Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Traffic image semantic retrieval method based on specific object self-recognition
Yi ZHAO, Xing DUAN, Shiyi XIE, Chunlin LIANG
Journal of Computer Applications    2020, 40 (2): 553-560.   DOI: 10.11772/j.issn.1001-9081.2019101795
Abstract358)   HTML0)    PDF (1320KB)(433)       Save

In order to retrieve images of traffic violations from a large number of road traffic images, a semantic retrieval method based on specific object self-recognition was proposed. Firstly, road traffic domain ontology as well as road traffic rule description were established by experts in traffic domain. Secondly, traffic image features were extracted by Convolutional Neural Network (CNN), and combined with the strategy for classifying image features which is based on the proposed improved Support Vector Machine based Decision Tree (SVM-DT) algorithm, the specific objects and the spatial positional relationship between the objects in the traffic images were automatically recognized and mapped into the association relationship (rule instance) between the corresponding ontology instance and its objects. Finally, the image semantic retrieval result was obtained by reasoning based on ontology instances and rule instances. Experimental results show that the proposed method has higher accuracy, recall and retrieval efficiency compared to keyword and ontology traffic image semantic retrieval methods.

Table and Figures | Reference | Related Articles | Metrics
Superword level parallelism instruction analysis and redundancy optimization algorithm on DSP
SUO Wei-yi ZHAO Rong-cai YAO Yuan LIU Peng
Journal of Computer Applications    2012, 32 (12): 3303-3307.   DOI: 10.3724/SP.J.1087.2012.03303
Abstract982)      PDF (760KB)(579)       Save
Today, SIMD (Single Instruction Multiple Data) technology has been widely used in Digital Signal Processor (DSP), and most of the existing compilers realize automatic vectorization functions. However,the compiler cannot support SIMD auto-vectorization with the feature of DSP, because of DSP complex instruction set, the specific addressing model, the obstacle of dependence relation to vectorization non-aligned data or other reasons. In order to solve this problem, in this paper, for the automatic vectorization in the Superword Level Parallelism (SLP) based on the Open64 compiler back end, the instruction analysis and redundancy optimization algorithm were improved, so as to transform more efficient vectorized source program. The experimental results show that the proposed method can improve DSP performances and reduce power consumption efficiently.
Related Articles | Metrics
Resisting power analysis attack scheme based on signed double-based number system
WANG Zheng-yi ZHAO Jun-ge
Journal of Computer Applications    2011, 31 (11): 2973-2974.   DOI: 10.3724/SP.J.1087.2011.02973
Abstract994)      PDF (440KB)(395)       Save
Due to the limited resource of security chip, the scheme resisting power analysis attack was researched from two aspects of operation efficiency and withstanding multiple power analysis attacks. A scheme based on Signed Double-based Number System (SDBNS) was presented by coding the key renewably and basic point masking algorithm. According to security analysis, the result shows that the scheme could resist multiple power analysis attacks and promote operation efficiency.
Related Articles | Metrics
Risk assessment model for trusted platform control module based on Bayesian network
WANG Dan ZHOU Tao WU Yi ZHAO Wen-bing
Journal of Computer Applications    2011, 31 (03): 767-770.   DOI: 10.3724/SP.J.1087.2011.00767
Abstract1606)      PDF (837KB)(904)       Save
A risk assessment model based on Bayesian network was proposed. In this model, each risk event influencing the Trusted Platform Control Module (TPCM)'s trust was analyzed. According to the relation among risks, the Bayesian network evaluation model was built. According to the evaluation from expert, Bayesian network inferring method was used to evaluate the risk probability and its influence. The whole system's risk value and risk priority were determined. An example was given to verify the model's correctness and validation.
Related Articles | Metrics