Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Method of semantic entity construction and trajectory control for UAV electric power inspection
REN Na, ZHANG Nan, CUI Yan, ZHANG Rongxue, PANG Xinfu
Journal of Computer Applications    2020, 40 (10): 3095-3100.   DOI: 10.11772/j.issn.1001-9081.2020020198
Abstract398)      PDF (2216KB)(712)       Save
The reasonable control of trajectory is an important factor affecting intelligent decision-making of Unmanned Aerial Vehicle (UAV). Focusing on the local observability and the complexity of upper air of mission environment, a method of semantic entity construction and trajectory control for UAV electric power inspection was proposed. Firstly, a spatial topology network based on entity knowledge of electric power inspection field was built, and the semantic trajectory sequence network about position nodes and its semantic interfaces were generated. Then, based on the result set of similarity measure of spatial topology structures, the security licensing mechanism and reinforcement learning based trajectory control strategy were proposed to realize the UVA electric power inspection on the basis of consensus concept connotation and position structure. Experimental results show that for an example of UAV electric power inspection, the optimal strategy obtained by the proposed method can satisfy the maximum robust performance, and at the same time, the fitness of the target network can stably converge and the physical area coverage is higher than 95% through the reinforcement learning of this method, so that the method provides flight basis for the decision-making of UVA electric power inspection tasks.
Reference | Related Articles | Metrics
Image classification method based on visual saliency detection
LIU Shangwang, LI Ming, HU Jianlan, CUI Yanmeng
Journal of Computer Applications    2015, 35 (9): 2629-2635.   DOI: 10.11772/j.issn.1001-9081.2015.09.2629
Abstract869)      PDF (1208KB)(475)       Save
To solve the problem that traditional image classification methods deal with the whole image in a non-hierarchical way, an image classification method based on visual saliency detection was proposed. Firstly, the visual attention model was employed to generate the salient region. Secondly, the texture feature and time signature feature of the image were extracted by Gabor filter and pulse coupled neural network, respectively. Finally, the support vector machine was adopted to accomplish image classification according to the features of the salient region. The experimental results show that the image classification precision rates of the proposed method in SIMPLIcity and Caltech are 94.26% and 95.43%, respectively. Obviously, saliency detection and efficient image feature extraction are significant to image classification.
Reference | Related Articles | Metrics
Consensus of the second-order multi-Agent systems with random time-delays
ZONG Xin, CUI Yan
Journal of Computer Applications    2015, 35 (5): 1358-1360.   DOI: 10.11772/j.issn.1001-9081.2015.05.1358
Abstract572)      PDF (535KB)(780)       Save

This paper studied consensus problems for second-order multi-Agent systems with random time-delays. Both networks under the fixed and switching topologies were taken into consideration. The stability criteria of the time-delay dependence of multi-Agent systems was analyzed by constructing a proper Lyapunov function. And sufficient conditions for all Agents achieving the consensus were given in the forms of Liner Matrix Inequality (LMI). Finally, the simulation results show the correctness and effectiveness of the conclusions.

Reference | Related Articles | Metrics
Research and design of Agent integrity protection mechanism on remote untrusted platform
Cui YANG Cheng-xiang TAN
Journal of Computer Applications    2009, 29 (11): 3001-3004.  
Abstract1278)      PDF (747KB)(1324)       Save
Plenty of security problems may occur when servers adopt Agent to deploy mobile codes so as to realize interactive storage between different business clients. In order to pursue a higher reliability of the software, and to make sure those Agents healthily running in an untrusted complex environment, after analyzing traditional integrity validating mechanism, combining I&A, PCC and reflection techniques, a new classified mechanism of enabling the integrity of trusted terminal Agents was proposed, and an efficient validating model with multiple interacting modules was designed, aiming at improving the reliability of the mobile codes by realizing its behaviors-monitoring.
Related Articles | Metrics