Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Cooperative caching strategy based on user preference for content-centric network
XIONG Lian, LI Pengming, CHEN Xiang, ZHU Hongmei
Journal of Computer Applications    2018, 38 (12): 3509-3513.   DOI: 10.11772/j.issn.1001-9081.2018051057
Abstract351)      PDF (815KB)(358)       Save
Nodes in the Content-Centric Network (CCN) cache all the passed content by default, without selective caching and optimally placing of the content. In order to solve the problems, a new Cooperative Caching strategy based on User Preference (CCUP) was proposed. Firstly, user's preference for content type and content popularity were considered as user's local preference indexes to realize the selection of cached content. Then, the differentiated caching strategy was executed on the content that needed to be cached, the globally active content was cached at the important central node, and the inactive content was cached according to the matching of the local preference and the distance level between node and user. Finally, the near access of user to local preference content and the quick distribution of global active content were both achieved. The simulation results show that, compared with typical caching strategies, such as LCE (Leave Copy Everywhere)、Prob(0.6) (Probabilistic caching with 0.6)、Betw (cache "less for more"), the proposed CCUP has obvious advantages in average cache hit rate and average request delay.
Reference | Related Articles | Metrics
Design and implementation of performance comparing frame for higher-order code elimination
ZHAO Di, HUA Baojian, ZHU Hongjun
Journal of Computer Applications    2016, 36 (9): 2481-2485.   DOI: 10.11772/j.issn.1001-9081.2016.09.2481
Abstract493)      PDF (713KB)(328)       Save
In functional programming language compilation, closure conversion and defunctionalization are two widely used higher-order code eliminating methods. To improve the operational efficiency of functional programming languages, focusing on the higher-order code eliminating phase, a compiler frame to compare the performance of code generated by closure conversion and defunctionalization was proposed. Both closure conversion and defunctionalization were used in parallel in the comparing frame with a diamond structure. A functional programming language named FUN and a compiling system for FUN based on the comparing frame was proposed. Comparison experiments of closure conversion and defunctionalization were conducted on the proposed system by using typical use cases, and the experimental results were compared in code quantity and operation efficiency. The result suggests that compared with closure conversion, defunctionalization can produce shorter and faster target code; the amount of code can be decreased by up to 33.76% and performance can be improved by up to 69.51%.
Reference | Related Articles | Metrics
Achievable information rate region of multi-source multi-sink multicast network coding
PU Baoxing, ZHU Hongpeng, ZHAO Chenglin
Journal of Computer Applications    2015, 35 (6): 1546-1551.   DOI: 10.11772/j.issn.1001-9081.2015.06.1546
Abstract461)      PDF (915KB)(369)       Save

In order to solve the problem of multi-source multi-sink multicast network coding, an algorithm for computing achievable information rate region and an approach for constructing linear network coding scheme were proposed. Based on the previous studies, the multi-source multi-sink multicast network coding problem was transformed into a specific single-source multicast network coding scenario with a constraint at the source node. By theoretical analyses and formula derivation, the constraint relationship among the multicast rate of source nodes was found out. Then a multi-objective optimization model was constructed to describe the boundary of achievable information rate region. Two methods were presented for solving this model. One was the enumeration method, the other was multi-objective optimization method based on genetic algorithm. The achievable information rate region could be derived from Pareto boundary of the multi-objective optimization model. After assigning the multicast rate of source nodes, the linear network coding scheme could be constructed by figuring out the single-source multicast network coding scenario with a constraint. The simulation results show that the proposed methods can find out the boundary of achievable information rate region including integral points and construct linear network coding scheme.

Reference | Related Articles | Metrics
Signal denoising method based on singular value decomposition and Savitzky-Golay filter
ZHU Hongyun, WANG Changlong, WANG Jianbin, MA Xiaolin
Journal of Computer Applications    2015, 35 (10): 3004-3007.   DOI: 10.11772/j.issn.1001-9081.2015.10.3004
Abstract646)      PDF (688KB)(448)       Save
In order to reduce the noise of signal, a new denoising approach was proposed based on Singular Value Decomposition (SVD) and Savitzky-Golay filter. The change law of negentropy with Signal-to-Noise Ratio (SNR) was analyzed, then the negentropy was treated as an evaluating parameter of noise suppression, and the optimal dimension of the Hankel matrix of the signal was obtained. Then the Savitzky-Golay filter was used to process the singular values which are used to reconstruct the denoised signal, and the effect of Savitzky-Golay filter configuration on denoising result was studied, then the optimal configuration of Savitzky-Golay filter was determined by defining error function. The proposed approach was applied to multi-component periodic signal and linear frequency modulation signal denoising. The result shows that the proposed approach can reduce the noise effectively, and it is an effective denoising approach.
Reference | Related Articles | Metrics
Defocus blur parameter estimation method based on blur spectrum characteristic of image edge
LIANG Min ZHU Hong
Journal of Computer Applications    2014, 34 (4): 1177-1181.   DOI: 10.11772/j.issn.1001-9081.2014.04.1177
Abstract447)      PDF (718KB)(473)       Save

The accurate estimation of the Point Spread Function (PSF) is the key point in image restoration. For the unknown PSF parameter of defocus blur, an estimation method was proposed based on blur spectrum characteristic of image edge. Specifically, the blur spectrum feature of basic edge was analyzed, and then the edge model of natural image was treated as reference image. Furthermore, the max spectrum similarity was analyzed to obtain the right parameter between the image to be restored and the blurred reference image with defocus parameter in a continuous range. The experimental results show that the proposed algorithm suits large scale defocus blur images and has strong anti-noise ability.

Reference | Related Articles | Metrics
Hybrid detection technique for Android kernel hook
HUA Baojian ZHOU Aiting ZHU Hongjun
Journal of Computer Applications    2014, 34 (11): 3336-3339.   DOI: 10.11772/j.issn.1001-9081.2014.11.3336
Abstract620)      PDF (820KB)(29770)       Save

To address the challenge of Android kernel hook detection, a new approach was proposed to detect Android kernel hooks by combining static technique based on characteristic pattern and dynamic technique based on behavioural analysis. The attacks including modifying system call tables and inline hook could be detected by the proposed approach. Software prototypes and test experiments were given. The experimental results show that the proposed method is effective and efficient in detecting Android kernel hooks, for most of the test cases, the runtime overhead is below 7%; and it is suitable to detect Android kernel hooks.

Reference | Related Articles | Metrics
Algorithm for modulation recognition based on cumulants in Rayleigh channel
ZHU Hongbo ZHANG Tianqi WANG Zhichao LI Junwei
Journal of Computer Applications    2013, 33 (10): 2765-2768.  
Abstract571)      PDF (563KB)(780)       Save
Concerning the problem of modulation identification in the Rayleigh channel, a new algorithm based on cumulants was proposed. The method was efficient and could easily classify seven kinds of signals of BPSK (Binary Phase Shift Keying), QPSK (Quadrature Phase Shift Keying), 4ASK (4-ary Amplitude Shift Keying), 16QAM (16-ary Quadrature Amplitude Modulation), 32QAM (32-ary Quadrature Amplitude Modulation), 64QAM (64-ary Quadrature Amplitude Modulation) and OFDM (Orthogonal Frequency Division Multiplexing) by using the decision tree classifier and the feature parameters that were extracted from combination of four-order cumulant and six-order cumulant. Through theoretical derivation and analysis, the algorithm is insensitive to Rayleigh fading and AWGN (Additive White Gaussian Noise). The computer simulation results show that the successful rates are over 90% when SNR (Signal-to-Noise Ratio) is higher than 4dB in Rayleigh channel, which demonstrates the feasibility and effectiveness of the proposed algorithm.
Related Articles | Metrics
Direction of arrival estimation of orthogonal frequency division multiplexing signal based on wideband focused matrix and higher-order cumulant
WANG Zhichao ZHANG Tianqi WAN Yilong ZHU Hongbo
Journal of Computer Applications    2013, 33 (07): 1828-1832.   DOI: 10.11772/j.issn.1001-9081.2013.07.1828
Abstract953)      PDF (760KB)(645)       Save
To solve the problem of the Orthogonal Frequency Division Multiplexing (OFDM) broadband signal processing, an algorithm for the Direction of Arrival (DOA) estimation of OFDM signal based on the broadband focused matrix and higher-order cumulant was introduced. In the former algorithm, broadband array data was broken down into several narrowband signals by Fourier transform, the direction matrices under different frequence bands were transformed to the same reference frequency by a focused matrix, and then with the Multiple Signal Classification (MUSIC) algorithm DOA was estimated. In the higher-order cumulant algorithm, through the focus operation, array output vectors at different frequency bins were transformed to focusing frequency and individual cumulant matrix was got. Each cumulant matrix was made weighted average and eigen-decomposition, and then the MUSIC algorithm was applied to estimate DOA. Theoretical analysis and simulation results show that the two methods are able to accurately estimate DOA of OFDM signal, the spatial resolution of four-order cumulant method is better than the focusing matrix method. The four-order cumulant expanded the array aperture, and it also has good adaptability when the Signal-to-Noise Ratio (SNR) is low.
Reference | Related Articles | Metrics
Sub-pixel discrete method of point spread function from blurred images
LIANG Min ZHU Hong OUYANG Guang-zheng LIU Wei
Journal of Computer Applications    2012, 32 (02): 496-498.   DOI: 10.3724/SP.J.1087.2012.00496
Abstract1197)      PDF (534KB)(432)       Save
Fast and accurate Point Spread Function (PSF) estimation method is the premise to obtain good results on the blur image restoration. To solve the deficiency of the discrete PSF of defocus-blurred and motion-blurred images, a discretization method was proposed based on the combination of geometric property of degradation model and sub-pixel estimation. Specifically, the principle of weight allocation was defined, which was related to the distance with the neighboring pixels. Thus, the discretization of PSF was realized. Finally, the experimental results illustrate that the proposed method improves result precision and outperforms the traditional one on visual quality, sharpness evaluation function, Peak Signal-to-Noise Ratio (PSNR) and Improved Signal-to-Noise Ratio (ISNR).
Related Articles | Metrics
Larger-traffic-first packet marking for real-time IP traceback
LI Qiang, ZHU Hong-zi, JU Jiu-bin
Journal of Computer Applications    2005, 25 (07): 1498-1501.  
Abstract981)      PDF (651KB)(729)       Save
Based on the current research on improving realtime PPM algorithms in IP traceback, the relations among marking probability, traffic volume for constructing an attack path and the distance of the attacking path were analysed. And an approach of realtime IP tracebacking which deploys larger traffic first probabilistic packet marking scheme (LTFMS) was proposed. According to the statistics on the present traffic of routers, a victim could construct a major attacking path in minimum time. For large-scale DDoS attacks, by establishing a simulated test environment and experiment analysis, LTFMS can construct more attacking paths than the existing schemes within the same time.
Reference | Related Articles | Metrics