Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Software quality evaluation method considering decision maker’s psychological behaviors
Yanhao SUN, Wei XU, Tao ZHANG, Ningxin LIU
Journal of Computer Applications    2022, 42 (8): 2528-2533.   DOI: 10.11772/j.issn.1001-9081.2021060999
Abstract261)   HTML2)    PDF (611KB)(57)       Save

Aiming at the lack of consideration of the psychological behaviors of decision makers in software quality evaluation methods, a TOmada de Decisao Interativa e Multicritevio (TODIM) software quality evaluation method based on interval 2-tuple linguistic information was proposed. Firstly, interval 2-tuple linguistic information was used to characterize the evaluation information of experts for software quality. Secondly, the subjective and objective weights of software quality attributes were calculated by subjective weighting method and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) respectively. On this basis, the comprehensive weights of software quality attributes were obtained by combined weighting method. Thirdly, in order to better describe the psychological behaviors of experts in the process of software quality evaluation, TODIM was introduced into software quality evaluation. Finally, the method was used to evaluate the software quality of assistant dispatcher terminal in high-speed railway dispatching system. The result shows that the third assistant dispatcher terminal software provided by the railway software supplier has the highest dominance value and its quality is the best. The results of comparing this method with the regret theory and Preference Ranking Organization METHod for Enrichment Evaluations (PROMETHEE-II) show that the three methods are consistent in the selection of the best quality software, but the overall rankings of the three methods are somewhat different, indicating that the constructed method has strong superiority in describing the interaction between multiple criteria and the psychological behaviors of decision makers.

Table and Figures | Reference | Related Articles | Metrics
Cloud computing task scheduling based on orthogonal adaptive whale optimization
Jinquan ZHANG, Shouwei XU, Xincheng LI, Chongyang WANG, Jingzhi XU
Journal of Computer Applications    2022, 42 (5): 1516-1523.   DOI: 10.11772/j.issn.1001-9081.2021050806
Abstract290)   HTML5)    PDF (1821KB)(78)       Save

Aiming at the problems such as long task completion time, high task execution cost and unbalanced system load in task scheduling, a new cloud computing task scheduling method based on Orthogonal Adaptive Whale Optimization Algorithm (OAWOA) was proposed. Firstly, the Orthogonal Experimental Design (OED) was applied to the population initialization and global search stages to improve and maintain the population diversity, avoid the algorithm from falling into local convergence too early. Then, the adaptive exponential decline factor and bidirectional search mechanism were used to further strengthen the global search ability of the algorithm. Finally, the fitness function was optimized to enable the algorithm to achieve multi-objective optimization. Through the simulation experiments, the proposed algorithm was compared with Whale Optimization Algorithm (WOA), Particle Swarm Optimization (PSO) algorithm, Bat Algorithm (BA) and two other improved WOAs. Experimental results show that, when the task scale is 50 and 500, the proposed algorithm achieves better convergence effect, has the total time and total cost of the obtained system executing tasks lower than those of other algorithms, and has the load balancing degree only lower than that of BA. In conclusion, the proposed algorithm shows significant advantages in reducing the total time and cost of system executing tasks and improving the system load balancing.

Table and Figures | Reference | Related Articles | Metrics
Multiparty quantum key agreement protocol based on logical single particle
Shengwei XU, Jie KANG
Journal of Computer Applications    2022, 42 (1): 157-161.   DOI: 10.11772/j.issn.1001-9081.2021010176
Abstract263)   HTML6)    PDF (456KB)(57)       Save

The influence of collective noise on quantum cryptographic protocols can not be ignored, however there are few Multiparty Quantum Key Agreement (MQKA) protocols that can resist collective noise. In order to resist the influence of collective noise, two sets of logical unitary operators were proposed for the logical single particle which can resist collective-dephasing noise and the logical single particle which can resist collective rotation noise respectively, so that after acting them on the logical single particles, two unitary operators did not change the measurement base, while the other two would change the measurement base. Based on this property, an MQKA protocol was proposed. Firstly, a logical single particle was transmited to the next participant by each participant.Then, the logical single particle was encrypted by all other participants and returned to the participant to form a “ring”. Finally, the shared key was obtained by measurement. Security analysis shows that the proposed protocol can resist intercept-resend attack, entanglement-measurement attack and participant attack. Efficiency analysis shows that this protocol achieves higher qubit efficiency.

Table and Figures | Reference | Related Articles | Metrics
Wireless communication system of capsule endoscope based on ZL70102
WEI Xueling, LIU Hua
Journal of Computer Applications    2015, 35 (1): 279-282.   DOI: 10.11772/j.issn.1001-9081.2015.01.0279
Abstract677)      PDF (657KB)(587)       Save

For the traditional method of digestive tract disease diagnosis, the accuracy rate is low and the process is painful. In order to solve these problems, a wireless capsule endoscope system was designed using the wireless communication technology to transmit the image of the tract out of the body. Firstly, the image gathering module was used to capture the image of the digestive tract. Secondly, the image data was transmitted out of the body by the digital wireless communication system. Finally, the data was quickly uploaded to PC by the receiving module to decompress and display the image. The experimental results show that the wireless communication system with MSP430 and ZL70102 has several excellent features such as small-size, low-power and high-rate. Compared with the existing capsule endoscope that transmits analog signal, this digital wireless communication system has strong anti-interference capacity. Also, the accuracy of transmitting image data can reach 80% and the power consumption is only 31.6 mW.

Reference | Related Articles | Metrics
Inventory model for promotional merchandise with time-dependent partial backlogging rate and inventory-level-dependent demand rate
HE Wei XU Fuyuan
Journal of Computer Applications    2013, 33 (10): 2950-2953.  
Abstract574)      PDF (564KB)(554)       Save
Promoting commodities is an important promotion means for retailers to drive the sales of commodities to improve business sales revenue effectively. In this paper, by considering the effect of the selling price and the time on the waiting behavior of customers in shortage period, a new backlogging rate related to the selling price and the waiting time was constructed. An inventory model based on multiple orders and two-stage stock dependent selling rate and the waiting behavior of customers for promotional merchandise was proposed. The simulation method had been used to analyze the effect of the key parameters on the order policy and the total profits of the distributors. It shows that the price-sensitivity factor and waiting-time sensitivity factor have a significant effect on service level in each cycle; the critical value of stock-dependent demand rate has a great effect on order times. When the selling price changes in a certain range, distributors should adjust the service level of each cycle. When selling price is too high or too low, distributors should adjust both the service level of each cycle and the order times.
Related Articles | Metrics
Inventory model for deteriorating items with time-dependent partial backlogging rate and inventory-level-dependent demand rate
HE Wei XU Fuyuan
Journal of Computer Applications    2013, 33 (08): 2390-2393.  
Abstract512)      PDF (501KB)(336)       Save
In this paper, a more general inventory model for deteriorating items with partial backlogging rate was developed, and the deterioration rate changed as the time was running on. When the inventory level was positive, the demand rate depended on the selling price; but when the inventory level was negative, some customers were more impatient to wait, therefore the sale opportunity was reduced and a bigger shortage led to a larger loss. With some analysis, the necessary condition for the existence of optimal solution to the general model was derived. The necessary conditions of the existence and uniqueness of the optimal solutions were introduced. At last, a case study was provided for the proposed model.
Related Articles | Metrics
Hybrid spam filtering method based on users' feedback
HUANG Guowei XU Yuwei
Journal of Computer Applications    2013, 33 (07): 1861-1865.   DOI: 10.11772/j.issn.1001-9081.2013.07.1861
Abstract814)      PDF (840KB)(499)       Save
Several limitations exist in the current spam filtering methods, such as they usually rely on only one type of E-mail characteristic to realize the E-mail classification, and have poor adaptability to the dynamic changes of E-mail characteristics. Concerning these limitations, a hybrid spam filtering method based on users' feedback was proposed. Based on the Social Network (SN) relationship among users, the dynamic update of the knowledge for E-mail classification was achieved with the help of the user's feedback scheme. Furthermore, the Bayesian model was introduced to integrate the content-based and the identity-based characteristics of E-mail in the classification. The simulation results show that the proposed method outperforms the traditional method in terms of E-mail classification, when the E-mail characteristics change dynamically. The overall recall, precision and accuracy ratios of the method can achieve 90% and above. While guaranteeing the performance of E-mail classification, the proposed method can improve the adaptability of classification to the changes of E-mail characteristics effectively. Therefore, the proposed method can act as a useful complement to the current spam filtering methods.
Reference | Related Articles | Metrics
Research on certificate revocation list mechanism based on intrusion tolerance
LYU Hongwei XU Lei
Journal of Computer Applications    2013, 33 (01): 160-162.   DOI: 10.3724/SP.J.1087.2013.00160
Abstract731)      PDF (670KB)(473)       Save
In Public Key Infrastructure (PKI) systems, the Certificate Authority (CA) signature is not easy to forge, thus, intrusions to these certificate revocation systems which are based on Certificate Revocation List (CRL) usually aim at destroying system usability and data integration. Concerning this intrusion feature, an intrusion tolerance CRL service system was designed in this paper. Within the system, CRL was stored on multiple redundant servers. In order to copy and use data among these servers, a passive replication algorithm of randomly selecting main server and a simple vote algorithm of selecting the most recent updated CRL were proposed. Under the given experiment intrusion conditions, although system expenses were increased, the query accuracy of certificate revocation of a system that tolerated intrusions was about 20% higher than that of a system that did not. The experimental results show that adding more servers properly increases the query accuracy of certificate revocation and controls the system expenses.
Reference | Related Articles | Metrics
Recognition approach for ballot symbol based on run features
ZHANG Jing-jin XIAO Gang ZHANG Yuan-ming LU Jia-wei XU Jun
Journal of Computer Applications    2012, 32 (07): 1906-1909.   DOI: 10.3724/SP.J.1087.2012.01906
Abstract862)      PDF (625KB)(618)       Save
Recognition of hand-written ballot symbols is crucial in vote-counting system based on image understanding. To improve the accuracy of ballot symbol recognition, a symbol recognition approach based on run feature was proposed. Firstly, the concept of run was presented and a discriminant model was established based on run features of ballot symbols. Secondly, the relative positions of runs were described with a ternary tree. In addition, the main run regions were extracted in noisy environment by merging run regions, and an approach of recognizing ambiguous symbols was also given. Finally, the experimental results show that the run features can accurately reflect the geometrical features of ballot symbols. The proposed approach achieves high accuracy, and its accuracy is 6.07% higher than that of template matching algorithm.
Reference | Related Articles | Metrics
Handover algorithm combined with location prediction in 3GPP LTE systems
SUN Wei-wei SU Han-song TENG You-wei XU Yong
Journal of Computer Applications    2012, 32 (07): 1849-1851.   DOI: 10.3724/SP.J.1087.2012.01849
Abstract937)      PDF (627KB)(746)       Save
Concerning the problem of the decline of 3GPP Long Term Evolution (LTE) system throughput caused by the frequent handover, a location prediction model based on user movement mechanism and changing probability of direction was proposed. The proposed model was combined with the standard handover algorithm of LTE. The model calculated the weight of each possible location using the changing probability of direction, then got the predicted received signal strength through summing. The simulation results show that the number of handover does not change obviously, but the system throughput is improved after using the combined algorithm. In addition, the proposed model is better than the traditional data mining prediction model.
Reference | Related Articles | Metrics
Token-based cross domain single sign on
WANG Guo-wei XUE Man-jun
Journal of Computer Applications    2012, 32 (06): 1766-1768.   DOI: 10.3724/SP.J.1087.2012.01766
Abstract724)      PDF (630KB)(482)       Save
To resolve the problems of cross domain identity authentication in single sign on, a solution based on token was proposed, which transmit the encrypted logon information of user through URL redirection, and then the application systems in heterogeneous domains get the information and response data operation. By using random digital number as token that can be act as the parameter to generate session key of traditional cryptosystem, the solution presents a method of mutual trust and security token transmission between application systems in heterogeneous domains through modern cryptosystem, in this method the application systems generate the session key by using token and encrypt/decrypt the user information, and each communication use different session key. The security analysis of the generation and transmission of token and key shows that the solution is a security implementation of identity authentication in cross domain single sign on.
Related Articles | Metrics
Implementation and optimization of speaker recognition algorithm based on SOPC
HE Wei XU Yang ZHANG Ling
Journal of Computer Applications    2012, 32 (05): 1463-1466.  
Abstract1140)      PDF (2119KB)(725)       Save
Making use of the flexible programmability of SOPC (System On a Programmable Chip) and strong parallel processing ability of FPGA (Field Programmable Gate Array), the speaker recognition algorithm was implemented on FPGA, and the system was optimized in terms of identification speed and accuracy. The principle of speaker recognition algorithm got researched, and according to the characteristics, the SOPC was constructed. It used ping-pong operation to implement voice collection and processing, and used the hardware of FPGA to deal with some time-consuming modules in algorithm so as to quicken the recognition. It also used Genetic Algorithm (GA) to generate template codebook to improve the identification accuracy. Finally, the system realized the function of identity recognition with high real-time quality and accuracy.
Reference | Related Articles | Metrics
Edge-preserving filter with similarity noise detection for impulse noise reduction
LIU Xin GE Hong-wei XU Bing-chun
Journal of Computer Applications    2012, 32 (03): 739-741.   DOI: 10.3724/SP.J.1087.2012.00739
Abstract1082)      PDF (479KB)(533)       Save
In order to improve the filtering effect of noise image, this paper put forward a new filtering algorithm. This algorithm consisted of three stages. Firstly, the similarities of the pixels were used in the image to detect the impulse noise. Then the filter window was divided into eight main directions to determine the directions of the edges, and at last these impulse noises were restored using an edge-preserving method. The simulation results indicate that this algorithm can not only accurately detect the noise points, but aslo protect the noise-free pixels and the boundaries in the noise image when the noise density is small.
Reference | Related Articles | Metrics
Method for estimating building heights via registering catadioptric omnidirectional image and remote sensing image
WANG Yuan-yuan CHEN Wang ZHANG Mao-jun WANG Wei XU Wei
Journal of Computer Applications    2011, 31 (09): 2477-2480.   DOI: 10.3724/SP.J.1087.2011.02477
Abstract1241)      PDF (675KB)(343)       Save
A method was proposed for estimating building heights via registering catadioptric omni-directional image and remote sensing image, which can be applied to large-scale 3D city reconstruction. Firstly, the top edges of building roof were extracted from the catadioptric omni-directional image by using omnidirectional Hough transform. Then the catadioptric omni-directional image and the remote sensing image were registered based on the extracted top edges where the angle consistency nature of horizontal lines in catadioptric omni-directional imaging was used as evidence. Finally, according to the model of catadioptric omnidirectional camera, the building heights were estimated by using the registration results. The proposed method is simple and easy to implement. The experimental results show that the method is effective and the error of estimated building height is fairly small.
Related Articles | Metrics
Extraction technology of blog comments based on functional semantic units
FAN Chun-long XIA Jia XIAO Xin LV Hong-wei XU Lei
Journal of Computer Applications    2011, 31 (09): 2417-2420.   DOI: 10.3724/SP.J.1087.2011.02417
Abstract1277)      PDF (813KB)(509)       Save
Blog is an important kind of network information resources, and the extraction of its comments is the basic work of public opinion analysis researches and of such work. The current mainstream blog comments extraction algorithms were summarized, and the application of page structure in information extraction was described. Using the characteristics of indicating phrases such as the "Home" when people understand Web pages, technology of extracting comments information was proposed by utilizing functional semantic units that they have clear semantics and functional indication. Many technologies involved in the extraction process were detailed such as page structure linearization, functional semantic units recognition, text distinguishment and comments extraction algorithm. Finally, the experimental results show that this technology can achieve better results in extraction of blog body and comments.
Related Articles | Metrics
Modeling and analyzing of simulation based on non-cooperative games for multiple emergency locations in resources scheduling
Ji-jun YANG Sheng-wei XU Wu-jun HUANG Qi-di WU
Journal of Computer Applications   
Abstract1489)      PDF (621KB)(954)       Save
As emergency happens, the scheduling of rescue resources to multiple emergency locations is a realistic and intricate problem, especially when the available resources are limited. After analyzing the competition requirements of multiple emergency locations, a non-cooperative games model and algorithm for scheduling of rescue resources was presented. In the model, the players corresponded to various emergency locations, strategies to all resources scheduling and the payoff of each emergency location to the reciprocal of its scheduling cost. Thus, the optimal scheduling results were determined by the Nash equilibrium point of this game. Then the iterative algorithm was introduced to seek out the Nash equilibrium point. A numerical case test was given to demonstrate the feasibility and availability of the model.
Related Articles | Metrics
A point model simplified method based on mean-shift clustering
Xiao-Ye CAO zhi-yan wang Ying-Hong Liang Xiao-Wei Xu
Journal of Computer Applications   
Abstract1607)      PDF (564KB)(1006)       Save
To efficiently simplify the densely sampled point model, a point sample data reduction method was proposed based on the mean-shift clustering algorithm. Local mode centroids were calculated by mean-shift iterative process. These mode centroids substituting for ambient data points were used to simplify the model. Experiment results show that the algorithm can effectively simplify the densely sampled point model, the reduction speed is fast, and the simplified model can preserve the original geometric shape.
Related Articles | Metrics
Safety interface scheme for component-based safety critical software
Ying LIU Zhong-wei XU
Journal of Computer Applications   
Abstract1679)      PDF (745KB)(1417)       Save
Safety is still a crucial requirement in component-based safety critical software. A safety interface scheme under multi-faults mode was introduced, and this scheme was applied to the development of railway computer interlocking software. By defining the safety interface for each component of the interlocking software, the safety of the interlocking system was guaranteed.
Related Articles | Metrics
Research into safety component model framework of safety requirement-oriented
Gang YU Zhong-wei XU
Journal of Computer Applications   
Abstract1673)      PDF (950KB)(996)       Save
Component theories are becoming more and more important in software engineering. The traditional component technology can't satisfy safety-critical software development requirement. A formal Safety Component (SC) model framework based on safety, which used the fault model and redundancy comparison to ensure the safety property of component, was proposed to standardize components specifications and designs to satisfy the development requirement of safety-critical software. The safety component model has been used in the simulation and testing system of CTCS-2 Train Control Center (TCC).
Related Articles | Metrics
Secure clustering algorithm based on trust evaluation in Ad Hoc network
Jing Zhang li Xu daowei Xu
Journal of Computer Applications   
Abstract1910)      PDF (814KB)(964)       Save
Ad Hoc network has particular characteristics. In this paper, a new trust evaluation scheme based on clustering was proposed. Each node chooses one node that has the highest value as its cluster head. It is proven in theory and in experiment that this algorithm is more secure then other schemes for clustering based Ad Hoc networks.
Related Articles | Metrics