Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Strip steel surface defect detection by YOLOv5 algorithm fusing frequency domain attention mechanism and decoupled head
SUN Zeqiang, CHEN Bingcai, CUI Xiaobo, WANG Lei, LU Yanuo
Journal of Computer Applications    2023, 43 (1): 242-249.   DOI: 10.11772/j.issn.1001-9081.2021111926
Abstract577)   HTML31)    PDF (3035KB)(433)       Save
Aiming at the low detection precision of strip steel surface defects in actual scenarios, which is prone to missed detection and false detection, a YOLOv5-CFD model consisted of CSPDarknet53, Frequency channel attention Network (FcaNet) and Decoupled head was constructed to detect strip steel defects more accurately. Firstly, Fuzzy C-Means (FCM) algorithm was used to cluster anchor boxes in NEU-DET hot-rolling strip steel surface defect detection dataset published by Northeastern University to optimize the matching degree between the prior box and the ground-truth box. Secondly, in order to extract the rich detailed information of the target area, the frequency domain channel attention module FcaNet (Frequency channel attention Network) was added to the original YOLOv5 algorithm. Finally, the decoupled head was used to separate the classification and regression tasks. Experimental results on NEU-DET dataset show that with introducing a small number of parameters to the original YOLOv5 algorithm, the improved YOLOv5 algorithm has the detection precision increased by 4.2 percentage points, the detection mean Average Precision (mAP) of 85.5%; and the detection speed reaches 27.71 Frames Per Second (FPS), which is not much different from the original YOLOv5 so that YOLOv5-CFD can meet the real-time detection requirements.
Reference | Related Articles | Metrics
Network intrusion detection method based on improved rough set attribute reduction and K-means clustering
WANG Lei
Journal of Computer Applications    2020, 40 (7): 1996-2002.   DOI: 10.11772/j.issn.1001-9081.2019111915
Abstract350)      PDF (1071KB)(449)       Save
Under increasingly complex network environment, traditional intrusion detection methods have high false alarm rate, low detection efficiency and the contradiction between accuracy and interpretability in the optimization process. Therefore, an Improved Rough Set Attribute Reduction and optimized K-means Clustering Approach for Network Intrusion Detection (IRSAR-KCANID) was proposed. Firstly, the dataset was preprocessed based on the attribute reduction of fuzzy rough set in order to optimize the anomalous intrusion detection features. Then, the threshold of intrusion range was estimated by improved K-means clustering algorithm, and the network features were classified. After that, according to the linear canonical correlation used for feature optimization, the feature association impact scale was explored from the selected optimal features in order to form the table of feature association impact scale, and the detection of anomalous network intrusion was completed. The experimental results show that the minimum measured feature association impact scale table after feature optimization clustering can minimize the complexity of intrusion detection process and shorten the completion time on the premise of guaranteeing maximum prediction accuracy.
Reference | Related Articles | Metrics
Non-autoregressive method for Uyghur-Chinese neural machine translation
ZHU Xiangrong, WANG Lei, YANG Yating, DONG Rui, ZHANG Jun
Journal of Computer Applications    2020, 40 (7): 1891-1895.   DOI: 10.11772/j.issn.1001-9081.2019111974
Abstract490)      PDF (1003KB)(404)       Save
Although the existing autoregressive translation models based on recurrent neural network, convolutional neural network or Transformer have good translation performance, they have the problem of low translation speed due to low decoding parallelism. Therefore, a non-autoregressive model based learning rate optimization strategy was proposed. On the basis of the non-autoregressive sequence model based on iterative optimization, the learning rate adjustment method was changed, which means that warm up was replaced with liner annealing. Firstly, liner annealing was evaluated to be better than warm up; then liner annealing was applied to the non-autoregressive sequence model in order to obtain the optimal balance between translation quality and decoding speed; finally a comparison between this method and the method of autoregressive model was carried out. Experimental results show that compared with the autoregressive model Transformer, when the decoding speed is increased by 2.74 times, this method has the BiLingual Evaluation Understudy (BLEU) score value of translation quality of 41.31, which reached 95.34% of that of the Transformer. It can be seen that the non-autoregressive sequence model of liner annealing can effectively improve the decoding speed under the condition of reducing a little translation quality, which is suitable for the platforms with urgent need for translation speed.
Reference | Related Articles | Metrics
Social recommendation method based on multi-dimensional trust and collective matrix factorization
WANG Lei, REN Hang, GONG Kai
Journal of Computer Applications    2019, 39 (5): 1269-1274.   DOI: 10.11772/j.issn.1001-9081.2018102110
Abstract667)      PDF (859KB)(411)       Save
Aiming at the shortages in trust analysis of existing social recommendation algorithms, a social recommendation algorithm based on multi-dimensional trust and collective matrix factorization was proposed with full use of user trust relationship mined from social auxiliary information. Firstly, the dynamic and static local trust relationships were extracted respectively from social interaction behaviors and social circle features of the user, and the global trust relationship was extracted from the structural features of trust network. Then, a social recommendation algorithm was presented by collective factorizing the enhanced following relationship matrix and the social trust relationship matrix, and a stochastic gradient descent method was utilized to solve the algorithm. The experimental results on the Sina microblog dataset indicate that the proposed algorithm outperforms some popular social recommendation algorithms such as socialMF, LOCABAL, contextMF and TBSVD (Trust Based Singular Value Decomposition), in terms of recommendation accuracy and Top- K performance.
Reference | Related Articles | Metrics
Field scene recognition method for low-small-slow unmanned aerial vehicle landing
YE Lihua, WANG Lei, ZHAO Liping
Journal of Computer Applications    2017, 37 (7): 2008-2013.   DOI: 10.11772/j.issn.1001-9081.2017.07.2008
Abstract592)      PDF (1005KB)(365)       Save
For the complex and autonomous landing scene is difficult to be recognized in wild flight environment for low-small-slow Unmanned Aerial Vehicles (UAV), a novel field scene recognition algorithm based on the combination of local pyramid feature and Convolutional Neural Network (CNN) learning feature was proposed. Firstly, the scene was divided into small scenes of 4×4 and 8×8 blocks. The Histogram of Oriented Gradient (HOG) algorithm was used to extract the scene features of all the blocks. All the features were connected end to end to get the feature vector with the characteristics of spatial pyramid. Secondly, a depth CNN aiming at the classification of scenes was designed. The method of tuning training was adopted to obtain CNN model and extract the characteristics of deep network learning. Finally, the two features were connected to get the final scene feature and the Support Vector Machine (SVM) classifier was used for classification. Compared with other traditional manual feature methods, the proposed algorithm can improve the recognition accuracy by more than 4 percentage points in data sets such as Sports-8, Scene-15, Indoor-67 and a self-built one. The experimental results show that the proposed algorithm can effectively improve the recognition accuracy of the landing scene.
Reference | Related Articles | Metrics
Improved hierarchical Markov random field algorithm color image segmentation algorithm
WANG Lei, HUANG Chenxue
Journal of Computer Applications    2016, 36 (9): 2576-2579.   DOI: 10.11772/j.issn.1001-9081.2016.09.2576
Abstract535)      PDF (618KB)(410)       Save
The distribution of color image pixel value is difficult to describe in hierarchical Markov Random Field (MRF) segmentation algorithm, therefore, a hierarchical MRF segmentation algorithm based on RGB color statistic distribution was proposed to solve this problem. The key parameters of the MRF model were set up, and the related formulas were deduced. With the RGB color statistic distribution model, the hierarchical MRF energy function was rewritten, and the k-means algorithm was used as presegmentation method to realize unsupervised segmentation. The proposed algorithm has fewer color distribution parameters and lower computational cost in comparison with traditional MRF segmentation model, which describes color distribution more accurately; and it can describe different targets and background very well without being restricted by target and background color distribution and target spatial distribution. Experimental results prove the effectiveness of the proposed algorithm, which is superior to the MRF algorithm and Fuzzy C-Means (FCM) algorithm in computing speed and segmentation accuracy.
Reference | Related Articles | Metrics
Mesh slicer: novel algorithm for 3D mesh compression
HE Chen, WANG Lei, WANG Chunmeng
Journal of Computer Applications    2016, 36 (2): 546-550.   DOI: 10.11772/j.issn.1001-9081.2016.02.0546
Abstract792)      PDF (818KB)(778)       Save
To solve the storage and network transmission problem of the three-Dimensional (3D) mesh model, a new 3D model compression algorithm was proposed. Based on the slicing for 3D mesh, the proposed algorithm was composed of the following three steps: slice vertex calculation, slice boundary sampling and encoding for the image obtained by slicing. For a given 3D mesh model, the bounding box of the model was firstly calculated; then the model was sliced along the longest direction of the bounding box. In the procedure of slicing, the intersection point of the slice with the edge of the mesh was calculated, and as a result, all the intersection points in the same slice constituted a polygon. Then the boundary of the polygon was uniformly resampled so that each layer of the slice had the same number of vertices. After resampling of the polygon boundary, the coordinates of vertices in each slice were converted into the polar form. In this way, all ρ-coordinates and θ-coordinates of the vertices in each slice could constitute one image respectively, and the original 3D model could be represented by these two images. The new representation method has two obvious advantages: first, the dimension of the data is reduced, thus the amount of the data is effectively reduced; second, the data in these two images have great data correlation, and as a result, the entropy of the data is further reduced. Based on these two advantages, the proposed algorithm compressed these two images by difference coding technique and arithmetic coding technique, and then the compressed files were obtained. Compared with Incremental Parametric Refinement (IPR) method, the coding efficiency of the proposed algorithm was increased by 23% under the same quality of the decoded model. The experimental results show that the proposed algorithm can obtain good compression efficiency, and effectively reduce the data amount in the application of 3D model storage and transmission.
Reference | Related Articles | Metrics
Formal model supporting Web service composition and verification
HOU Jinkui, WANG Lei
Journal of Computer Applications    2015, 35 (6): 1773-1779.   DOI: 10.11772/j.issn.1001-9081.2015.06.1773
Abstract468)      PDF (1219KB)(404)       Save

To solve the problems of Web service composition and verification, a formal model was proposed based on the framework of category theory. Process Algebra was introduced into the framework to describe the external behavior of service component, establishing a formal semantic model for the architecture of Web service system. The service network was described with category diagrams, in which Web services were used as categorical objects, and the interactive and composition relationships between services were used as morphisms. On the basis of the formal definitions of service interface, Web service and service composition, a further analysis and discussion about the semantics of service composition and interaction was undertaken. The concepts on Web service substitutability and service request satisfiability were formally defined. The application research shows that the proposed framework enhances semantic description capabilities of Web service architecture.

Reference | Related Articles | Metrics
Optimization of spherical Voronoi diagram generating algorithm based on graphic processing unit
WANG Lei, WANG Pengfei, ZHAO Xuesheng, LU Lituo
Journal of Computer Applications    2015, 35 (6): 1564-1566.   DOI: 10.11772/j.issn.1001-9081.2015.06.1564
Abstract521)      PDF (612KB)(346)       Save

Spherical Voronoi diagram generating algorithm based on distance computation and comparison of Quaternary Triangular Mesh (QTM) has a higher precision relative to dilation algorithm. However, massive distance computation and comparison lead to low efficiency. To improve efficiency, Graphic Processing Unit (GPU) parallel computation was used to implement the algorithm. Then, the algorithm was optimized with respect to the access to GPU shared memory, constant memory and register. At last, an experimental system was developed by using C++ and Compute Unified Device Architecture (CUDA) to compare the efficiency before and after the optimization. The experimental results show that efficiency can be improved to a great extent by using different GPU memories reasonably. In addition, a higher speed-up ratio can be acquired when the data scale is larger.

Reference | Related Articles | Metrics
Application of time-Petri net for process modeling of point-of-care testing
WANG Lei, WANG Bidou, LUO Gangyin, NIE Lanshun, ZHAN Dechen, TIAN Haoran
Journal of Computer Applications    2015, 35 (12): 3520-3523.   DOI: 10.11772/j.issn.1001-9081.2015.12.3520
Abstract486)      PDF (699KB)(346)       Save
Concerning the problems of designing and modeling the process of Point-Of-Care Testing (POCT) system, a method for concurrence system modeling and analyzing based on Time-Petri Net (TPN) was proposed which built more accurate information model for the process designing of POCT system. The activity holding duration was introduced into classical TPN, and the TPN modeling method for POCT control process was proposed. The scheduling simulator embedded in Petri net model was also designed for assisting the analysis, and optimization of the POCT control process. The simulation results show that the proposed modeling method for TPN can satisfy the practical requirement of process modeling of the parallel multi-class POCT control system in the fields such as reachable nodes and running time and provide powerful tool for process simulation and analysis. Furthermore, the proposed TPN can assist the system designer for the optimization of POCT system.
Reference | Related Articles | Metrics
Blind separation method for source signals with temporal structure based on second-order statistics
QIU Mengmeng ZHOU Li WANG Lei WU Jianqiang
Journal of Computer Applications    2014, 34 (9): 2510-2513.   DOI: 10.11772/j.issn.1001-9081.2014.09.2510
Abstract196)      PDF (685KB)(510)       Save

The objective of Blind Source Separation (BSS) is to restore the unobservable source signals from their mixtures without knowing the prior knowledge of the mixing process. It is considered that the potential source signals are spatially uncorrelated but temporally correlated, i.e. they have non-vanishing temporal structure. A second-order statistics based BSS method was proposed for such sources. The robust prewhitening was firstly performed on the observed mixing signals, where the dimension of the sources was estimated based on the Minimum Description Length (MDL) criterion. Then, the blind separation was realized by implementing the Singular Value Decomposition (SVD) on the time-delayed covariance matrix of the whitened signals. The simulation on separation of a group of speech signals proves the effectiveness of the algorithm, and the performance of the algorithm was measured by Signal-to-Interference Ratio (SIR) and Performance Index (PI).

Reference | Related Articles | Metrics
Optimization model and algorithm for production order acceptance problem of hot-rolled bar
BAI Liang WANG Lei
Journal of Computer Applications    2014, 34 (8): 2419-2423.   DOI: 10.11772/j.issn.1001-9081.2014.08.2419
Abstract211)      PDF (779KB)(335)       Save

According to the influence of earliness and reworking penalties, the production order acceptance problem of hot-rolled bar was studied. A mathematical model with the objective of maximize gross profit of order was proposed. A hybrid algorithm with improved NEH (Nawaz-Enscore-Ham) algorithm and Modified Harmony Search (MHS) algorithm was proposed for the model. With the consideration of the constraints in the model, an initial solution was generated by the improved NEH algorithm and further optimized by MHS algorithm. Furthermore, the idea of Teaching-Learning-Based Optimization (TLBO) was introduced to the process of selection and updating for harmony vector to take control of the acceptance of new solutions. Meanwhile, in order to balance the breadth and depth of this algorithm's searching ability, the parameters were adjusted dynamically to improve the global optimization ability. The simulation experiments with practical production data show that the proposed algorithm can effectively improve total profit and acceptance rate, and validate the feasibility and effectiveness of the model and algorithm.

Reference | Related Articles | Metrics
Improved biogeography-based optimization algorithm using hybrid quasi-oppositional learning
WANG Lei JIA Yanchi
Journal of Computer Applications    2014, 34 (11): 3245-3249.   DOI: 10.11772/j.issn.1001-9081.2014.11.3245
Abstract264)      PDF (748KB)(491)       Save

To deal with the problems of poor exploration capability and slow convergence speed in Biogeography-Based Optimization (BBO) algorithm, a hybrid quasi-oppositional learning based BBO algorithm named HQBBO was proposed. Firstly, the definition of heuristic hybrid quasi-oppositional point was given and its advantage in searching efficiency was proven theoretically. Then, the hybrid quasi-oppositional learning operator was brought forward to enhance the exploration capability and accelerate convergence speed. Meanwhile, the dynamic scaling strategy of searching domain and the elitism preservation strategy were utilized to boost optimization efficiency further. Simulation results on eight benchmark functions illustrate that the proposed algorithm outperforms the basic BBO algorithm and the oppositional BBO (OBBO) algorithm in terms of convergence accuracy and speed, which verifies the effectivity of hybird quasi-oppositional learning operator for improving the convergence speed and global exploring ability.

Reference | Related Articles | Metrics
Formal semantics of Agent-based distributed computing model
HOU Jinkui WANG Lei
Journal of Computer Applications    2013, 33 (12): 3423-3427.  
Abstract496)      PDF (985KB)(427)       Save
To resolve the problems of system composition and semantic verification in the construction process of distributed computing model, a semantic description framework for Agent-based distributed computing system was proposed based on category theory and process algebra. The structural semantics of the system model was described within category diagrams, and the relations between components were formally described by morphisms. On this basis, the semantic properties that should be preserved during the process of system modeling, refinement and migration were further analyzed and discussed. The application research shows that the proposed framework can not only be used for distributed system modeling, but also be used for the correctness analysis of system decomposition and composition.
Related Articles | Metrics
Applications of gravitational search algorithm in parameters estimation of penicillin fermentation process model
WANG Lei CHEN Jindong PAN Feng
Journal of Computer Applications    2013, 33 (11): 3296-3299.  
Abstract483)      PDF (737KB)(405)       Save
Concerning the identification of the accurate model parameters of biological fermentation process, a parameters estimation method for non-structural dynamical model of penicillin fermentation using the Gravitational Search Algorithm (GSA) was proposed. Based on the rule of fermentation mechanism, the appropriate state equations of non-structural dynamical model were chosen; and through virtue of the global searching ability of GSA, the parameters of state equation were estimated and the accurate fermentation model was obtained. The simulation results show that GSA accurately estimated model parameters in penicillin fermentation process, the accuracy of the obtained model can meet the requirements of state estimation and condition control in penicillin fermentation process. Therefore, GSA can be applied to model parameters estimation effectively.
Related Articles | Metrics
Tasks assignment optimization in Hadoop
HUANG Chengzhen WANG Lei LIU Xiaolong KUANG Yaping
Journal of Computer Applications    2013, 33 (08): 2158-2162.  
Abstract1014)      PDF (756KB)(526)       Save
Hadoop has been widely used in large data parallel processing. The existing tasks assignment strategies are almost oriented to a homogenous environment, but ignore the global cluster state, or not take into account the efficiency of the implementation and the complexity of the algorithm in a heterogeneous environment. To solve these problems, a new tasks assignment algorithm named λ-Flow which was oriented to a heterogeneous environment was proposed. In λ-Flow, the tasks assignment was divided into several rounds. In each round, λ-Flow collected the cluster states and the execution result of the last round dynamically, and assigned tasks in accordance with these states and the result. The comparative experimental result shows that the λ-Flow algorithm performs better in a dynamic changing cluster than the existing algorithms, and reduces the execution time of a job effectively.
Reference | Related Articles | Metrics
Application of NSGA-Ⅱalgorithm to emergency task of space service
Jing-Hua TONG DAI Guang-ming ZHU Huai-jun WU Wei WANG Lei-lei
Journal of Computer Applications    2012, 32 (11): 3254-3258.   DOI: 10.3724/SP.J.1087.2012.03254
Abstract832)      PDF (743KB)(385)       Save
This paper gave a solution to emergency task in space. When the emergency task occurred, at first, the existing satellite constellation was used to cover the target locations and the coverage rate was computed. If the coverage performance did not meet the mission requirements, the Non-Dominated Sorting Genetic Algorithm Ⅱ (NSGA-Ⅱ) was used to optimize the layout of satellite constellation, i.e. optimizing the anomaly of each satellite in the constellation. Then the phase modulation maneuver was used to achieve constellation optimization results, i.e. maneuvering the satellites to the specified locations, and calculating maneuver time and energy of each satellite. Finally, an emergency task example and its solution process were provided, and the time and energy of the satellite orbit maneuver were calculated.
Reference | Related Articles | Metrics
Network time protocol performance evaluation in LAN environment
CHEN Chao-fuCHEN WANG Lei
Journal of Computer Applications    2012, 32 (04): 943-945.   DOI: 10.3724/SP.J.1087.2012.00943
Abstract862)      PDF (432KB)(426)       Save
Network Time Protocol (NTP) is a simple, economic and efficient way to accomplish time and frequency synchronization of multiple nodes, while relevant study on the performance evaluation is hard to find in literature, which makes it a question whether to use NTP in application. Concerning this problem, the local network NTP performance and impact of system / network load were measured and analyzed on Windows platform. By comparing time value obtained from IRIG-B time code reader and GetLocalTime Windows API, frequency skew of computer clock signal was approximated. The skew value was close to the value calculated by NTP.
Reference | Related Articles | Metrics
Performance of network coding protocol based epidemic routing
HAN Xu YANG Yu-wang WANG Lei
Journal of Computer Applications    2012, 32 (03): 791-794.   DOI: 10.3724/SP.J.1087.2012.00791
Abstract1143)      PDF (764KB)(572)       Save
Many different communication radius of the communication nodes that may cause an unstable network performance can be easily found in Epidemic Routing (ER) network. A network model that combines network coding and epidemic routing can solve this problem. Compared with the traditional epidemic routing, the Network Coding Based Epidemic Routing (NCER) can transmit packets with network coding. In order to compare the performances of the ER and NCER, a probability model of the transmission delay of the network was built. The comparative results between the two protocols with the probability model above show that NCER can be more efficient and stable than ER. The correctness of this probability model has been proved in the simulation. Finally, according to the model evaluation results, a scheme has been given to reduce the network transmission delay.
Reference | Related Articles | Metrics
Network anomaly detection based on anisotropic centroidal Voronoi diagram
LI Xiao-lei WANG Lei
Journal of Computer Applications    2011, 31 (09): 2359-2361.  
Abstract1658)      PDF (469KB)(433)       Save
Network anomaly detection is an important research topic in the field of intrusion detection. However, it is inefficient in practice because the detection rate and false alarm rate restrain each other. Based on the anisotropic centroidal Voronoi diagram, a new algorithm of network anomaly detection was proposed. In this new algorithm, the anisotropic centroidal Voronoi diagram was used in the clustering of data set at first, then the point density for each data point was computed out, which was used to determine whether the data point was normal or not. The laboratory tests on KDD Cup 1999 data sets show that the new algorithm has a higher detection rate and a lower false alarm rate.
Related Articles | Metrics
Blind image restoration based on improved Kalman filter
WANG Lei FENG Xiao-yi WAN Xiao-na
Journal of Computer Applications    2011, 31 (03): 711-714.   DOI: 10.3724/SP.J.1087.2011.00711
Abstract1147)      PDF (658KB)(1125)       Save
To eliminate or reduce the image degradation, the image restoration techniques are often used. In this paper, a new image restoration way was obtained for blind image. Firstly, the Point Spread Function (PSF) of blurred image was estimated by cepstrum. Secondly, the blurred image was restored by the improved Kalman filter. The cepstrum was the way that the PSF of blurred image could be obtained through analyzing the relationship between two parts. One reflected original image, and the other reflected blurred system. The improved Kalman filter took account of the model error of system during the process of estimation. Some digital simulation experiments were done through Matlab. The results using the improved Kalman filter algorithm based on estimated PSF indicate that the proposed method effectively eliminates the impact caused by inaccurate PSF and it has better effects than Kalman filter.
Related Articles | Metrics
Variable size block matching bi-directional motion compensation based on entropy criterion
MA She-xiang,WANG Lei,LIU Gui-zhong,LIU Tie-gen
Journal of Computer Applications    2005, 25 (09): 2117-2119.   DOI: 10.3724/SP.J.1087.2005.02117
Abstract1109)      PDF (208KB)(851)       Save
A variable size block matching bi-directional motion estimation and compensation scheme was introduced.The optimal segmentation of the encoding frame was achieved by the entropy criterion.Assuming the backward frame(reference frame) was encoded by the variable size block matching backward motion estimation and compensation,then the current frame was encoded by the bi-directional motion estimation and compensation.For this frame,backward motion estimation and compensation used the segmentation information of the backward frame firstly.Then,from the backward frame to the current frame,forward motion estimation and compensation was performed on the smaller blocks.The overlapped compensation pixels were the average filter.Because it used variable sizes block matching and utilized the well performance of forward motion estimation,the prediction quality was further improved.Simulation results show that the average peak signal-noise ratio is increased with various video sequences.
Related Articles | Metrics
Data compression algorithms based on wavelet transforming for sensor networks
WANG Lei, ZHOU Si-wang, CHEN Zhi-ping, LIN Ya-ping
Journal of Computer Applications    2005, 25 (07): 1676-1678.   DOI: 10.3724/SP.J.1087.2005.01676
Abstract1445)      PDF (625KB)(687)       Save

According to the data characteristics in sensor networks and the good performances of wavelet transforming in data stream compression, a novel mixed -entropy data compression algorithm based on interval wavelet transforming was proposed for sensor network. Theoretical analysis and simulation results show that, the new method can compress the data stream for sensor networks effectively, and reduce the energy costs of nodes in data transferring. So, it can prolong the lifetime of the whole networks to a greater degree combined with those traditional DC (Data Centric) routing algorithms such as DD (Directed Diffusion) protocol.

Reference | Related Articles | Metrics
Improved multi-class AdaBoost algorithm based on SAMME
Xi-Yang ZHAI WANG Xiao-danWANG LEI Lei
  
Accepted: 02 January 2017