad traffic-coordination-control system based on two-way parallel particle swarm optimization (TWP-PSO) was proposed. In this system, the control sub-area was closed loop road in road network, a three-level stepped distributed construction and the TWP-PSO algorithm were adopted, and the cycle,offsets and splits were optimized hierarchically, then the preset scheme was formed by cooperative controlling for different closed loops. The final signal control project was determined by judgment and choice from surface controlling rate of system hypothesis. The result indicates that the control system can reduce delay and the stopping rate effectively in the region.
Related Articles | Metrics