Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Few-shot object detection via fusing multi-scale and attention mechanism
Hongtian LI, Xinhao SHI, Weiguo PAN, Cheng XU, Bingxin XU, Jiazheng YUAN
Journal of Computer Applications    2024, 44 (5): 1437-1444.   DOI: 10.11772/j.issn.1001-9081.2023050699
Abstract292)   HTML14)    PDF (2781KB)(1230)       Save

The existing two-stage few-shot object detection methods based on fine-tuning are not sensitive to the features of new classes, which will cause misjudgment of new classes into base classes with high similarity to them, thus affecting the detection performance of the model. To address the above issue, a few-shot object detection algorithm that incorporates multi-scale and attention mechanism was proposed, namely MA-FSOD (Few-Shot Object Detection via fusing Multi-scale and Attention mechanism). Firstly, grouped convolutions and large convolution kernels were used to extract more class-discriminative features in the backbone network, and Convolutional Block Attention Module (CBAM) was added to achieve adaptive feature augmentation. Then, a modified pyramid network was used to achieve multi-scale feature fusion, which enables Region Proposal Network (RPN) to accurately find Regions of Interest (RoI) and provide more abundant high-quality positive samples from multiple scales to the classification head. Finally, the cosine classification head was used for classification in the fine-tuning stage to reduce the intra-class variance. Compared with the Few-Shot object detection via Contrastive proposal Encoding (FSCE) algorithm on PASCAL-VOC 2007/2012 dataset, the MA-FSOD algorithm improved AP50 for new classes by 5.6 percentage points; and on the more challenging MSCOCO dataset, compared with Meta-Faster-RCNN, the APs corresponding to 10-shot and 30-shot were improved by 0.1 percentage points and 1.6 percentage points, respectively. Experimental results show that MA-FSOD can more effectively alleviate the misclassification problem and achieve higher accuracy in few-shot object detection than some mainstream few-shot object detection algorithms.

Table and Figures | Reference | Related Articles | Metrics
Feature selection for imbalanced data based on neighborhood tolerance mutual information and whale optimization algorithm
Lin SUN, Jinxu HUANG, Jiucheng XU
Journal of Computer Applications    2023, 43 (6): 1842-1854.   DOI: 10.11772/j.issn.1001-9081.2022050691
Abstract283)   HTML7)    PDF (1713KB)(254)       Save

Aiming at the problems that most feature selection algorithms do not fully consider class non-uniform distribution of data, the correlation between features and the influence of different parameters on the feature selection results, a feature selection method for imbalanced data based on neighborhood tolerance mutual information and Whale Optimization Algorithm (WOA) was proposed. Firstly, for the binary and multi-class datasets in incomplete neighborhood decision system, two kinds of feature importances of imbalanced data were defined on the basis of the upper and lower boundary regions. Then, to fully reflect the decision-making ability of features and the correlation between features, the neighborhood tolerance mutual information was developed. Finally, by integrating the feature importance of imbalanced data and the neighborhood tolerance mutual information, a Feature Selection for Imbalanced Data based on Neighborhood tolerance mutual information (FSIDN) algorithm was designed, where the optimal parameters of feature selection algorithm were obtained by using WOA, and the nonlinear convergence factor and adaptive inertia weight were introduced to improve WOA and avoid WOA from falling into the local optimum. Experiments were conducted on 8 benchmark functions, the results show that the improved WOA has good optimization performance; and the experimental results of feature selection on 13 binary and 4 multi-class imbalanced datasets show that the proposed algorithm can effectively select the feature subsets with good classification effect compared with the other related algorithms.

Table and Figures | Reference | Related Articles | Metrics
Improved U-Net for seal segmentation of Republican archives
You YANG, Ruhui ZHANG, Pengcheng XU, Kang KANG, Hao ZHAI
Journal of Computer Applications    2023, 43 (3): 943-948.   DOI: 10.11772/j.issn.1001-9081.2022020218
Abstract368)   HTML10)    PDF (1722KB)(120)       Save

Achieving seal segmentation precisely, it is benefit to intelligent application of the Republican archives. Concerning the problems of serious printing invasion and excessive noise, a network for seal segmentation was proposed, namely U-Net for Seal (UNet-S). Based on the encoder-decoder framework and skip connections of U-Net, this proposed network was improved from three aspects. Firstly, multi-scale residual module was employed to replace the original convolution layer of U-Net. In this way, the problems such as network degradation and gradient explosion were avoided, while multi-scale features were extracted effectively by UNet-S. Next improvement was using Depthwise Separable Convolution (DSConv) to replace the ordinary convolution in the multi-scale residual module, thereby greatly reducing the number of network parameters. Thirdly, Binary Cross Entropy Dice Loss (BCEDiceLoss) was used and weight factors were determined by experimental results to solve the data imbalance problem of archives of the Republic of China. Experimental results show that compared with U-Net, DeepLab v2 and other networks, the Dice Similarity Coefficient (DSC), mean Intersection over Union (mIoU) and Mean Pixel Accuracy (MPA) of UNet-S have achieved the best results, which have increased by 17.38%, 32.68% and 0.6% at most, and the number of parameters have decreased by 76.64% at most. It can be seen that UNet-S has good segmentation effect in the dataset of Republican archives.

Table and Figures | Reference | Related Articles | Metrics
DDoS attack detection by random forest fused with feature selection
Jingcheng XU, Xuebin CHEN, Yanling DONG, Jia YANG
Journal of Computer Applications    2023, 43 (11): 3497-3503.   DOI: 10.11772/j.issn.1001-9081.2022111792
Abstract249)   HTML6)    PDF (1450KB)(198)       Save

Exsiting machine learning-based methods for Distributed Denial-of-Service (DDoS) attack detection continue to increase in detection difficulty and cost when facing more and more complex network traffic and constantly increased data structures. To address these issues, a random forest DDoS attack detection method that integrates feature selection was proposed. In this method, the mean impurity algorithm based on Gini coefficient was used as the feature selection algorithm to reduce the dimensionality of DDoS abnormal traffic samples, thereby reducing training cost and improving training accuracy. Meanwhile, the feature selection algorithm was embedded into the single base learner of random forest, and the feature subset search range was reduced from all features to the features corresponding to a single base learner, which improved the coupling of the two algorithms and improved the model accuracy. Experimental results show that the model trained by the random forest DDoS attack detection method that integrates feature selection has a recall increased by 21.8 percentage points and an F1-score increased by 12.0 percentage points compared to the model before improvement under the premise of limiting decision tree number and training sample size, and both of them are also better than those of the traditional random forest detection scheme.

Table and Figures | Reference | Related Articles | Metrics
Feature selection algorithm based on neighborhood rough set and monarch butterfly optimization
Lin SUN, Jing ZHAO, Jiucheng XU, Xinya WANG
Journal of Computer Applications    2022, 42 (5): 1355-1366.   DOI: 10.11772/j.issn.1001-9081.2021030497
Abstract381)   HTML9)    PDF (1375KB)(103)       Save

The classical Monarch Butterfly Optimization (MBO) algorithm cannot handle continuous data well, and the rough set model cannot sufficiently process large-scale, high-dimensional and complex data. To address these problems, a new feature selection algorithm based on Neighborhood Rough Set (NRS) and MBO was proposed. Firstly, local disturbance, group division strategy and MBO algorithm were combined, and a transmission mechanism was constructed to form a Binary MBO (BMBO) algorithm. Secondly, the mutation operator was introduced to enhance the exploration ability of this algorithm, and a BMBO based on Mutation operator (BMBOM) algorithm was proposed. Then, a fitness function was developed based on the neighborhood dependence degree in NRS, and the fitness values of the initialized feature subsets were evaluated and sorted. Finally, the BMBOM algorithm was used to search the optimal feature subset through continuous iterations, and a meta-heuristic feature selection algorithm was designed. The optimization performance of the BMBOM algorithm was evaluated on benchmark functions, and the classification performance of the proposed feature selection algorithm was evaluated on UCI datasets. Experimental results show that, the proposed BMBOM algorithm is significantly better than MBO and Particle Swarm Optimization (PSO) algorithms in terms of the optimal value, worst value, average value and standard deviation on five benchmark functions. Compared with the optimized feature selection algorithms based on rough set, the feature selection algorithms combining rough set and optimization algorithms, the feature selection algorithms combining NRS and optimization algorithms, the feature selection algorithms based on binary grey wolf optimization, the proposed feature selection algorithm performs well in the three indicators of classification accuracy, the number of selected features and fitness value on UCI datasets, and can select the optimal feature subset with few features and high classification accuracy.

Table and Figures | Reference | Related Articles | Metrics
Method for increasing S-box nonlinearity based on combination of hill climbing
QIN Guanjie, MA Jianshe, CHENG Xuemin
Journal of Computer Applications    2015, 35 (8): 2195-2198.   DOI: 10.11772/j.issn.1001-9081.2015.08.2195
Abstract561)      PDF (720KB)(443)       Save

Focusing on the issue that the 3-point and 4-point hill climbing algorithms have high calculation and low efficiency in enhancing the nonlinearity of a Substitution box (S-box), an algorithm named Combination of Hill Climbing (CHC), which could apply multiple swap elements at a time, was proposed. The algorithm defined the behavior of swapping 2 output data of an S-box as a swap element, and used weighting prioritizing function to select swap elements that have larger contribution to the enhancement of nonlinearity, then simultaneously applied multiple selected swap elements to enhance the nonlinearity of an S-box. In the experiments, a maximum of 12 output data were swapped at a time by using the CHC algorithm, and most of the random 8-input and 8-output S-boxes' nonlinearity surpassed 102, with a maximum of 106. The experimental results show that the proposed CHC algorithm not only reduces the amount of calculation, but also enhances the nonlinearity of random S-boxes more significantly in comparison with the 3-point and 4-point hill climbing algorithms.

Reference | Related Articles | Metrics
Collaborative design system of automatic weapon based on basic class module template
Li LOU Cheng XU Yong-juan WANG Fei-meng ZHANG
Journal of Computer Applications    2011, 31 (07): 1988-1991.   DOI: 10.3724/SP.J.1087.2011.01988
Abstract1139)      PDF (685KB)(834)       Save
The functional model and architecture of collaborative design system for automatic weapon were analyzed. A unified module template instance and its information access relationship model of automatic weapon were presented to achieve practical collaborative design. The proposed system includes configuration management, model-lib management, integrated service model, hierarchical collaborative design process model and cooperative behavior prediction and analysis module which assist collaborative design of modularized products. Combining the API functions development technology of CAD software and the supports of Web services technology with common language interface, the system has been implemented in reliable distributed interactive supporting environment.
Reference | Related Articles | Metrics
Hardware/software partitioning based on improved simulated annealing algorithm
Ping XIAO Cheng XU Zhi-Mang YANG
Journal of Computer Applications    2011, 31 (07): 1797-1799.   DOI: 10.3724/SP.J.1087.2011.01797
Abstract1311)      PDF (627KB)(898)       Save
Hardware/software partitioning is a key issue of embedded system design, and it has been proven to be a NP problem. Simulated annealing algorithm is a heuristic algorithm to solve this problem, but the simulated annealing algorithm has slow convergence. By improving the disturbance model and its annealing schedule, a new cost function method was proposed to accelerate the convergence speed. Compared to the classical simulated annealing algorithm and improved algorithms, the experimental results show that the new algorithm significantly reduces the running time and increases the probability of finding an approximately optimal solution.
Reference | Related Articles | Metrics
Formal analysis of IEEE 802.11i
Cheng XU
Journal of Computer Applications   
Abstract1611)      PDF (713KB)(1097)       Save
As one of the most representative theorem proving techniques used to analyze security protocols, the strand spaces theory has been successfully applied to prove a plenty of typical protocols. Based on the related document, we improved the Strand Space Model (SSM) of IEEE 802.11i protocols, and verified the security and authentication property. The result of the analysis proves the correctness of the IEEE 802.11i protocols in the present penetrator model.
Related Articles | Metrics
Automatic detection of online duplication documents and its application in enterprise data warehouse
BAI Guang-hui,LIAN Hao,LIU Yue,CHENG Xue-qi
Journal of Computer Applications    2005, 25 (07): 1713-1715.   DOI: 10.3724/SP.J.1087.2005.01713
Abstract1034)      PDF (468KB)(749)       Save

Three general methods to detect duplicate Web pages were introduced. The similarity search technique was used  to detect duplicate information automatically in enterprise data warehouse. The results indicate that the similarity search method is fit for intelligent pretreatment of enterprise intelligence data.

Reference | Related Articles | Metrics