Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
3D virtual human animation generation based on dual-camera capture of facial expression and human pose
LIU Jie, LI Yi, ZHU Jiangping
Journal of Computer Applications    2021, 41 (3): 839-844.   DOI: 10.11772/j.issn.1001-9081.2020060993
Abstract785)      PDF (1377KB)(635)       Save
In order to generate a three-dimensional virtual human animation with rich expression and smooth movement, a method for generating three-dimensional virtual human animation based on synchronous capture of facial expression and human pose with two cameras was proposed. Firstly, the Transmission Control Protocol (TCP) network timestamp method was used to realize the time synchronization of the two cameras, and the ZHANG Zhengyou's calibration method was used to realize the spatial synchronization of the two cameras. Then, the two cameras were used to collect facial expressions and human poses respectively. When collecting facial expressions, the 2D feature points of the image were extracted and the regression of these 2D points was used to calculate the Facial Action Coding System (FACS) facial action unit in order to prepare for the realization of expression animation. Based on the standard head 3D coordinate, according to the camera internal parameters, the Efficient Perspective- n-Point (EP nP) algorithm was used to realize the head pose estimation. After that, the facial expression information was matched with the head pose estimation information. When collecting human poses, the Occlusion-Robust Pose-Map (ORPM) method was used to calculate the human poses and output data such as the position and rotation angle of each bone point. Finally, the established 3D virtual human model was used to show the effect of data-driven animation in the Unreal Engine 4 (UE4). Experimental results show that this method can simultaneously capture facial expressions and human poses and has the frame rate reached 20 fps in the experimental test, so it can generate natural and realistic three-dimensional animation in real time.
Reference | Related Articles | Metrics
Element component content dynamic monitoring system based on time sequence characteristics of solution images
LU Rongxiu, CHEN Mingming, YANG Hui, ZHU Jianyong
Journal of Computer Applications    2021, 41 (10): 3075-3081.   DOI: 10.11772/j.issn.1001-9081.2020101682
Abstract471)      PDF (687KB)(244)       Save
In view of the difficulties in real-time monitoring of component contents in rare earth extraction process and the high time consumption and memory consumption of existing component content detection methods, a dynamic monitoring system for element component content based on time sequence characteristics of solution images was designed. Firstly, the image acquisition device was used to obtain the time sequence image of the extraction tank solution. Considering the color characteristics of the extracted liquid and the incompleteness of single color space, the time sequence characteristics of the image were extracted in the color space of the fusion of HSI (Hue, Saturation, Intensity) and YUV (Luminance-Bandwidth-Chrominance) by using Principal Component Analysis (PCA) method, and combined with the production index, the Whale Optimization Algorithm (WOA) based Least Squares Support Vector Machine (LSSVM) classifier was constructed to judge the status of the working condition. Secondly, when the working condition was not optimal, the color histogram and color moment features of the image were extracted in HSV (Hue, Saturation, Value) color space, and an image retrieval system was developed with the linear weighted value of the mixed feature difference between solution images as the similarity measurement to obtain the value of component content. Finally, the test of the mixed solution of the praseodymium/neodymium extraction tank was carried out, and the results show that this system can realize the dynamic monitoring of element component content.
Reference | Related Articles | Metrics
Evolution model of normal aging human brain functional network
DING Chao, ZHAO Hai, SI Shuaizong, ZHU Jian
Journal of Computer Applications    2019, 39 (4): 963-971.   DOI: 10.11772/j.issn.1001-9081.2018081850
Abstract522)      PDF (1354KB)(383)       Save
In order to explore the topological changes of Normal Aging human Brain Functional Network (NABFN), a network evolution Model based on Naive Bayes (NBM) was proposed. Firstly, the probability of existing edges between nodes was defined based on link prediction algorithm of Naive Bayes (NB) and anatomical distance. Secondly, based on the brain functional networks of young people, a specific network evolution algorithm was used to obtain a simulation network of the corresponding middle-aged and old-aged gradually by constantly adding edges. Finally, a network Similarity Index (SI) was proposed to evaluate the similarity degree between the simulation network and the real network. In the comparison experiments with network evolution Model based on Common Neighbor (CNM), the SI values between the simulation networks constructed by NBM and the real networks (4.479 4, 3.402 1) are higher than those of CNM (4.100 4, 3.013 2). Moreover, the SI value of both simulation networks are significantly higher than those of simulation networks derived from random network evolution algorithm (1.892 0, 1.591 2). The experimental results confirm that NBM can predict the topological changing process of NABFN more accurately.
Reference | Related Articles | Metrics
Multi-source data parallel preprocessing method based on similar connection
GUO Fangfang, CHAO Luomeng, ZHU Jianwen
Journal of Computer Applications    2019, 39 (1): 57-60.   DOI: 10.11772/j.issn.1001-9081.2018071869
Abstract462)      PDF (587KB)(282)       Save
With the development of large-scale network environments and big data-related technologies, traditional data fusion analysis technology faces new challenges. Focusing on poor flexibility and low processing efficiency in current multi-source data fusion analysis process, a multi-source data parallel preprocessing method based on similar connection was proposed, in which the idea of dividing and conquering and paralleling was adopted. Firstly, the preprocessing method was improved to increase the flexibility by unifying similar semantics in multi-source data and retaining personality semantics. Secondly, an improved parallel MapReduce framework was proposed to improve the efficiency of similar connections. The experimental results show that the proposed method reduces total data volume by 32% while ensuring data integrity. Compared with traditional MapReduce framework, the improved framework decreases 43.91% of time consumed; therefore, the proposed method can effectively improve the efficiency of multi-source data fusion analysis.
Reference | Related Articles | Metrics
Joint optimization of admission control and power beamforming algorithm in cognitive radio network
ZHU Jiang, DU Qingmin, BA Shaowei
Journal of Computer Applications    2017, 37 (7): 1830-1836.   DOI: 10.11772/j.issn.1001-9081.2017.07.1830
Abstract519)      PDF (1075KB)(448)       Save
In cognitive radio networks, for the robust joint optimization problem of multiuser admission control and power beamforming, a joint optimization scheme based on smooth approximation of entropy function was proposed. Firstly, the two optimization problems of admission control and transmit power beams were converted into a joint optimization problem by L 0-norm minimization. Secondly, the method of smoothing approximation based on entropy function was used to optimize the non-convexity and discontinuity of L 0-norm. Finally, since the objective function was smooth, differentiable and unimodal function, the problem was transformed into the Lagrange function, and Armijo gradient descent method was used to get the optimal solution. The numerical results show that by using the proposed algorithm, the number of admitted uses is not significantly increased when the Signal-to-Interference-plus-Noise Ratio (SINR) is relatively low, but the transmission power consumption is decreased and the number of admitted uses is increased when SINR is relatively high. The uncertain Channel State Information (CSI) of model is analyzed, which can make the network better adapt to the changes of the outside world and improve the reliability of the network. The proposed algorithm can effectively realize the optimal allocation of the network resources and improve the network performance.
Reference | Related Articles | Metrics
Game-theoretic algorithm for joint power control and rate allocation in cognitive networks
ZHU Jiang, BA Shaowei, DU Qingmin
Journal of Computer Applications    2017, 37 (6): 1521-1526.   DOI: 10.11772/j.issn.1001-9081.2017.06.1521
Abstract762)      PDF (995KB)(831)       Save
Aiming at the resource allocation problem for the uplink in cognitive radio networks, a game-theoretic algorithm for joint power control and rate allocation adapted to multi-cell cognitive radio networks was proposed. To control user's power and rate more reasonably and reduce interference among Secondary Users (SUs), firstly, the different cost factors for power and rate were set respectively, so as to control user more reasonably and avoid user excessively increasing transmission power. Then, the existence and uniqueness of the Nash Equilibrium (NE) for the proposed algorithm were proved, the convergence demonstration of the proposed algorithm was given. Finally, for solving the optimization problem of the transmission power and transmission rate, the iterative updating flowchart of the proposed algorithm for the joint power control and rate allocation was presented. The theoretical analysis and simulation results show that, compared with the similar game algorithms, on the premise of guaranteeing the quality of communication, the proposed algorithm can make user acquire higher transmission rate and higher Signal to Interference plus Noise Ratio (SINR) at lower transmission power, reduce the interference among users, and improve the system capacity of SUs.
Reference | Related Articles | Metrics
Improved method of situation assessment method based on hidden Markov model
LI Fangwei, LI Qi, ZHU Jiang
Journal of Computer Applications    2017, 37 (5): 1331-1334.   DOI: 10.11772/j.issn.1001-9081.2017.05.1331
Abstract709)      PDF (746KB)(519)       Save
Concerning the problem that the Hidden Markov Model (HMM) parameters are difficult to configure, an improved method of situation assessment based on HMM was proposed to reflect the security of the network. The proposed method used the output of intrusion detection system as input, classified the alarm events by Snort manual to get the observation sequence, and established the HMM model, the improved Simulated Annealing (SA) algorithm combined with the Baum_Welch (BW) algorithm to optimize the HMM parameters, and used the method of quantitative analysis to get the security situational value of the network. The experimental results show that the proposed method can improve the accuracy and convergence speed of the model.
Reference | Related Articles | Metrics
Mechanism of security situation element acquisition based on deep auto-encoder network
ZHU Jiang, MING Yue, WANG Sen
Journal of Computer Applications    2017, 37 (3): 771-776.   DOI: 10.11772/j.issn.1001-9081.2017.03.771
Abstract545)      PDF (941KB)(526)       Save
To reduce the time complexity of situational element acquisition and cope with the low detection accuracy of small class samples caused by imbalanced class distribution of attack samples in large-scale networks, a situation element extraction mechanism based on deep auto-encoder network was proposed. In this mechanism, the improved deep auto-encoder network was introduced as basic classifier to identify data type. On the one hand, in the training of the auto-encoder network, the training rule based on Cross Entropy (CE) function and Back Propagation (BP) algorithm was adopted to overcome the shortcoming of slow weights updating by the traditional variance cost function. On the other hand, in the stage of fine-tuning and classification of the deep network, an Active Online Sampling (AOS) algorithm was applied in the classifier to select the samples online for updating the network weights, so as to eliminate redundancy of the total samples, balance the amounts of all sample types, improve the classification accuracy of small class samples. Simulation and analysis results show that the proposed scheme has a good accuracy of situation element extraction and small communication overhead of data transmission.
Reference | Related Articles | Metrics
Uniform SILTP based background modeling and its implementation on Intel HD graphics
LIN Zecheng, ZHU Jianqing, LIAO Shengcai, LI Stan Z.
Journal of Computer Applications    2015, 35 (8): 2274-2279.   DOI: 10.11772/j.issn.1001-9081.2015.08.2274
Abstract674)      PDF (934KB)(392)       Save

Since Scale Invariant Local Ternary Pattern (SILTP) background modeling algorithm is of high complexity and slow computing speed, which is not suitable for real-time video processing, a new method named Uniform Scale Invariant Local Ternary Pattern (USILTP) background modeling algorithm was proposed. Firstly, the feature of USILTP was extracted by regulating the frequency of SILTP coding jump in order to reduce the feature dimension of SILTP. Secondly, a USILTP background modeling parallel algorithm based on Intel core graphics (Intel HD) and Open Computing Language technology (OpenCL) was designed and implemented to further accelerate USILTP background modeling algorithm. Finally, the foreground result of USILTP background modeling algorithm was optimized by combing multiple color channel models. The experimental result shows that the proposed algorithm can be applied to process 320×240 resolution video at a rate of 98 frame/s on the Intel HD 4600, which is 4 times faster than that of SILTP background modeling algorithm. In terms of foreground detection, the performance of the proposed algorithm is improved by 2.1% compared with SILTP background modeling algorithm on the public dataset.

Reference | Related Articles | Metrics
Network security situational awareness model based on information fusion
LI Fangwei, ZHANG Xinyue, ZHU Jiang, ZHANG Haibo
Journal of Computer Applications    2015, 35 (7): 1882-1887.   DOI: 10.11772/j.issn.1001-9081.2015.07.1882
Abstract683)      PDF (863KB)(727)       Save

Since the evaluation of Distributed Denial of Service (DDoS) is inaccurate and network security situational evaluation is not comprehensive, a new network security situational awareness model based on information fusion was proposed. Firstly, to improve the accuracy of evaluation, a situation assessment method of DDoS attack based on the information of data packet was proposed; Secondly, the original Common Vulnerability Scoring System (CVSS) was improved and the leak vulnerability was evaluated to make the assessment more comprehensive; Then, according to the combination of objective weight and subjective weight, the method of calculating the combined weights and optimizing the results by Sequence Quadratic Program (SQP) algorithm was raised to reduce the uncertainty of fusion; Finally, the network security situation was got by fusing three aspects evaluation. To verify the original evaluation of DDoS was inaccurate, a testing platform was built and the alarm of the same DDoS differed by 3 orders of magnitude. Compared to the original method based on alarm, the steady and accurate result of evaluation was obtained based on data packet. The experimental results show that the proposed method can improve the accuracy of evaluation results.

Reference | Related Articles | Metrics
Improved network security situational assessment method based on FAHP
LI Fangwei YANG Shaocheng ZHU Jiang
Journal of Computer Applications    2014, 34 (9): 2622-2626.   DOI: 10.11772/j.issn.1001-9081.2014.09.2622
Abstract226)      PDF (894KB)(508)       Save

To minimize damage from network security problem, an improved network security situation assessment model based on Fuzzy Analytic Hierarchy Process (FAHP) was proposed. First, a set of index system in conformity with actual environment which consists of index layer, criterion layer and decision layer was established in consideration of the large-scale network environment in the future. Aiming at the influence on evaluation by data distribution uncertainty and fuzziness in situation assessment, the proposed model used Fuzzy C-Means (FCM) clustering algorithm and the best clustering criterion for data preprocessing to get the optimal cluster number and cluster center. Finally, multi-factor secondary assessment model was established for situation assessment vector. The simulation results show that, compared with the present situation assessment method based on FAHP, the improved method takes the factors which have small weights into consideration better, so the standard deviation is smaller and evaluation results are more objective and accurate.

Reference | Related Articles | Metrics
Feature evaluation for advanced radar emitter signals based on SPA-FAHP
ZHU Bin JIN Weidong YU Zhibin ZHU Jianliang
Journal of Computer Applications    2014, 34 (6): 1834-1838.   DOI: 10.11772/j.issn.1001-9081.2014.06.1834
Abstract228)      PDF (715KB)(282)       Save

Concerning the lackness of effective means in the feature evaluation of Advanced Radar Emitter Signals (ARES), and the excessive dependence on expert experience in Analytic Hierarchy Process (AHP), a new feature evaluation model of ARES named SPA-FAHP was proposed based on Set Pair Analysis (SPA) and Fuzzy Analytic Hierarchy Process (FAHP). In order to solve the uncertainty or fuzzy judgement of the judge people when they evaluate the large-capacity data of radar emitter signals, the traditional AHP was improved through the introduction of triangular fuzzy numbers, and the index weights of ARES feature evaluation system were analyzed by FAHP. Then, the expert decision matrix of traditional AHP was made improvement and identical degree analysis through the introduction of SPA theory to solve the problem that the decisions of AHP rely on experience of experts too much. Finally, ARES features were made comprehensive evaluation through the combination of index weights matrix and identical degree matrix of the decision. The calculation results show that the model is effective and feasible. It can achieve the characteristic analysis and evaluation of ARES features more objectively.

Reference | Related Articles | Metrics
Asymmetric Information Power Game Mechanism Based on Hidden Markov
ZHU Jiang ZHANG Yuping PENG Zhenzhen
Journal of Computer Applications    2014, 34 (4): 939-944.   DOI: 10.11772/j.issn.1001-9081.2014.04.0939
Abstract464)      PDF (914KB)(382)       Save

To solve the issue that, in wireless resource competition, the environment information which gamers get in power game is asymmetric, a power game mechanism based on hidden Markov prediction was proposed. By establishing a Hidden Markov Prediction Model (HMPM), the proposed mechanism estimated whether competitors would take part in the game to improve the information accuracy of the game. Then, the predicted information was used to calculate the best transmission power via the cost function. The simulation results show that, compared with MAP (Maximum A Posteriori) method and NP (No Predicting) method, the power game model based on hidden Markov prediction can not only meet the target capacity, but also improve the power efficiency of the unauthorized users.

Reference | Related Articles | Metrics
Shopping information extraction method based on rapid construction of template
LI Ping ZHU Jianbo ZHOU Lixin LIAO Bin
Journal of Computer Applications    2014, 34 (3): 733-737.   DOI: 10.11772/j.issn.1001-9081.2014.03.0733
Abstract442)      PDF (888KB)(768)       Save

Concerning the shopping information Web page constructed by template, and the large number of Web information and complex Web structure, this paper studied how to extract the shopping information from the Web page template by not using the complex learning rule. The paper defined the Web page template and the extraction template of Web page and designed template language that was used to construct the template. This paper also gave a model of extraction based on template. The experimental results show that the recall rate of the proposed method is 12% higher than the Extraction problem Algorithm (EXALG) by testing the standard 450 Web pages; the results also show that the recall rate of this method is 7.4% higher than Visual information and Tag structure based wrapper generator (ViNTs) method and 0.2% higher than Augmenting automatic information extraction with visual perceptions (ViPER) method and the accuracy rate of this method is 5.2% higher than ViNTs method and 0.2% higher than ViPER method by testing the standard 250 Web pages. The recall rate and the accuracy rate of the extraction method based on the rapid construction template are improved a lot which makes the accuracy of the Web page analysis and the recall rate of the information in the shopping information retrieval and the shopping comparison system improve a lot .

Related Articles | Metrics
Dynamic spectrum access mechanism of multi-users based on restless multi-armed bandit model in cognitive networks
ZHU Jiang HAN Chao YANG Jielei PENG Zhuxun
Journal of Computer Applications    2014, 34 (10): 2782-2786.   DOI: 10.11772/j.issn.1001-9081.2014.10.2782
Abstract373)      PDF (722KB)(455)       Save

Based on the theory of Restless Multi-Armed Bandit (RMAB) model, a novel mechanism of dynamic spectrum access was proposed for the problem that how to coordinate multiple user access multiple idle channels. Firstly, concerning the channel sensing error of the cognitive user being existed in the practical network, the Whittle index policy which can deal with sensing error effectively was derived. In this policy, the users achieved one belief value for every channel based on the historical experience accumulation and chose the channel, which was needed to sense and access, by considering the immediate and future rewards based on the belief values. Secondly, this paper used the multi-bid auction algorithm to deal with the collision among secondary users when they selected the channels to improve the spectrum utilization. The simulation results demonstrate that, in the same environment, the cognitive users with the proposed mechanism have higher throughtput than the mechanism without dealing with sensing error or without multi-bid.

Reference | Related Articles | Metrics
Transmission and scheduling scheme based on W-learning algorithm in wireless networks
ZHU Jiang PENG Zhenzhen ZHANG Yuping
Journal of Computer Applications    2013, 33 (11): 3005-3009.  
Abstract530)      PDF (973KB)(386)       Save
To solve the problem of transmission in wireless networks, a transmission and scheduling scheme based on W-learning algorithm in wireless networks was proposed in this paper. Building the system model based on Markov Decision Progress (MDP), with the help of W-learning algorithm, the goal of using this scheme was to transmit intelligently, namely, the package loss under the premise of energy saving by choosing which one to transmit and the transmit mode legitimately was reduced. The curse of dimensionality was overcome by state aggregate method, and the number of actions was reduced by action set reduction scheme. The storage space compression ratio of successive approximation was 41%; the storage space compression ratio of W-learning algorithm was 43%. Finally, the simulation results were given to evaluate the performances of the scheme, which showed that the proposed scheme can transport data as much as possible on the basis of energy saving, the state aggregation method and the action set reduction scheme can simplify the calculation with little influence on the performance of algorithms.
Related Articles | Metrics
Linear collusion attack analysis of combined public key cryptosystem
MA Anjun LI Fangwei ZHU Jiang
Journal of Computer Applications    2013, 33 (08): 2225-2227.  
Abstract645)      PDF (456KB)(514)       Save
Concerning the linear collusion attack problem in Combined Public Key (CPK) cryptosystem, on the basis of the nature of the linear collusion attack and according to the principle of key generation, a new equation set was constructed. Through the linear transformation to the coefficient matrix of the equation set, the rank of the equations can be solved, and it is less than the number of seeds of private key seed matrix. At the same time, the analysis of the private key's structure shows that the rank of the augmented matrix is not equal to the rank of coefficient matrix. Thus both sides above prove that the attacker never get the unique solution to the private key seed matrix even if he get all the private keys. Therefore, it demonstrates that there does not exist the threat of linear collusion attack in the CPK cryptosystem.
Reference | Related Articles | Metrics
Survey of text sentiment analysis
YANG Ligong ZHU Jian TANG Shiping
Journal of Computer Applications    2013, 33 (06): 1574-1607.   DOI: 10.3724/SP.J.1087.2013.01574
Abstract1300)      PDF (987KB)(3951)       Save
This survey summarized the studies on text sentiment analysis in the view of granularity from the following five aspects: sentiment word extraction, sentiment corpus and dictionary construction, entity and opinion holders analysis,document level sentiment analysis, and text sentiment analysis applications. It pointed out that the current sentiment analysis system cannot gain high precision. Further research should focus on: widely and appropriately applying study achievement of natural language processing to text sentiment analysis; finding and choosing suitable features and algorithms in text sentiment classifications; utilizing the existing language tools and relevant resources in fast building standard language tools and resources and applying them.
Reference | Related Articles | Metrics
New adaptive dynamic channel allocation algorithm in cognitive Radio
LONG Yin YIN Heng-jing ZHU Jiang LI Fang-wei
Journal of Computer Applications    2011, 31 (11): 2915-2917.   DOI: 10.3724/SP.J.1087.2011.02915
Abstract1129)      PDF (601KB)(485)       Save
According to the characteristics of primary users’ service, this paper applied mixed Poisson distribution to primary users’ service modeling, evaluating the probability density of non-occupied duration of channel by using Expectation-Maximization (EM) algorithm to estimate the parameters of mixed Poisson distribution model and putting forward a multi-channel allocation algorithm based on channel estimation. The simulation results indicate that the proposed algorithm has excellent performance on conflict rate and throughput. Meanwhile, the proposed algorithm has lower implementation complexity for practical use.
Related Articles | Metrics
LIU Xiang-rui, ZHU Jian-yong, FAN Xiao-zhong
Journal of Computer Applications    2005, 25 (02): 430-433.   DOI: 10.3724/SP.J.1087.2005.0430
Abstract1048)      PDF (188KB)(879)       Save
The design and simulation of resource mapping algorithms in grid environment is a difficult undertaking, mainly due to resource heterogeneity, geographic distribution, autonomy and the requirements of the QoS of tasks. This paper introduced auction into resource mapping and presented a resource mapping algorithm based on multi-item auction in grid. The algorithm could satisfy the requirements of the grid environment and solve the problem of the resource mapping for a set of independent tasks. And some simulation toolkits of resource mapping were analyzed. A simulation environment is established based on the Gridsim toolkit and the simulation experiments indicate the good performance of the algorithm.
Related Articles | Metrics
An Improved Method of Situation Assessment Method Based on Hidden Markov Model
LI Fangwei ZHU Jiang
  
Accepted: 05 December 2016