Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Design of optimization algorithm for selfish misbehavior in medium access control protocol of mobile Ad Hoc network
GAO Shijuan, WANG Xijun, ZHU Qingchao
Journal of Computer Applications    2019, 39 (6): 1786-1791.   DOI: 10.11772/j.issn.1001-9081.2018102152
Abstract266)      PDF (829KB)(206)       Save
To address the problems like static nature, unfairness and complexity in Selfish Misbehavior (SM) processing mechanism of Medium Access Control (MAC) protocol of Mobile Ad Hoc NETwork (MANET), an optimization algorithm for SM was proposed. By using optimization theory and feedback theory, the Optimal Access Probability (OAP) was conducted through the utilization of historical samples, realizing the dynamic change of parameters to improve static nature. Then, all nodes in the network were set to use the OAP at the given period, thus the fairness index of the network was promoted. Finally, linear iteration mechanism was adopted to avoid the increase of complexity. On basis of the above, stability and effectiveness of the proposed algorithm were proved theoretically by Lyapunov algorithm and global stable point. Experimental results show that, by the proposed algorithm, the number of SM decreases by 30%-50%, the end-to-end delay brings down 8-10 ms, the throughput increases about 0.5 Mb/s, the fairness index raises by 0.05, while the control overhead remains unchanged, all of which indicates that the performance of the SM processing mechanism has been improved.
Reference | Related Articles | Metrics
Cognitive medium access control protocol optimization design for distributed multi-hop network using single transceiver
GAO Shijuan, TAN Tongde, ZHU Qingchao
Journal of Computer Applications    2018, 38 (9): 2616-2620.   DOI: 10.11772/j.issn.1001-9081.2018030676
Abstract434)      PDF (910KB)(219)       Save
A novel optimized model of distributed multi-hop Cognitive Medium Access Control (C-MAC) protocol with a single transceiver was proposed to handle two restrictions in MAC protocol of Mobile Ad Hoc NETwork (MANET). One is the restriction of multiple transceivers and payload imbalance in different channels, and the other one is the restriction of multi-hop and control overhead. Firstly, channel sensing and data transmission of the new C-MAC protocol were realized in ATIM (Announcement Traffic Indication Message) window and DATA window respectively based on Power Saving Mode (PSM), which made them separated in time domain. Secondly, power value was nonuniform quantized and Gray encoded to decrease float overhead caused by node mobility. Then, a distributed cooperation mechanism was raised for multi-hop networking, based on which channel switching rule was redefined to guarantee that channels would be used fairly and balanced. Last, metrics as Channel Vacate Time (CVT), Channel Opening Time (COT), throughput and channel payload time were considered by simulation. Results show that, the novel protocol could execute independently without several transceivers, the difference values of CVT, COT and payload time among different channels reduce by 13 ms, 20 ms and 100 s respectively, and corresponding throughput rises about 1.5%, all of which realize the optimization of protocol performance in transceiver restriction, payload balance, throughput and overhead control.
Reference | Related Articles | Metrics
Throughput analysis of multi-hop network and design of real-time estimation on neighbor nodes
ZHU Qingchao
Journal of Computer Applications    2017, 37 (9): 2484-2490.   DOI: 10.11772/j.issn.1001-9081.2017.09.2484
Abstract530)      PDF (911KB)(370)       Save
Aiming at the problems of single hop and static nature in theoretical analysis of Media Access Control (MAC) protocol, a multi-hop analysis model for Mobile Ad Hoc NETwork (MANET) was proposed, and a real-time estimation algorithm for neighbor node was designed. Firstly, a common multi-hop throughput analysis model was established through definition of distance parameter, which equaled to the Ratio of Euclidean distance and Real statistical distance (ERR), based on 2-D discrete time Markov Chain (DTMC) model, with nodes distributed in a Poisson Network (PN). Secondly, one of the reasons resulting in deviation between theory and simulation, dynamic nature of neighbor nodes, was analyzed qualitatively, that was, ERR didn't take mobility into consideration. Thirdly, a real-time number estimation methodology of neighbor nodes in PN with Random Walk (RW) mobility model was presented based on Kalman filter algorithm through redefinition of state update rule as well as measurement rule. Finally, the performance of the multi-hop throughput analysis model was compared and analyzed. The experimental results show that, although the delay of 0.13 s is introduced, the accuracy is improved by 8% in terms of throughput, Therefore, both extension of multi-hop communication and consideration of mobility are realized in the model.
Reference | Related Articles | Metrics
Deep natural language description method for video based on multi-feature fusion
LIANG Rui, ZHU Qingxin, LIAO Shujiao, NIU Xinzheng
Journal of Computer Applications    2017, 37 (4): 1179-1184.   DOI: 10.11772/j.issn.1001-9081.2017.04.1179
Abstract520)      PDF (999KB)(564)       Save
Concerning the low accuracy of automatically labelling or describing videos by computers, a deep natural language description method for video based on multi-feature fusion was proposed. The spatial features, motion features and video features of video frame sequence were extracted and fused to train a Long-Short Term Memory (LSTM) based natural language description model. Several natural language description models were trained through the combination of different features from early fusion, then did a late fusion when testing. One of the models was selected to predict possible outputs under current inputs, and the probabilities of these outputs were recomputed with other models, then a weighted sum of these outputs was computed and the output with the highest probability was used as the next output. The feature fusion methods of the proposed method include early fusion such as feature concatenating, weighted summing of different features after alignment, and late fusion such as weighted fusion of outputs' probabilities of different models based on different features, finetuning generated LSTM model by early fused features. Comparison experimental results on Microsoft Video Description (MSVD) dataset indicate that the fusion of different kinds of features can promote the evaluation score, while the fusion of the same kind of features cannot get higher evaluation score than that of the best feature; however, finetuning pre-trained model with other features has poor effect. Among different combination of different features tested, the description generated by the method of combining early fusion and later fusion gets 0.302 of METEOR, which is 1.34% higher than the highest score that can be found, it means that the method is able to improve the accuracy of video automatic description.
Reference | Related Articles | Metrics
Throughput analysis and optimization of MAC protocol with multiple rates in mobile Ad Hoc network
ZHU Qingchao, CHEN Jing, GONG Shuiqing
Journal of Computer Applications    2016, 36 (10): 2664-2669.   DOI: 10.11772/j.issn.1001-9081.2016.10.2664
Abstract385)      PDF (818KB)(398)       Save
Concerning the low throughput and fairness of multi-rate Medium Access Control (MAC) protocol in Mobile Ad Hoc Network (MANET), saturation throughput expressions of nodes with different rates were deduced, and the key factor to restrict performance of MAC protocol was quantitatively analyzed, which is unfairness of channel occupancy time between Slow rate Nodes (SN) and Fast rate Nodes (FN). Secondly, focusing on maximizing time fairness among different rates of nodes, two optimal methods of Contention Window (CW) and packet size were presented without affecting the throughput of SN but maximizing the throughput of FN, which makes the saturation throughput of MANET optimal. Experimental results show that, to maximize Jain fairness index when packet rates of two types of nodes are set to 1 Mb/s and 11 Mb/s, optimal values of CW in simulation and analysis are 320 and 350, respectively; similarly, values of packet size are 64 B and 60 B. Moreover, although saturation throughput value of SN basically remains unchanged, the total throughput of analysis is still 0.2-0.5 Mb/s higher than that of simulation. Therefore, throughput and fairness are both improved.
Reference | Related Articles | Metrics
Automatic matching method for aviation oblique images based on homography transformation
ZHAO Xia, ZHU Qing, XIAO Xiongwu, LI Deren, GUO Bingxuan, ZHANG Peng, HU Han, DING Yulin
Journal of Computer Applications    2015, 35 (6): 1720-1725.   DOI: 10.11772/j.issn.1001-9081.2015.06.1720
Abstract536)      PDF (1010KB)(436)       Save

In order to reduce the high computing complexity of Affine Scale Invariant Feature Transform (ASIFT) algorithm, a robust and rapid matching method for large angle aviation oblique images based on homography transformation was proposed, which was named H-SIFT. Firstly, the homography matrix between the two oblique images was calculated by making full use of the rough Exterior Orientation (EO) elements of the images, then a homography transformation was made to the left image to get its rectified image for eliminating geometric distortion, scale and rotation. Secondly, the matches between the rectified image and the right image were got by using Scale Invariant Feature Transform (SIFT) algorithm. During the matching process, the coarse matches were got by using two matching constraints, Nearest Neighbor Distance Ratio (NNDR) and consistency checking, then the false matches in them were eliminated by using the RANdom SAmple Consensus (RANSAC) algorithm. Finally, as the matching points on the rectified image were got, the corresponding matching points on the left image were calculated by using the homography matrix. The experiments on three pairs of typical oblique images obtained by Si Wei Digital Camera 5 (SWDC-5) demonstrate that the matching points obtained by the proposed algorithm are significantly improved in the computation efficiency, quantity and distribution than ASIFT algorithm, as the proposed algorithm not only takes just about 0.93%, 0.88%, 0.97% time of ASIFT algorithm, but also gets the correct matching points about 2.18, 1.31, 1.70 times of ASIFT algorithm.

Reference | Related Articles | Metrics
Design of medium access control protocol tradeoff between throughput and fairness in MANET
ZHU Qingchao, CHEN Jing, GONG Shuiqing, SHI Ting
Journal of Computer Applications    2015, 35 (11): 3275-3279.   DOI: 10.11772/j.issn.1001-9081.2015.11.3275
Abstract499)      PDF (928KB)(417)       Save
Since Mobile Ad Hoc NETwork (MANET) has imbalance of high throughput but low fairness, a novel Medium Access Control (MAC) protocol named MAC-FT was proposed. Firstly, two expressions were deduced and focus on relationship of optimal throughput and nodes' number, and relationship of idle slot probability and nodes' number. On the basis of this, idle slot probability model was developed, whose feasibility and stability were proved based on Lyapunov drift. Secondly, idle slot probability computation was implemented through Auto-Regressive and Moving Average (ARMA) model filter scheme and its dynamics was controlled by Proportional Integral Controller (PIC) model. Finally, performance of MAC-FT was analyzed synthetically. Results show that, fairness index and throughput reached to 0.98 and 6.15 Mb/s respectively, which were similar to optimal value 1 and 5.85 Mb/s. Therefore, performance of MAC-FT is better than Asymptotically Optimal Backoff (AOB), Idle Sense (IS), Distribution Coordination Function (DCF), and Gentle DCF (GDCF), and it improves balance of throughput and fairness.
Reference | Related Articles | Metrics
PROFIBUS-based reading method of smart meter's data
CAO Shiwei ZHU Qing LIU Hongli
Journal of Computer Applications    2013, 33 (05): 1248-1254.   DOI: 10.3724/SP.J.1087.2013.01248
Abstract765)      PDF (577KB)(711)       Save
Communication of most smart meters is based on MODBUS protocol or 645 protocol, which is insufficient for the transmission of large amounts of data from smart meter. A new reading method and its system based on PROFIBUS were proposed. The system included PROFIBUS based master (Programmable Logic Controller, PLC) and slave stations connected by ROFIBUS bus, and the master station consisted of the Network Interface Card (NIC) of Siemens PLC/CP5611, STEP 7 programming software and WINCC monitoring software; the slave station was a smart meter which contained a PROFIBUS module wired with the Micro Control Unit (MCU) in the smart meter. This PROFIBUS-based reading method and its system of smart meter's data is easy to implement, fast in data transmission, and with communication rate of up to 12Mb/s.
Reference | Related Articles | Metrics
Implementation of soft start on design of body control system
ZHANG Xiaoliang ZHU Qing WANG Yaonan CAO Shiwei
Journal of Computer Applications    2013, 33 (04): 1187-1190.   DOI: 10.3724/SP.J.1087.2013.01187
Abstract688)      PDF (613KB)(630)       Save
To solve the instantaneous overcurrent of the large power inductive load, a body control system based on soft start was established. The abundant peripherals of Micro Control Unit (MCU) and the scalability of Field Programmable Gate Array (FPGA) were fully utilized to implement the rapid sampling of the multiplex switching signals and the output control of the Pulse Width Modulation (PWM) signals. In the software, the program was designed by the modular, which completed the task and met the need of the car. At last, the test shows the Electromagnetic Interference (EMI) on the vehicle is reduced, soft start of the large inductive equipment is realized, and the instantaneous overcurrent of the load is reduced by 40%, so the body control system can be applied with the unmanned vehicle's control
Reference | Related Articles | Metrics
Graphics performance optimization method for Wine based on client software rendering
HUANG Conghui CHEN Jing ZHU Qingchao GUO Weiwu
Journal of Computer Applications    2013, 33 (04): 1146-1148.   DOI: 10.3724/SP.J.1087.2013.01146
Abstract871)      PDF (486KB)(503)       Save
To deal with the performance bottleneck of operating the Device Independent Bitmap (DIB) in Wine, a method of client software rendering was brought forward. This method firstly analyzed GDI API for operating DIB, and then confirmed the load point of client software rendering, subsequently designed a list for linking different device context and their corresponding GDI API, at last realized the client software rendering of GDI API. The performance test shows that compared with the Wine without optimization, the average graphic performance of the Wine with the optimization of client software rendering enhances at least 10 times when it operates DIB, and is close to the performance of the local Windows XP, which effectively avoids the performance bottleneck of operating DIB.
Reference | Related Articles | Metrics
Energybalanced adaptive clustering algorithm for wireless sensor network
LV Tao ZHU Qing-xin ZHU Yu-yu
Journal of Computer Applications    2012, 32 (11): 3107-3111.   DOI: 10.3724/SP.J.1087.2012.03107
Abstract1222)      PDF (782KB)(512)       Save
This paper presented an EnergyBalanced Adaptive Clustering Algorithm (EBACA) for Wireless Sensor Network (WSN) based on LEACH and HEED, in which a node, according to its status, independently made its decision to compete for acting as a cluster head. The cluster head selection criteria took account of both random probability and node residual energy, and introduced the combination of the node energy prediction and energy threshold. In order to balance energy consumption of each node, EBACA adjusted time slice to modify working frequency of each node. Furthermore, EBACA used the multihop manner for intercluster data transmission in order to save total energy consumption. A specialized cluster head node was responsible for collecting the data from other cluster head nodes, and then transmitted the aggregated data to the base station. Its objective was to balance the energy consumption and maximize the network lifetime. The analysis and simulation results show that EBACA provides more uniform energy consumption among nodes and can prolong network lifetime compared to LEACH and HEED.
Reference | Related Articles | Metrics
Study on usability of privacy control functions in domestic social networking service
SHEN Hong-zhou ZONG Qian-jin YUAN Qin-jian ZHU Qing-hua
Journal of Computer Applications    2012, 32 (03): 690-693.   DOI: 10.3724/SP.J.1087.2012.00690
Abstract1455)      PDF (739KB)(855)       Save
Concerning the privacy disclosure in Social Networking Service (SNS), the usability of the privacy control in domestic SNS was studied. From the users' point of view, with the method of experiment and interview, usability testing and comparative analysis on the privacy control in Renren and Pengyou were handled. The result indicates that the privacy control in Pengyou is better than that in Renren, but there is no significant difference between the two sites. Both of them need some improvements. Renren needs to improve its centralized navigation of privacy control and the centralized privacy setting interface. Pengyou should improve its decentralized navigation of privacy control and the blacklist function.
Reference | Related Articles | Metrics
Image restoration with radial basis function network based on fuzzy adjustment
XING Gui-hua, ZHU Qing-bao
Journal of Computer Applications    2005, 25 (06): 1321-1323.   DOI: 10.3724/SP.J.1087.2005.1321
Abstract1290)      PDF (154KB)(1021)       Save
To overcome the difficulties of creating mathematics model in traditional image restoration, a image restoration algorithm based on a RBF neural network was given. The algorithm could restore similarly degenerated image by learning the reverse process of a degenerated process by using no-linear map and adaptability of RBF network. The method of determining RBF network central parameters was improved by fuzzy adjustment at first and then the image restoration algorithm was designed. The simulation shows that the improved RBF network can restore the typically degenerated image satisfactorily.
Related Articles | Metrics
Blind digital watermarking algorithm in wavelet domain based on correlation theory
BIAN Xing-bin, ZHU Qing-xin
Journal of Computer Applications    2005, 25 (06): 1279-1281.   DOI: 10.3724/SP.J.1087.2005.1279
Abstract1244)      PDF (203KB)(900)       Save
A new blind digital watermarking algorithm was proposed. In embedding process, an unit module was used to represent a pixel, in detecting process correlation value of the unit module and watermarked image wavelet coefficients was calculated and was processed with proper threshold to detect the embedded watermark. The detecting process doesnt need original image and position information, so the scheme realizes blind detecting and self-synchronization. Sharpening the watermarked image with Laplacian before detecting could make the watermarking scheme more robust to attacks and get better detecting result. Furthermore, adding sharpening step could lower the demand of embedding strength without affect the detecting result. Thus it improved watermark invisibility. Experiments show that the algorithm has good invisibility and robustness.
Related Articles | Metrics
Modularization design method for Web pages based on virtual description model
XIONG Qian, ZHU Zheng-Yu, ZHU Qing-sheng
Journal of Computer Applications    2005, 25 (02): 301-304.   DOI: 10.3724/SP.J.1087.2005.0301
Abstract713)      PDF (198KB)(946)       Save

Refer to the idea of Modularization program design method, this paper presented a new idea of Modularization design method for the Web pages base on its virtual description model. The combination of the new model and the modularization method greatly changeed the way to organize and storage Web information. The new technique bring us many advantages on the design of Web page such as the easy reuse of a module, the quick recombination of a Web page, the easy update for the content of a Web page, the easy expanding of a Web page, etc.

Related Articles | Metrics