Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Improved remote sensing image fusion algorithm based on channel attention feedback network
WU Lei, YANG Xiaomin
Journal of Computer Applications    2021, 41 (4): 1172-1178.   DOI: 10.11772/j.issn.1001-9081.2020071064
Abstract324)      PDF (5163KB)(401)       Save
Aiming at the problems of feedforward Convolutional Neural Network(CNN), such as small receptive field, insufficient context information acquirement and that only shallow features can be extracted by the feature extraction convolutional layer of the network, an improved remote sensing image fusion algorithm based on channel attention feedback network was proposed. Firstly, the detail features of PANchromatic(PAN) images and the spectral features of Low-resolution MultiSpectral(LMS) images were initially extracted through two convolutional layers. Secondly, the extracted features were combined with the deep features fed back from the network and inputted to the channel attention mechanism module to obtain the initially refined features. Thirdly, the deep features with stronger characterization capability were generated by feedback module. Finally, High-resolution MultiSpectral(HMS) images were obtained by putting the generated deep features into the reconstruction layer with deconvolution. Experimental results on three different satellite image datasets show that the proposed algorithm can well extract the detail features of PAN images and the spectral features of LMS images, and the HMS images recovered by this algorithm are clearer subjectively and better than the comparison algorithms objectively; at the same time, the Root Mean Square Error(RMSE) index of the proposed method is more than 50% lower than that the traditional methods, and more than 10% lower than that the feedforward convolutional network methods.
Reference | Related Articles | Metrics
Instance transfer learning model based on sparse hierarchical probabilistic self-organizing graphs
WU Lei, TIAN Ruya, ZHANG Xuefu
Journal of Computer Applications    2016, 36 (3): 692-696.   DOI: 10.11772/j.issn.1001-9081.2016.03.692
Abstract635)      PDF (885KB)(404)       Save
The current study of instance-transfer learning suffers from the mismatch between the granularities of data from multi-source heterogeneous domains. A Transfer Sparse unsupervised Hierarchical Probabilistic Self-Organizing Graph (TSHiPSOG) method based on the framework of Hierarchical Probabilistic Self-Organizing Graph (HiPSOG) method in the single domain was proposed. Firstly, representation vectors with different granularities were extracted from source and target domains by using hierarchical self-organizing model based on a probabilistic mixture of multivariate Gaussian component; and the sparse graph probabilistic criterion was used to control the growth of the model. Secondly, the most similar representation vector of the target domain data was searched in the rich-information source domain by using the Maximum Information Coefficient (MIC). Then, the data in the target domain was classified using labels of similar representation vectors in the source domain. Finally, the experimental results on the international universal 20 Newsgroups dataset and the spam detection dataset show that the proposed method improves the average classifying accuracy of target domain using the information from source domain by 15.26% and 9.05%. Moreover, the approach improves the average classifying accuracy with mining different granularity representation vectors by 4.48% and 4.13%.
Reference | Related Articles | Metrics
Personalized Privacy Preservation against Sensitivity Homogeneity Attack in Location-based Services
WU Lei PAN Xiao PU Chunhui LI Zhanping
Journal of Computer Applications    2014, 34 (8): 2356-2360.   DOI: 10.11772/j.issn.1001-9081.2014.08.2356
Abstract504)      PDF (772KB)(399)       Save

The existing privacy preservation methods in location-based services only focus on the protection of user location and identification information. It produces the truth of sensitive homogeneity attack when the queries in a cloaking set are sensitive information. To solve this problem, a personalized (k,p)-sensitive anonymization model was presented. On the basis of this model, a pruning tree-based cloaking algorithm called PTreeCA was proposed. The tree-type index in the spatial database has two features. The one is that mobile users are roughly partitioned into different groups according to the locations of mobile users; the other one is that the aggregated information can be stored in the intermediate nodes. By utilizing the two features, PTreeCA could find the cloaking set from the leaf node where the query user is and its sibling nodes, which are benefit for improving efficiency of the anonymization algorithm. The efficiency and effectiveness of PTreeCA are validated by a series of designed experiments on the simulated and real data sets. The average success rate is 100%, and the average cloaking time is only about 4ms. The experimental results show that PTreeCA is effective in terms of success rate, cloaking time, and the anonymization cost when the privacy requirements levels are low or medium.

Reference | Related Articles | Metrics
Wormhole detection based on neighbor routing in Ad Hoc network
CAO Xiaomei WU Lei LI Jiageng
Journal of Computer Applications    2014, 34 (3): 710-713.   DOI: 10.11772/j.issn.1001-9081.2014.03.0710
Abstract401)      PDF (719KB)(497)       Save

To solve high energy and time delay cost problems caused by wormhole detection in Ad Hoc networks, a light-weighted wormhole detection method, using less time delay and energy, was proposed. The method used the neighbor number of routing nodes to get a set of abnormal nodes and then detect the presence of a wormhole by using the neighbor information of abnormal node when routing process was completed. The simulation results show that the proposed method can detect wormhole with less number of routing query. Compared with the DeWorm (Detect Wormhole) method and the E2SIW (Energy Efficient Scheme Immune to Wormhole attacks) method, it effectively reduces the time delay cost and energy cost.

Related Articles | Metrics
Artificial immune algorithm for dynamic task scheduling on cloud computing platform
YANG Jing WU Lei WU Dean WANG Xiaomin LIU Nianbo
Journal of Computer Applications    2014, 34 (2): 351-356.  
Abstract492)      PDF (933KB)(549)       Save
In the field of cloud computing, it is a key problem that how task schedules. This paper presented an artificial immune algorithm for dynamic task scheduling on cloud computing platform. Firstly, the algorithm used the queuing theory to determine the conditions of cloud computing platform to maintain steady-state, and provided the basic data for the following algorithm. Then, this paper used the clone selection algorithm to search out the approximate optimal configuration which calculated resources for different virtual machines of different nodes in the cluster. Finally, proper load balancing processing algorithm joined with immune theory improved the antibody genes. The results of simulation experiment show that, this algorithm can effectively improve the convergence speed and accuracy, search reasonable allocation quickly and improve the cluster resource utilization.
Related Articles | Metrics
Birth defects detection algorithm based on emerging patterns
Bao-hua WU Lei DUAN Zhong-hua YU Chang-jie TANG Jun ZHU
Journal of Computer Applications    2011, 31 (04): 885-889.  
Abstract1444)      PDF (767KB)(469)       Save
The problem of birth defects is one of the most important public health problems in the world, and the application of data mining method to improve the diagnostic accuracy for birth defects is a hot medical research issue. The authors proposed two emerging patterns for birth defects feature extraction: the defection contrast to normal and the normal contrast to defection. The Birth Defects Detection based on Emerging Patterns (BDD-EP) algorithm was implemented through combining the proposed patterns with C4.5 decision tree. The extensive experimental results show that the detection accuracy of BDD-EP is as high as 90.1%, the F-measure of normal samples is 93.9%, and the F-measure of defect samples is 741%. Compared with other famous classical classification algorithms, BDD-EP algorithm can get better results.
Related Articles | Metrics
Updated algorithm for mining association rules based on parallel computation
WU Lei,CHEN Peng
Journal of Computer Applications    2005, 25 (09): 1989-1991.   DOI: 10.3724/SP.J.1087.2005.01989
Abstract1075)      PDF (171KB)(929)       Save
Updated solution in parallel implementation of discovery of association rules was studied,and IDD algorithm based on DD algorithm was introduced.After that,HD algorithm,based on IDD and CD algorithms was proposed to solve the problem of distributing the candidate item sets among processors effectively.The last part was the complexity analysis of the IDD and HD algorithms.
Related Articles | Metrics