Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Multi-view spectral clustering algorithm based on shared nearest neighbor
SONG Yan, YIN Jun
Journal of Computer Applications    2020, 40 (11): 3211-3216.   DOI: 10.11772/j.issn.1001-9081.2020020228
Abstract432)      PDF (883KB)(518)       Save
In order to solve the problem that the construction of the similarity matrix in the spectral clustering algorithm cannot meet the higher similarity of the data points within the cluster, a Multi-View spectral clustering algorithm based on Shared Nearest Neighbor (MV-SNN) was given. Firstly, the similarity between two data points with a large number of shared neighbors was increased, making the similarity between the data points in the same cluster higher. Then, the improved similarity matrices of multiple views were integrated to obtain a global similarity matrix. Finally, considering that the general spectral clustering methods still need k-means clustering algorithm to divide the data points at the later stage, a rank constraint method of Laplacian matrix was proposed to directly obtain the final cluster structure through the global similarity matrix. Experimental results show that compared with other multi-view spectral algorithms, MV-SNN algorithm has the three measurement standards of clustering:accuracy, purity and normalized mutual information improved by 1%-20%, and the clustering time reduced by about 50%. It can be seen that MV-SNN algorithm can improve the clustering performance and reduce the clustering time.
Reference | Related Articles | Metrics
Objective quality assessment method of high dynamic range image
GUAN Feifan, YU Mei, SONG Yang, SHAO Hua, JIANG Gangyi
Journal of Computer Applications    2017, 37 (3): 695-698.   DOI: 10.11772/j.issn.1001-9081.2017.03.695
Abstract985)      PDF (813KB)(698)       Save
Aiming at the problem that High Dynamic Range (HDR) image quality evaluation method does not consider the color and structure information of HDR image, a novel objective quality assessment method of HDR image was proposed. Firstly, the feature of visual fidelity about brightness and contrast was obtained based on the visual model of HDR-VDP-2.2. Then, the HDR image was transformed into the YIQ color space, and the color similarity and structural correlation coefficient were gotten by dealing with the Y, I, Q channel, respectively. Finally, Support Vector Regression (SVR) was used to fuse the features, and the objective evaluation value of the high dynamic range image quality could be obtained by predicting the similarity degree and the structural relevance degree. The experimental results show that compared with HDR-VDP-2.2, the Pearson correlation coefficient and Spearman rank correlation coefficient of the proposed method are increased by 23.09% and 25.34%, respectively; the Root Mean Square Error (RMSE) is reduced by 38.01%. The proposed method has higher consistency with subjective visual perception.
Reference | Related Articles | Metrics
Dynamic sampling method for wireless sensor network based on compressive sensing
SONG Yang, HUANG Zhiqing, ZHANG Yanxin, LI Mengjia
Journal of Computer Applications    2017, 37 (1): 183-187.   DOI: 10.11772/j.issn.1001-9081.2017.01.0183
Abstract639)      PDF (948KB)(438)       Save
It is hard to obtain a satisfactory reconstructive quality while compressing time-varying signals monitored by Wireless Sensor Network (WSN) using Compressive Sensing (CS), therefore a novel dynamic sampling method based on data prediction and sampling rate feedback control was proposed. Firstly, the sink node acquired the changing trend by analyzing the liner degree differences between current reconstructed data and last reconstructed data. Then the sink node calculated the suitable sampling rate according to the changing trend and fed back the result to sensors to dynamically adjust their sampling process. The experimental results show that the proposed dynamic sampling method can acquire higher reconstructed data accuracy than the CS data gathering method based on static sampling rate for WSN.
Reference | Related Articles | Metrics
RS code design in extended 1090ES based on phase modulation
SONG Yan, LI Huaqiong, WANG Hong, SUN Qingqing, HUANG Zhongtao
Journal of Computer Applications    2015, 35 (8): 2133-2136.   DOI: 10.11772/j.issn.1001-9081.2015.08.2133
Abstract455)      PDF (599KB)(320)       Save

The data link capacity of 1090ES (1090 MHz Extended Squitter) could be expended by modulating 1090 MHz signal with phase information, thus RS (Reed-Solomon) calibration technology of 1090ES expansion system based on 8PSK (8 Phase Shift Keying) phase modulation was studied. Firstly, the total length of the RS code symbols was designed as 54 according to the characteristics of RS code and the data link structure of 1090ES expansion system. Secondly, error performance with different RS code coding efficiency was discussed, and its influence on performance of the 1090ES expansion system was analyzed, thereby, the optimum selection of RS code coding efficiency range was determined as 0.6-0.7. Finally, the concrete analysis of the error performance in the selected encoding efficiency range was given, and then the experimental results show that the length of information symbols could be chosen as 32, 34 or 36. Furthermore, Matlab simulation analysis shows that the designed RS code can effectively improve the error performance of 1090ES expansion system with RS(54, 32) as an example.

Reference | Related Articles | Metrics
Construction method of virtual position in process of cross-domain access control based on organization based 4 levels access control model
PENG You SONG Yan JU Hang WANG Yanzhang
Journal of Computer Applications    2014, 34 (8): 2345-2349.   DOI: 10.11772/j.issn.1001-9081.2014.08.2345
Abstract291)      PDF (746KB)(442)       Save

For the problems of Organization Based 4 Levels Access Control (OB4LAC) model on how to build the virtual positions based on the requested permission sets from users in other domain, this paper proposed a detailed process based on the following three stages, which are the searching stage of the role sets based on the required permission, the determining stage of Separation of Duty (SoD) and activating constraints, the creation and revoke stage of virtual position. Aiming to the searching stage of the role sets based on the required permission, the authors gave three searching algorithms that match three different cases respectively, which are complete matching, available matching and least privilege matching; for the determining stage of SoD and activating constraints, the authors defines three kinds of matrixes which are Separate of Duty Matrix (SODM), Cardinality Constraint Matrix (CCM) and Anti-connection Inherit Matrix (AIM), then based on those matrixes and corresponding process to solve these problems of constraints; aiming to the creation and revoke stage of virtual position, this paper gave the management functions required for completing the process. Through these specific processes and realization algorithms, the authors resolved the problems of building the virtual positions in multi-domain environment for OB4LAC model.

Reference | Related Articles | Metrics
Network proxy research and implementation for Internet of things applications based on constrained application protocol
SONG Yan FU Qian
Journal of Computer Applications    2013, 33 (11): 3010-3015.  
Abstract638)      PDF (964KB)(433)       Save
To solve the problem of high technology bottleneck caused by the three-layer research and development independence of Internet of Things (IoT), a solution based on Constrained Application Protocol (CoAP) was proposed. This solution developed CoAP-HTTP network proxy based on CoAP implementation, which enabled users to access the IoT node resources through the browser directly, to discover resources, to query data and to subscribe resources, etc. The test results show that the proxy mode does not affect the response rate of the system and it is stable enough to support multiple users accessing the network node data at the same time. The CoAP Agent model can help application developers circumvent the complexity of low-level software development and data exchange development; hence they are able to generate a new application independently. The CoAP Agent model provides a new way for the application development of IoT.
Related Articles | Metrics
Surface development of oblique circular cone with SolidWorks re-development
SONG Yan ZHANG Jingjing CHEN Xiaopeng QIAN Qing
Journal of Computer Applications    2013, 33 (04): 1119-1121.   DOI: 10.3724/SP.J.1087.2013.01119
Abstract1215)      PDF (398KB)(559)       Save
Because the unfolded process of three-way conical pipe is complex, the development drawing cannot be completed automatically. This paper introduced a general analytic algorithm about the development of curve oblique based on the thought of symbolic-graphic combination. The equation of two conical intersection line was established by exploring the mathematical model of the skew intersection to the axis of the cone. The intersecting lines in the SolidWorks interface were created by means of VB progamming and were verified through SolidWorks. After setting up flattening curve equation, the development drawing was carried out in the SolidWorks. Thus, the expansion plan of two cones with arbitrary size and skew axises was designed by parametric means on the SolidWorks interface. The unfolding method is reliable and it makes automatic development drawing practical. The results and relevant data also reveal that the algorithm is of fast speed, high precision and strong universality, which can be used for the expansion mapping of a variety of sheet metal parts to facilitate the manufacture of sheet metal parts.
Reference | Related Articles | Metrics
Study of chaos in double coupled oscillators system based on topological horseshoe theory
XU Guilan TANG Song YANG Yanfang
Journal of Computer Applications    2013, 33 (02): 304-307.   DOI: 10.3724/SP.J.1087.2013.00304
Abstract756)      PDF (597KB)(391)       Save
Recently, collective chaos in coupled oscillators networks has become a new hot spot in the chaos study. On account of short growing history of collective chaos and lacking of mature theories and methods, the main means of research is still concentrated on the rough ones such as numerical computation, power spectrum and Lyapunov exponent, which are not strict judgment in mathematics and hard to describe the mechanism of chaos. By means of topological horseshoe theory, the authors studied deeply collective chaos of one four-dimensional continuous system consisting of a pair of coupled oscillators and found that topological horseshoe with expanding in one direction in the phase space of the corresponding Poincare map. It not only strictly demonstrates by numerical way that the coupled oscillator system is chaotic, but also reveals the dynamic mechanism of chaos.
Related Articles | Metrics
Large-capacity dynamic multiple watermarking with tamperable localization based on Sudoku
ZHANG Li LI Hong-song YAN Xi-lan LIAN De-liang
Journal of Computer Applications    2012, 32 (11): 3129-3146.   DOI: 10.3724/SP.J.1087.2012.03129
Abstract925)      PDF (660KB)(469)       Save
In this paper the largecapacity dynamic multiple watermarking algorithm based on Sudoku was proposed with two bit/pixel embedding capacity. The original image was divided into M×N pixels nonoverlapping areas. Different watermarks with size of 2 M×N pixels were embedded into the corresponding areas. If the watermarked area was tampered, the watermark in this area could not be extracted correctly. At any time, any watermarks can be embedded into any area as long as the areas are nonoverlapping. The experimental results show that the proposed algorithm has a larger watermarking embedding capacity and higher accuracy of tampered localization.
Reference | Related Articles | Metrics
Noise image compressed coding based on edge detection
Ying-Hua TIAN Jing-Song YANG Yue TAO
Journal of Computer Applications   
Abstract2034)      PDF (970KB)(1017)       Save
Edge blurring phenomenon, which occurs in the wavelet-based image compression algorithms under noised image or low bit rates, remains an open question for many years. Therefore, this paper presented a method of noise image compression and coding based on edge detection. Firstly, the image was wavelet edge detected, the detected wavelet coefficients were protected, and then the noise was removed by soft-threshold method, and at last we compressed and coded it by using Set Partitioning in Hierarchical Trees (SPIHT) method. The experimental result shows that this method not only achieve high compression ratio, remove noise well but also solve edge blurring problem better.
Related Articles | Metrics