Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Multi-modal summarization model based on semantic relevance analysis
Yuxiang LIN, Yunbing WU, Aiying YIN, Xiangwen LIAO
Journal of Computer Applications    2024, 44 (1): 65-72.   DOI: 10.11772/j.issn.1001-9081.2022101527
Abstract215)   HTML2)    PDF (2804KB)(142)       Save

Multi-modal abstractive summarization is commonly based on the Sequence-to-Sequence (Seq2Seq) framework, and the objective function optimizes the model at the character level, which searches locally optimal results to generate words and ignores the global semantic information of the summary samples. It may cause a problem of semantic deviation between the summary and multimodal information, resulting in factual errors. In order to solve the above problems, a multi-modal summarization model based on semantic relevance analysis was proposed. Firstly, the summary generator based on Seq2Seq framework was trained to generate candidate summaries with semantic multiplicity. Secondly, a summary evaluator based on semantic relevance analysis was applied to learn the semantic differences among candidate summaries and the evaluation mode of ROUGE (Recall-Oriented Understudy for Gisting Evaluation) from a global perspective, so that the model could be optimized at the level of summary samples. Finally, the summary evaluator was used to carry out reference-free evaluation of the candidate summaries, making the finally selected summary sample as similar as possible to the source text in semantic space. Experiments on benchmark dataset MMSS show that the proposed model can improve the evaluation indexes of ROUGE-1, ROUGE-2 and ROUGE-L by 3.17, 1.21 and 2.24 percentage points respectively compared with the current optimal MPMSE (Multimodal Pointer-generator via Multimodal Selective Encoding) model.

Table and Figures | Reference | Related Articles | Metrics
Software Guard Extensions-based secure data processing framework for traffic monitoring of internet of vehicles
Ruiqi FENG, Leilei WANG, Xiang LIN, Jinbo XIONG
Journal of Computer Applications    2023, 43 (6): 1870-1877.   DOI: 10.11772/j.issn.1001-9081.2022050734
Abstract401)   HTML6)    PDF (1801KB)(240)       Save

Internet of Vehicles (IoV) traffic monitoring requires the transmission, storage and analysis of private data of users, making the security guarantee of private data particularly crucial. However, traditional security solutions are often hard to guarantee real-time computing and data security at the same time. To address the above issue, security protocols, including two initialization protocols and a periodic reporting protocol, were designed, and a Software Guard Extensions (SGX)-based IoV traffic monitoring Secure Data Processing Framework (SDPF) was built. In SDPF, the trusted hardware was used to enable the plaintext computation of private data in Road Side Unit (RSU), and efficient operation and privacy protection of the framework were ensured through security protocols and hybrid encryption scheme. Security analysis shows that SDPF is resistant to eavesdropping, tampering, replay, impersonation, rollback, and other attacks. Experiment results show that all computational operations of SDPF are at millisecond level, specifically, all data processing overhead of a single vehicle is less than 1 millisecond. Compared with PFCF (Privacy-preserving Fog Computing Framework for vehicular crowdsensing networks) based on fog computing and PPVF (Privacy-preserving Protocol for Vehicle Feedback in cloud-assisted Vehicular Ad hoc NETwork (VANET)) based on homomorphic encryption, SDPF has the security design more comprehensive: the message length of a single session is reduced by more than 90%, and the computational cost is reduced by at least 16.38%.

Table and Figures | Reference | Related Articles | Metrics
Text steganographic method with hierarchical security
XIANG Lingyun, WANG Xinhui
Journal of Computer Applications    2015, 35 (3): 717-721.   DOI: 10.11772/j.issn.1001-9081.2015.03.717
Abstract440)      PDF (816KB)(459)       Save

For the low security and capacity shortages of steganographic methods based on the single data, a new text steganography method with hierarchical security was proposed. First, multiple types of data in the whole cover document were regarded as optional steganographic covers to build up a hierarchical security steganographic model upon the the steganographic security levels defined by taking the characteristics of different types of data and the steganalysis as evaluation criterions. Then, a security level was adaptively determined by the secret message length, and the secret message was embedded into the selected independent different types of data in a cover document with the help of the built model. Theoretical analysis and experimental results show that compared with the steganography based on single data, the proposed method has expanded the steganographic capacity and reduced the modifications of the statistic characteristics of a single type of data in the cover document when the same secret message was embedded. In conclusion the proposed method improves the security of the secret message.

Reference | Related Articles | Metrics
The Study of Active Queue Management Algorithm Based on Particle Swarm Optimization
WANG Junxiang LIN Bogang
Journal of Computer Applications    2013, 33 (02): 390-396.   DOI: 10.3724/SP.J.1087.2013.00390
Abstract979)      PDF (611KB)(411)       Save
In order to mitigate the network congestion, a novel active queue management algorithm RQQM (Rate and Queue-based Queue Management algorithm) is proposed by particle swarm optimization. In this algorithm, actual queue length is deducted with particle swarm optimization and variation factor, and the dropping strategy and dropping rate are presented based on arrival rate and actual queue length. Then, a simulation with actual data was conducted to study of the algorithm performance between RQQM and RFQM (Rate-based Fair Queue Management algorithm), as well as ABLUE (Adaptive BLUE algorithm). The result shows that it is better adaptability for RQQM.
Related Articles | Metrics
Design and FPGA implementation of parallel high-efficiency BCH decoder
ZHANG Xiang-xian YANG Tao WEI Dong-mei XIANG Ling
Journal of Computer Applications    2012, 32 (03): 867-869.   DOI: 10.3724/SP.J.1087.2012.00867
Abstract1042)      PDF (510KB)(595)       Save
According to the characteristics of parallel BCH decoder, the multiplication of constant coefficient in finite field was realized by using XOR gates to reduce hardware complexity. The part of the error location polynomial was calculated, and then the remaining error location polynomial could be obtained using the theory of affine polynomial and Gray code. The proposed algorithm reduces the system resources occupied.Through timing simulation on Field Programmable Gate Array (FPGA)'s development software ISE10.1, the high-efficiency of the algorithm on time and space has got verified.
Reference | Related Articles | Metrics