Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Multi-strategy improved Aquila optimizer and its application in path planning
Suqian WU, Jianguo YAN, Bin YANG, Tao QIN, Ying LIU, Jing YANG
Journal of Computer Applications    2025, 45 (3): 937-945.   DOI: 10.11772/j.issn.1001-9081.2024020242
Abstract68)   HTML4)    PDF (1988KB)(71)       Save

Aiming at the shortcomings of the original Aquila Optimizer (AO), such as insufficient local development ability, low optimization accuracy and slow convergence speed, a Multi-Strategy Improved AO (MSIAO) for robot path planning was proposed. Firstly, the Sobol sequence was introduced to initialize the Aquila population, which was conducive to diversity of the initial population and improved the convergence speed. Secondly, the local search method was improved by using golden sine operator and idea of self-learning and social learning of particle swarm, which enhanced exploitation ability of the algorithm and reduced the possibility of falling into the local optimum. Meanwhile, a non-linear balance factor was used as switching condition of the two stages, which made better communication among the populations, and was able to balance the global exploration and local exploitation more effectively. Finally, multiple experiments were carried out. Through the simulation on 12 benchmark functions and 10 CEC2017 complex functions, it can be seen that the proposed improvement strategies enhance the global optimization ability of MSIAO greatly. Results of applying MSIAO to robot path planning show that MSIAO can obtain shorter and more reliable moving paths. In 20×20 grid map, the average path of MSIAO is shortened by 2.53%, 3.83%, and 6.70% compared to those of Particle Swarm Optimization (PSO) algorithm, the original AO, and Butterfly Optimization Algorithm (BOA), respectively; and in 40×40 grid map, the average path of MSIAO is shortened by 10.65%, 5.27%, and 14.88% compared to those of the above three algorithms, verifying that the path-finding of MSIAO is more efficient.

Table and Figures | Reference | Related Articles | Metrics
Encrypted traffic classification method based on Attention-1DCNN-CE
Haijun GENG, Yun DONG, Zhiguo HU, Haotian CHI, Jing YANG, Xia YIN
Journal of Computer Applications    2025, 45 (3): 872-882.   DOI: 10.11772/j.issn.1001-9081.2024030325
Abstract80)   HTML2)    PDF (2750KB)(905)       Save

To address the problems of low multi-classification accuracy, poor generalization, and easy privacy invasion in traditional encrypted traffic identification methods, a multi-classification deep learning model that combines Attention mechanism (Attention) with one-Dimensional Convolutional Neural Network (1DCNN) was proposed, namely Attention-1DCNN-CE. This model consists of three core components: 1) in the dataset preprocessing stage, the spatial relationship among packets in the original data stream was retained, and a cost-sensitive matrix was constructed on the basis of the sample distribution; 2) based on the preliminary extraction of encrypted traffic features, the Attention and 1DCNN models were used to mine deeply and compress the global and local features of the traffic; 3) in response to the challenge of data imbalance, by combining the cost-sensitive matrix with the Cross Entropy (CE) loss function, the sample classification accuracy of minority class was improved significantly, thereby optimizing the overall performance of the model. Experimental results show that on BOT-IOT and TON-IOT datasets, the overall identification accuracy of this model is higher than 97%. Additionally, on public datasets ISCX-VPN and USTC-TFC, this model performs excellently, and achieves performance similar to that of ET-BERT (Encrypted Traffic BERT) without the need for pre-training. Compared to Payload Encoding Representation from Transformer (PERT) on ISCX-VPN dataset, this model improves the F1 score in application type detection by 29.9 percentage points. The above validates the effectiveness of this model, so that this model provides a solution for encrypted traffic identification and malicious traffic detection.

Table and Figures | Reference | Related Articles | Metrics
Robotic grasp detection in low-light environment by incorporating visual feature enhancement mechanism
Gan LI, Mingdi NIU, Lu CHEN, Jing YANG, Tao YAN, Bin CHEN
Journal of Computer Applications    2023, 43 (8): 2564-2571.   DOI: 10.11772/j.issn.1001-9081.2023050586
Abstract381)   HTML37)    PDF (2821KB)(962)       Save

Existing robotic grasping operations are usually performed under well-illuminated conditions with clear object details and high regional contrast. At the same time, for low-light conditions caused by night and occlusion, where the objects’ visual features are weak, the detection accuracies of existing robotic grasp detection models decrease dramatically. In order to improve the representation ability of sparse and weak grasp features in low-light scenarios, a grasp detection model incorporating visual feature enhancement mechanism was proposed to use the visual enhancement sub-task to impose feature enhancement constraints on grasp detection. In grasp detection module, the U-Net like encoder-decoder structure was adopted to achieve efficient feature fusion. In low-light enhancement module, the texture and color information was respectively extracted from local and global level, thereby balancing the object details and visual effect in feature enhancement. In addition, two low-light grasp datasets called low-light Cornell dataset and low-light Jacquard dataset were constructed as new benchmark dataset of low-light grasp and used to conduct the comparative experiments. Experimental results show that the accuracies of the proposed low-light grasp detection model are 95.5% and 87.4% on the benchmark datasets respectively, which are 11.1, 1.2 percentage points higher on low-light Cornell dataset and 5.5, 5.0 percentage points higher on low-light Jacquard dataset than those of the existing grasp detection models, including Generative Grasping Convolutional Neural Network (GG-CNN), and Generative Residual Convolutional Neural Network (GR-ConvNet), indicating that the proposed model has good grasp detection performance.

Table and Figures | Reference | Related Articles | Metrics
Cross-corpus speech emotion recognition based on decision boundary optimized domain adaptation
Yang WANG, Hongliang FU, Huawei TAO, Jing YANG, Yue XIE, Li ZHAO
Journal of Computer Applications    2023, 43 (2): 374-379.   DOI: 10.11772/j.issn.1001-9081.2021122043
Abstract405)   HTML18)    PDF (3084KB)(214)       Save

Domain adaptation algorithms are widely used for cross-corpus speech emotion recognition. However, many domain adaptation algorithms lose the discrimination of target domain samples while pursuing the minimization of domain discrepancy, resulting in their presence at the decision boundary of the model in a high-density form, which degrades the performance of the model. Based on the above problem, a Decision Boundary Optimized Domain Adaptation (DBODA) method based cross-corpus speech emotion recognition was proposed. Firstly, the features were processed by using convolutional neural networks. Then, the features were fed into the Maximum Nuclear-norm and Mean Discrepancy (MNMD) module to maximize the nuclear norm of the sentiment prediction probability matrix of the target domain while reducing the inter-domain discrepancy, thereby enhancing the discrimination of the target domain samples and optimize the decision boundary. In six sets of cross-corpus experiments set up on the basis of Berlin, eNTERFACE and CASIA speech databases, the average recognition accuracy of the proposed method is 1.68 to 11.01 percentage points ahead of those of the other algorithms, indicating that the proposed model effectively reduces the sample density around the decision boundary and improves the prediction accuracy.

Table and Figures | Reference | Related Articles | Metrics
Several novel intelligent optimization algorithms for solving constrained engineering problems and their prospects
Mengjian ZHANG, Deguang WANG, Min WANG, Jing YANG
Journal of Computer Applications    2022, 42 (2): 534-541.   DOI: 10.11772/j.issn.1001-9081.2021020265
Abstract572)   HTML32)    PDF (849KB)(316)       Save

To study the performance and application prospects of novel intelligent optimization algorithms, six bionic intelligent optimization algorithms proposed in the past few years were analyzed, concluding Harris Hawks Optimization (HHO) algorithm, Equilibrium Optimizer (EO), Marine Predators Algorithm (MPA), Political Optimizer (PO), Slime Mould Algorithm (SMA), and Heap-Based Optimizer (HBO). Their performance and applications in different constrained engineering optimization problems were compared and analyzed. Firstly, the basic principles of six optimization algorithms were introduced. Secondly, the optimization tests were performed on ten standard benchmark functions for six optimization algorithms. Thirdly, six optimization algorithms were applied to solve three engineering optimization problems with constraints. Experimental results show that the convergence accuracy of PO is the best for the optimization of unimodal and multimodal test functions and can reach the theoretical optimal value zero many times. The EO and MPA are better for solving constrained engineering problems with fast optimization speed, high stability and standard deviation of a small order of magnitude. Finally, the improvement methods and development potentials of six optimization algorithms were analyzed.

Table and Figures | Reference | Related Articles | Metrics
Image super-resolution restoration algorithm based on information distillation network with dual attention mechanism
Suyu WANG, Jing YANG, Yue LI
Journal of Computer Applications    2022, 42 (1): 239-244.   DOI: 10.11772/j.issn.1001-9081.2021010134
Abstract536)   HTML13)    PDF (632KB)(148)       Save

Aiming at the problems of network training difficulty and low utilization rate of feature information caused by increasing network layers in super-resolution restoration technology, an image super-resolution restoration algorithm based on dual attention Information Distillation Network (IDN) was designed and implemented. Firstly, by taking the advantage of the low computational complexity of IDN and the advantage of the information distillation module by which more features were extracted, the weights of the features were readjust adaptively by introducing the Residual Attention Module (RAM) and considering the interdependence of image channels, so as to further improve the reconstruction ability of high-resolution details of images. Then, a new mixed loss function sensitive to edge information was designed to refine the image and accelerate the convergence of the network. Test results on Set5, Set14, BSD100 and Urban100 public datasets show that the visual effect and Peak Signal-to-Noise Ratio (PSNR) of the proposed method are superior to those of the current mainstream algorithms.

Table and Figures | Reference | Related Articles | Metrics
Teaching resources recommendation system for K12 education
ZHANG Haidong NI Wancheng ZHAO Meijing YANG Yiping
Journal of Computer Applications    2014, 34 (11): 3353-3356.   DOI: 10.11772/j.issn.1001-9081.2014.11.3353
Abstract415)      PDF (767KB)(739)       Save

In data layer, the course model and resource model were built based on Markov chain and vector space model, and the teacher model was built based on teachers' personal registration information and nodes of course model. In off-line layer, the content features of course model and resource model were extracted via Term Frequency-Inverse Document Frequency (TF-IDF) algorithm, and the course model and resource model of data layer were initialized and optimized. Then relations between any two resources or recourse and course were calculated using association rules mining and similarity measure, and intermediate recommendation results were given using teacher model and course model. A weighted hybrid recommendation algorithm was proposed to generate recommendation list in on-line layer. The proposed system has been successfully applied in a real education resources sharing platform which consists of 600 thousand teaching resources.

Reference | Related Articles | Metrics
New method of pattern-matching for network intrusion detection
FAN Ai-jing YANG Zhao-feng
Journal of Computer Applications    2011, 31 (11): 2961-2964.   DOI: 10.3724/SP.J.1087.2011.02961
Abstract1498)      PDF (740KB)(441)       Save
New generations of Network Intrusion Detection Systems (NIDS) create the need for advanced pattern-matching engines. This paper presented a new scheme for pattern-matching, which adopted a hardware-based programmable state machine technology to achieve deterministic processing rates. A lot of patterns can be obtained in one input stream by Balanced Routing Table-based FSM (B-FSM), and transition rules can be mapped effectively. Experiments had been done with Snort used widely in network intrusion detection systems. The experimental results show that the method is effective in storage, fast in operation, and renewable dynamically. The method proposed in this paper can satisfy the requirement of NIDS.
Related Articles | Metrics