Most Down Articles

    Published in last 1 year| In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    Published in last 1 year
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Named Entity Recognition in Electronic Medical Record Based on BERT
    ZHENG Li-rui, XIAO Xiao-xia, ZOU Bei-ji, LIU Bin, ZHOU Zhan
    Computer and Modernization    2024, 0 (01): 87-91.   DOI: 10.3969/j.issn.1006-2475.2024.01.014
    Abstract57)      PDF(pc) (992KB)(145)       Save
    Abstract:Electronic medical record is an important resource for the preservation, management and transmission of patients’medical records. It is also an important text record for doctors’ diagnosis and treatment of diseases. Through the electronic medical record named entity recognition (NER) technology, diagnosis and treatment information such as symptoms, diseases and drug names can be extracted from the electronic medical record efficiently and intelligently. It is helpful for structured electronic medical records to use machine learning and other technologies for diagnosis and treatment regularity mining. In order to efficiently identify named entities in electronic medical records, a named entity recognition method based on BERT and bidirectional long short-term memory network (BILSTM) with fusion adversarial training (FGM) is proposed, referred to as BERT-BILSTM-CRF-FGM (BBCF). After preprocessing by correcting the Chinese electronic medical record corpus provided by the 2017 National Knowledge Graph and Semantic Computing Conference (CCKS2017), the BERT-BILSTM-CRF-FGM model is used to recognize five types of entities in the corpus, with an average F1 score of 92.84%. Compared to the BERT model based on the inflated convolutional neural network (BERT-IDCNN-CRF) and the conditional random field model based on BILSTM (BILSTM-CRF), the proposed method has higher F1 score and faster convergence speed, which can more efficiently structure electronic medical record text.
    Reference | Related Articles | Metrics | Comments0
    A Fast Registration Method for Massive Point Clouds Based on 3D-SIFT and 4PCS
    LI Jia-le1, LI Zhe-run1, ZHAO Yong2, ZHANG Yang1
    Computer and Modernization    2024, 0 (02): 1-6.   DOI: 10.3969/j.issn.1006-2475.2024.02.001
    Abstract119)      PDF(pc) (1952KB)(137)       Save
    Abstract: The registration of measurement point cloud and model point cloud is the key of visual positioning. Aiming at the problems of poor visual positioning accuracy and low algorithm efficiency caused by large amount of measurement point cloud data and low overlap rate with CAD model point cloud, a registration method of measurement point cloud and model point cloud based on the fusion of 3D scale invariant feature transform (3D-SIFT) and four point fast robust matching algorithm (4PCS) is proposed. Firstly, the depth camera is used to extract the point cloud of the part, and the extracted measurement point cloud is denoised and filtered; Then 3D-SIFT feature point extraction algorithm is used to extract feature points from measurement point cloud and CAD model point cloud; Finally, the extracted feature points are used as the initial values of the 4PCS algorithm to achieve the registration of the two point cloud data. Compared with the commonly used 4PCS algorithm and Super-4PCS algorithm, the algorithm simulation and experimental results show that the proposed algorithm can improve the registration speed by more than 30% on the premise of ensuring the registration accuracy.
    Reference | Related Articles | Metrics | Comments0
    Visual Servo Based on Model-free Adaptive Control
    PENG Zong-yu, HUANG Kai-qi, SU Jian-hua, WANG Li-li
    Computer and Modernization    2024, 0 (01): 29-34.   DOI: 10.3969/j.issn.1006-2475.2024.01.005
    Abstract55)      PDF(pc) (1958KB)(121)       Save
    Abstract: The traditional robot visual servo control technology requires accurate dynamics and kinematics models of known robots and the calibration of camera. However, due to the errors in the robot modeling and camera calibration, it is difficult to accurately build the error model, which affects the positioning accuracy and convergence speed of the robot vision servo system. To solve this problem, this paper proposes a robot vision servo technology based on Model-free Adaptive Control (MFAC). Using the input and output data of the system, this paper realizes adaptive visual servo control. Namely by the Jacobian matrix in the MFAC online estimation robot servo controller and combining with sliding mode controller, this paper achieves the precise tracking task to targets. The results of simulation experiments show that the proposed method can ensure the smooth convergence of the servo controller under the unknown disturbance caused by the change of system parameters and reduce the system positioning error.
    Reference | Related Articles | Metrics | Comments0
    Overview of Data Processing Techniques for MIoT Based on Fog Computing
    HAN Kun, WANG Zheng, DUAN Jun-yong, YANG Hua-lin
    Computer and Modernization    2024, 0 (01): 13-20.   DOI: 10.3969/j.issn.1006-2475.2024.01.003
    Abstract43)      PDF(pc) (1208KB)(120)       Save
    Abstract:Manufacturing Internet of Things (MIoT) is a kind of technology that combines manufacturing production system with Internet connection. Data processing plays a crucial role in MIoT. With the continuous expansion of manufacturing scale, traditional cloud computing has gradually failed to meet the needs of data processing, while the development of fog computing can effectively reduce decision delay and improve system efficiency. This paper summarizes the MIoT data processing technology based on fog computing. Firstly, the generation and characteristics of MIoT data are introduced, as well as the challenges to be faced in the data processing process. Secondly, the MIoT data processing architecture based on fog computation is introduced. Then, the key techniques of data processing in fog computation are introduced. Finally, it introduces the challenges to be faced in the deployment of the architecture and the future direction of fog computing in MIoT.
    Reference | Related Articles | Metrics | Comments0
    Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology
    WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling
    Computer and Modernization    2024, 0 (01): 1-5.   DOI: 10.3969/j.issn.1006-2475.2024.01.001
    Abstract78)      PDF(pc) (1156KB)(112)       Save
    Abstract: To improve the resource utilization rate of cloud network data centers and save communication costs, a cloud network security service chain automatic orchestration method is designed based on SRv6 (Segment Route IPv6) technology. The method assists and guides network data packets to pass through the cloud network along the specified path, determines the specific forwarding path of the message, and reduces dependence on service nodes; establishes an objective function to minimize the total bandwidth, combines with various constraints to meet the security requirements of automatic orchestration; defines local behavior message, constructs automatic arrangement framework of security service chain, establishes security service policy, solves policy conflict and flow network scheduling problem, and achieves security arrangement of service chain. Experimental results show that the proposed method can effectively implement the automatic scheduling of cloud service chain, reduce the average total bandwidth consumption of CPU, improve the success rate of user requests, reduce the load of edge device in the cloud, and save communication costs.
    Reference | Related Articles | Metrics | Comments0
    Improved Algorithm for Keypoints Detection of Hip Based on U-Net
    CHEN Zhen1, YAO Jing-hui2, SU Cheng-yue1
    Computer and Modernization    2024, 0 (02): 15-19.   DOI: 10.3969/j.issn.1006-2475.2024.02.003
    Abstract37)      PDF(pc) (1367KB)(108)       Save
    Abstract: The diagnosis of developmental dysplasia of the hip (DDH) using pelvic X-ray requires accurate mapping of hip key points, and deep learning methods can be used as reliable auxiliary tools. In order to solve the problem of diversified shooting posture and shooting distance for pelvic radiographs, this paper proposed RKD-UNet based on U-Net to detect keypoints of the hip. The model used residual blocks to improve U-Net’s convolution layers and skip-connection paths, as well as introduced the coordinate attention module into the encoder to enhance feature extraction ability for the keypoints neighborhood. Convolution layers and ASPP module were used on top of the encoder to form a Bridge block to fuse feature information at different scales and enhance the receptive field of the model with an atrous rate of [3, 6, 9]. The model was trained and tested using radiographic data containing types of pelvic orthostasis, frog, full-length lower extremity, and postoperative pelvis. RKD-UNet achieves an average keypoints detection error of 3.19 ± 2.19 px and an average acetabular angle measurement error of 2.83°± 2.59°. The F1 score for the normal, mild, moderate, and severe dislocation cases were 89.6, 77.1, 57.9, and 94.1, respectively, which were higher than the doctors’ diagnostic results. Experiments have shown that RKD-UNet can accurately detect keypoints of the hip and assist doctors in diagnosing DDH.
    Reference | Related Articles | Metrics | Comments0
    Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation
    HU Chong-jia, LIU Jin-zhou, FANG Li
    Computer and Modernization    2024, 0 (01): 74-79.   DOI: 10.3969/j.issn.1006-2475.2024.01.012
    Abstract49)      PDF(pc) (2419KB)(98)       Save

    Abstract: An unsupervised domain adaptation for LiDAR semantic segmentation method is proposed to deal with the problem of excessive data required for semantic segmentation network training in outdoor large-scale scenes. The method uses a modified RandLA-Net for semantic segmentation using a small number of point clouds from the SPTLS3D’s real world data as target objects. The model finishes the pre-training of the segmentation network on SensatUrban, and completes the transfer task by minimizing the domain gap between the source and target domains. The RandLA-Net losses the global features of the original point cloud in the encoding process, so an additional method of obtaining global information to join the network decoding is proposed. In addition, for getting the differentiated information, the weights of the local attention module of RandLA-Net is changed to use the difference between the features of each point and the average features of its neighbors. The experiments show that the mean intersection over union  of the network are 54.3% on SemanticKITTI and 71.91% on Semantic3D. The mIoU of the pre-trained network after fine-tuning are 80.05%, which is 8.83  percentage points better than training directly.

    Reference | Related Articles | Metrics | Comments0
    Feature-level Multimodal Fusion for Depression Recognition
    GU Ming-xuan, FAN Bing-bing
    Computer and Modernization    2023, 0 (10): 17-22.   DOI: 10.3969/j.issn.1006-2475.2023.10.003
    Abstract236)      PDF(pc) (1213KB)(96)       Save
    Abstract: Depression is a common psychiatric disorder. However, the existing diagnostic methods for depression mainly rely on scales and interviews with psychiatrists, which are highly subjective. In recent years, researchers have devoted themselves to identifying depressed patients by EEG features or audio features, but no study has effectively combined EEG information with audio information, ignoring the correlation between audio and EEG data. Therefore, this study proposes a feature-level multimodal fusion model to improve the accuracy of depression recognition. We combine the audio and EEG modality information based on a fully connected neural network. Our experiments show that the accuracy of depression recognition using feature-level multimodal fusion model on the MODMA dataset reaches 81.58%, which is higher than that of using single-modality. The results indicate that the feature-level multimodal fusion model can improve the accuracy of depression recognition compared to single-modality. Our research provides a new perspective and method for depression recognition.

    Reference | Related Articles | Metrics | Comments0
    Review of Research on Human Behavior Detection Methods Based on Deep Learning
    SHEN Jia-wei, LU Yi-ming, CHEN Xiao-yi, QIAN Mei-ling, LU Wei-zhong,
    Computer and Modernization    2023, 0 (09): 1-9.   DOI: 10.3969/j.issn.1006-2475.2023.09.001
    Abstract390)      PDF(pc) (2112KB)(89)       Save
    Human behavior recognition has always been a hot topic of research in the field of computer vision and video understanding and is widely used in other areas such as intelligent video surveillance and human-computer interaction in smart homes. While traditional human behavior detection algorithms have the disadvantages of relying on too many data samples and being susceptible to environmental noise, evolving deep learning techniques are gradually showing their advantages and can be a good solution to these problems. Based on this, this paper firstly introduces some commonly used behavioral recognition datasets and analyses the current research status of human behavioral recognition based on deep learning, then describes the basic process of behavioral recognition and commonly used behavioral recognition methods, finally summarizes the performance, existing problems of various existing behavioral recognition methods, and outlooks the future development directions.
    Reference | Related Articles | Metrics | Comments0
    An Autonomous Navigation Method for Intelligent Vehicles in Urban Battlefield
    LI Peng, XU Luo
    Computer and Modernization    2024, 0 (01): 92-98.   DOI: 10.3969/j.issn.1006-2475.2024.01.015
    Abstract24)      PDF(pc) (2793KB)(85)       Save
    Abstract: The urban battlefield is the main position of conventional warfare and daily security, and excellent urban battlefield penetration capabilities can help our fighters better and faster complete reconnaissance, strike, rescue and other tasks. However, the complex street environment in the city, and the possibility of interception by enemy targets, make the urban battlefield environment complex and changeable, greatly increasing the difficulty of completing the mission. Traditional path planning methods rely on accurate static maps and rule constraints, and lack flexibility and adaptability. Therefore, this paper proposes an autonomous navigation method for intelligent vehicles in urban battlefield, and designs discrete action spaces and reward functions based on task completion. Firstly, this paper takes the urban battlefield penetration task as an example to design the state space and action space, and selects a suitable deep reinforcement learning algorithm. Then, based on Gazebo simulation platform and ROS, the algorithm flow framework and experimental scheme are designed. The experimental results show that the intelligent car using this method in the urban battlefield environment can effectively pass through obstacles and avoid enemy units to reach the designated place, which improves the success rate of penetration.
    Reference | Related Articles | Metrics | Comments0
    Review of Infrared Small Target Detection
    HU Rui-jie, CHE Dou
    Computer and Modernization    2023, 0 (08): 79-86.   DOI: 10.3969/j.issn.1006-2475.2023.08.013
    Abstract217)      PDF(pc) (5630KB)(84)       Save
    bstract: This article aims to review three infrared small target detection methods based on traditional feature extraction, local comparison, and widely used deep learning today. Then, by comparing the cutting-edge applications of these three methods, their advantages and disadvantages in target detection performance, robustness, and real-time performance are analyzed. We find that feature extraction based methods exhibit good real-time and robustness in simple scenarios, but may have limitations under complex conditions. The method based on local comparison is relatively robust to changes in object size and shape, but sensitive to background interference. The method based on deep learning performs well in object detection performance, but requires large-scale data and larger computing resources. Therefore, in practical applications, the advantages and disadvantages of these methods should be comprehensively considered based on specific scenario requirements, and appropriate methods should be applied to infrared small target detection.
    Related Articles | Metrics | Comments0
    Multi-view Knowledge-aware Recommender System
    WANG Xiao-xia, MENG Jia-na, JIANG Feng, DING Zi-qing
    Computer and Modernization    2024, 0 (02): 100-107.   DOI: 10.3969/j.issn.1006-2475.2024.02.016
    Abstract19)      PDF(pc) (2064KB)(83)       Save
    Abstract: At present, most of the recommendation methods based on knowledge graph use single user or item representation, which has the problems of user interest interference, incomplete use of information and sparse data. This paper proposes a multi-view knowledge-aware recommendation model (MVKA). Firstly, the model captures the user’s interest representation in the user-item graph fusion attention mechanism. Introduce the project-entity diagram, the graph attention network is used for feature extraction to obtain the embedded representation of the item. Then, a comparative learning method of graph perspective is constructed between the two views. Finally, summation and concatenation operations are carried out to get the final representation of the user and the project, and the matching score of the user to the project is predicted by the inner product. In order to verify the accuracy and computational efficiency of the experiment, a large number of experiments were carried out on the three public datasets of MovieLens-1M, Book-crossing and Last FM, and compared with other traditional methods and graph neural network models, the AUC and F1 value evaluation indicators were significantly improved, indicating that the MVKA model can significantly use various information relationship data to improve the knowledge perception recommendation task.
    Reference | Related Articles | Metrics | Comments0
    Improved YOLOv7 Algorithm for Low-resolution Ship Object Detection in Complex Backgrounds#br#
    YAN Zi-xian, DONG Bao-liang, TANG Si-mi
    Computer and Modernization    2023, 0 (11): 120-126.   DOI: 10.3969/j.issn.1006-2475.2023.11.019
    Abstract144)      PDF(pc) (3631KB)(82)       Save
    Abstract: In response to the problems of low resolution target detection and interference from complex backgrounds in ship image target detection, an improved YOLOv7 algorithm is proposed for identifying ship targets. The algorithm is mainly improved in three aspects: using K-means++ algorithm for anchor box clustering in the ship target dataset to obtain anchor box information that is more suitable for ship detection tasks; improving the loss function by using EIOU loss instead of CIOU loss and using Focal loss combined with ɑ-Balanced instead of standard cross-entropy loss; improving the network structure by adding the SPD-Conv module to enhance the detection effect for low-resolution targets. Experimental results show that compared with the original YOLOv7 algorithm, the improved algorithm has an accuracy improvement of 4.22 percentage points, a recall rate improvement of 2.68 percentage points, a mAP@0.5 improvement of 4.3 percentage points, and a detection speed improvement of 2 frames/s. The algorithm achieves good detection results for ship targets.
    Reference | Related Articles | Metrics | Comments0
    Scenes Text Modification Network for Uyghur Based on Generative Adversarial Network
    FU Hong-lin, ZHANG Tai-hong, YANG Ya-ting, Aizimaiti Aiwanier, MA Bo
    Computer and Modernization    2024, 0 (01): 41-46.   DOI: 10.3969/j.issn.1006-2475.2024.01.007
    Abstract43)      PDF(pc) (2063KB)(80)       Save
    Abstract: Through the study of scene text detection and recognition in Uyghur languages, it is found that manual acquisition of labeled natural scene text images is time-consuming and labor-intensive. Therefore, artificially synthesized data is used as the main source of training data. To obtain more realistic data,  a scenes text modification network for Uyghur based on generative adversarial network is proposed. The efficient Transformer module is used to construct the network for fully extracting the global and local features of the image to complete the modification of the Uyghur, and a fine-tuning module is added to fine-tune the final results. The model is trained with WGAN thought strategy, which can effectively cope with the problems of pattern collapse as well as gradient explosion. The generalization ability and robustness of the model are verified by text modification experiments in English-English and English-Virginia. Good results are achieved in both objective metrics (SSIM, PSNR) and visual effects, and are validated on real scene datasets SVT and ICDAR 2013.
    Reference | Related Articles | Metrics | Comments0
    CP-YOLOX-based Algorithm for Protein Target Detection in Cryo-electron Micrographs
    OU Jia-cheng, ZENG An, JIN Liang
    Computer and Modernization    2023, 0 (11): 113-119.   DOI: 10.3969/j.issn.1006-2475.2023.11.018
    Abstract52)      PDF(pc) (2886KB)(77)       Save
    Abstract: A cryo-electron micrograph target detection algorithm (Cryo-Protein YOLOX, CP-YOLOX) is proposed for the existing cryo-electron micrograph protein target detection algorithm with inadequate feature fusion and complex network model, missed detection and false detection. The algorithm mainly contains feature extraction module, feature fusion module, and output side. The feature extraction module applies the B-ResBlockX module proposed in this paper, which uses grouped filters to generate multiple feature channels to improve the feature fusion capability and capture more detailed features. The feature fusion module applies the FastHead module proposed in this paper, which uses multilevel dilated convolution module for feature fusion and simplifies the output to a single channel, which can have a more lightweight network structure without losing accuracy. In order to further improve the accuracy and convergence speed, the position loss function is added with the Euclidean distance constraint between the target frame and the prediction frame. Experimental results on public datasets EMPIAR-10028, EMPIAR-10081, and EMPIAR-10089 showed that the number of network parameters of the proposed algorithm was only 5.19×106, and the mAP(0.5) was improved by 2.4, 3.3 and 2.5 percentage points, respectively, compared with YOLOX.
    Reference | Related Articles | Metrics | Comments0
    Aspect Based Sentiment Analysis Model Based on Knowledge Enhancement
    LI Shi-yue, MENG Jia-na, YU Yu-hai, LI Xue-ying, XU Ying-ao
    Computer and Modernization    2023, 0 (10): 1-8.   DOI: 10.3969/j.issn.1006-2475.2023.10.001
    Abstract225)      PDF(pc) (2224KB)(77)       Save
    Aspect based sentiment analysis can accurately determine the emotional polarity of aspect words in sentences, and plays an important role in social networking, e-commerce and other fields. Most of the existing methods model the relationship between context and target words through sequence representation or attention mechanism, but ignore the background knowledge of text and the conceptual links between aspect words, resulting in insufficient semantic relationships learned. To solve the above problems, the Aspect Based Sentiment Analysis Model Based on Knowledge Enhancement (ABSA-KE) is proposed. First, the features are extracted and the corresponding word vector is obtained through the pre-training model BERT, and the dependency tree corresponding to the text is obtained using the parser. Then, the joint modeling of BiLSTM and graph attention network is used to learn the node embedded representation and obtain the text vector. Second, the external knowledge base is used to introduce the aspect word knowledge vector in different contexts to enhance the aspect level emotion analysis model, and finally the emotion classification task is carried out. Compared with the existing models, the experimental results show that the proposed model is effective and reasonable in aspect level emotion analysis tasks.
    Reference | Related Articles | Metrics | Comments0
    Incremental News Recommendation Method Based on Self-supervised Learning and Data Replay
    LIN Wei
    Computer and Modernization    2023, 0 (12): 1-6.   DOI: 10.3969/j.issn.1006-2475.2023.12.001
    Abstract101)      PDF(pc) (1490KB)(73)       Save
    Abstract: Personalized news recommendation technology is important to alleviate information overload and improve user experience. News recommendation models are usually iteratively trained based on fixed data sets. However, in real scenarios, news recommendation models need to constantly learn to adapt to new users and news. Therefore, incremental learning has been proposed to help models perform incremental updates. The main challenge of the incremental learning of news recommendation models is the catastrophic forgetting problem, where a trained model forgets the user preferences it has previously learned. In view of this, this paper proposes SSL-DR, an incremental learning method of news recommendation models based on self-supervised learning and data replay. SSL-DR firstly adds the self-supervised learning task to the news recommendation task to obtain the user's stable preference, which effectively reduces the problem of catastrophic forgetting. To consolidate the learned knowledge, SSL-DR further implements a sampling strategy based on the user's click probability scores for candidate news to achieve data replay and transfer the learned knowledge through a knowledge distillation strategy. The experimental results show that, our method can effectively improve the overall recommendation performance of the news recommendation model in the process of incremental training, and significantly alleviate the problem of catastrophic forgetting.
    Reference | Related Articles | Metrics | Comments0
    Behavior Recognition Method Based on FMCW Radar and ResNeSt-GRU
    MA Ze-yu, YE Ning, XU Kang, WANG Su, WANG Ru-chuan,
    Computer and Modernization    2023, 0 (11): 101-107.   DOI: 10.3969/j.issn.1006-2475.2023.11.016
    Abstract68)      PDF(pc) (2574KB)(73)       Save
    Abstract: Aiming at the application of frequency modulated continuous wave radar in behavior recognition, a human behavior recognition system based on split attention residual neural network (ResNeSt) and gated neural unit (GRU) is proposed. The frequency modulated continuous wave (FMCW) radar is used to collect human behavior data. The fast Fourier transform algorithm (FFT) is used to extract the distance, velocity and angle dimension information of each frame of radar data, and then stitch them according to the time dimension into Range-Time Map (RTM), Doppler-Time Map (DTM) and Angle-Time Map (ATM). Finally, RTM, DTM and ATM are used as input samples, and the three-stream ResNeSt-GRU model is used to recognize different human behaviors. The experimental results show that the average recognition accuracy of the three-stream ResNeSt-GRU model for 8 behaviors reaches 98.92%, which is higher than the traditional deep learning model and the fusion deep learning model. In addition, the recognition accuracy rate using this model is 2.3% higher than that using a single-stream network after traditional feature fusion. Therefore, the system can effectively improve the recognition accuracy of the human behavior recognition system, and provide a new technology for the human behavior recognition.
    Reference | Related Articles | Metrics | Comments0
    Joint Extraction Method of Entities and Relations Based on FGM and Pointer Annotation
    LIU Yu-peng, GE Yan, DU Jun-wei, CHEN Zhuo
    Computer and Modernization    2023, 0 (11): 1-5.   DOI: 10.3969/j.issn.1006-2475.2023.11.001
    Abstract197)      PDF(pc) (1192KB)(72)       Save
    Abstract: Joint extraction of entities and relations is an important task of information extraction. The traditional entity relationship joint extraction method cannot solve the problem of overlapping triples well, because it models the relationship between entities as discrete types. In order to solve the problem that it is difficult to extract overlapping triples, this paper proposes a BERT-FGM model for entity relationship joint extraction, which combines FGM and pointer annotation. In this model, the relationship between entities is modeled as a function, and the robustness of the model is improved by incorporating FGM into the process of BERT training word vector. The model firstly extracts the subjects through the pointer annotation strategy, then fuses the subjects into a sentence vector as a new vector, and finally uses it to extract objects under a predefined relationship condition. Experiments are carried out on public dataset WebNLG, the experimental result shows that the F1 value of the model is 90.7%, it can effectively solve the problem of relationship triples overlapping.
    Reference | Related Articles | Metrics | Comments0
    Computational Offloading Strategy Based on Multi-objective Optimization in D2D Network
    CHEN Qi, LI Jing-jing
    Computer and Modernization    2024, 0 (01): 21-28.   DOI: 10.3969/j.issn.1006-2475.2024.01.004
    Abstract39)      PDF(pc) (1409KB)(72)       Save
    Abstract: Focused on the high latency and energy consumption for computational offload in mobile edge computing scenarios with device-to-device (D2D) communication technology, a computational offloading strategy based on multi-objective optimization is proposed. The strategy is based on a computing offloading model with multi-objective optimization of delay and energy consumption, introduces the analysis of excessive offloading problem, improves the NSGA-II algorithm, including genetic encoding strategy, crossover and variation methods applicable to computing offloading, and minimizes task execution time and energy consumption by solving the Pareto optimum. In addition, a data routing algorithm is proposed, which balances the transmission energy consumption of routing devices and optimizes the routing paths. Through simulation experiments, the average boosting efficiency of the algorithm is up to 41.7% and the task retransmission rate is reduced to 7.8%. The experiment results show that the proposed algorithm can significantly reduce the execution delay, energy consumption, task retransmission rate and improve the task offload success rate.
    Reference | Related Articles | Metrics | Comments0
    View Frustum Culling Algorithm for Scene Based on Optimized Octree
    LI Ying-ying, HUANG Wen-pei
    Computer and Modernization    2024, 0 (01): 103-108.   DOI: 10.3969/j.issn.1006-2475.2024.01.017
    Abstract29)      PDF(pc) (1038KB)(72)       Save
    Abstract:Large-volume 3D models are prone to low rendering frame rate, slow display and large resource consumption on the browser side. The reason is that such models usually contain hundreds of millions of triangular slices, which cannot be loaded and rendered quickly in a limited time. To address such problems, a scene view frustum culling algorithm based on an optimized octree is proposed. The algorithm adopts address code (Morton code), node view distance criterion and on-demand incremental division technique, which makes the octree adaptive with good compression efficiency; it adopts double bounding volume and base intersection test techniques to improve the accuracy of view frustum culling and achieves the overall goal of improving rendering frame rate and smooth display. The high-speed train example model study shows that the proposed algorithm improves the average rendering frame rate by about 14 frames and the spatial compression rate by about 37.8 percentage points compared with the traditional octree view frustum culling algorithm.
    Reference | Related Articles | Metrics | Comments0
    ZigBee Indoor Location Algorithm Based on Dynamic Modification of RSSI Parameters
    LI Shi-bao, CONG Yu-jie
    Computer and Modernization    2024, 0 (01): 35-40.   DOI: 10.3969/j.issn.1006-2475.2024.01.006
    Abstract40)      PDF(pc) (2045KB)(71)       Save
    Abstract: ZigBee indoor positioning technology has developed rapidly in recent years, but the traditional algorithm using fixed path loss model has poor adaptability to the environment, resulting in large positioning errors and affecting positioning accuracy. This paper proposes an indoor location algorithm based on ZigBee platform with dynamic correction of logarithmic path loss model parameters. First, the RSSI value obtained is filtered and optimized by Gaussian filtering, and then the parameters of the logarithmic path loss model are dynamically modified according to the distance between anchor nodes and the RSSI value, including the path loss factor and the signal strength value from the node to be measured, so the specific logarithmic path loss model in the current environment is obtained; Then the Kalman filter is used to modify the existing positioning parameters twice, which can correct the positioning deviation caused by the environment change caused by the time change in the above algorithm. Experimental results show that the positioning performance of this algorithm is 46.8% higher than that of the fixed path loss model based on ZigBee, which can improve the positioning error caused by environmental changes.
    Reference | Related Articles | Metrics | Comments0
    Application Research of Implicit Feedback Recommendation Based on E-commerceUser Behavior
    ZHU Hong-qi, WANG Cheng
    Computer and Modernization    2023, 0 (11): 44-50.   DOI: 10.3969/j.issn.1006-2475.2023.11.007
    Abstract70)      PDF(pc) (911KB)(71)       Save
    Abstract: The Bayesian Personalized Ranking algorithm is one of the most representative algorithms for implicit feedback problems, but both the assumption of independence between users and the assumption of individuals’ pairwise preferences for two items proposed in the BPR algorithm are too restrictive. The GBPR algorithm redefines the individual preferences of users, using group preferences formed by like-minded users instead of individual preferences to relax the assumption of independence among users. The DPR algorithm takes the partial order pair as the basic unit to optimize the difference between preferences rather than the difference of preferences to relax the assumption of an individual’s pairwise preference for two items. Based on the above research, this paper proposes an e-GDPR algorithm to further enhance the user’s ability to predict preferences for items. The algorithm can make full use of user information (such as gender, consumption level) and commodity information (such as category) in the data set, introduce group preference into the DPR algorithm, divide users into groups according to consumption level and gender, randomly sample to form more representative user groups, and no longer use random sampling directly when sampling.Instead, a triad sample consisting of two randomly selected commodities belonging to the same category is considered to be more reliable than a triad sample consisting of randomly selected commodities. Then the implicit feedback preference quantification model is introduced to calculate the user’s personal preference, which can fully consider the user’s preference behind various implicit operation types. Finally, a recommendation experiment is carried out on the Jingdong e-commerce data set, and the experimental results show that the e-GDPR algorithm can achieve better recommendation results compared with the baseline algorithm.

    Reference | Related Articles | Metrics | Comments0
    Lightweight Facial Expression Recognition Method Based on Sandglass Structure and Attention Mechanism
    LUO Ming-jie, FENG Kai-ping
    Computer and Modernization    2023, 0 (11): 89-94.   DOI: 10.3969/j.issn.1006-2475.2023.11.014
    Abstract64)      PDF(pc) (1621KB)(71)       Save
    Abstract: Facial expression detection and classification is a challenging task in the field of human-computer interaction. In order to solve the problems of large parameters and low classification accuracy in current facial expression recognition models, a lightweight facial expression recognition method based on sandglass structure and attention mechanism is proposed. First, the improved sandglass structure is used to build a lightweight backbone feature extraction network. Then a novel feature fusion attention module is designed. Focus pooled features are fused to extract key details, and lightweight ECA attention mechanism is embedded to strengthen key expression features to improve the feature expression ability of the model. Finally, various training strategies such as Random Erasing and Dropout are adopted to alleviate the over fitting phenomenon of lightweight networks, so as to improve the generalization performance of the model. Testing experiments were conducted on two classical expression datasets FER2013 and CK+, and the recognition rates reached 71.72% and 95.96% respectively, while the number of parameters is only about 1×106.
    Reference | Related Articles | Metrics | Comments0
    QoE-driven High-availability Transmission Framework for SDN
    CHEN Chen, ZHUANG Yi, GAO Zeng
    Computer and Modernization    2023, 0 (11): 62-68.   DOI: 10.3969/j.issn.1006-2475.2023.11.010
    Abstract63)      PDF(pc) (1769KB)(71)       Save
    Abstract: For the problem of low availability and high cost of path switching for single-path transmission in complex environments, this paper proposes a QoE-driven and SDN-assisted MPTCP path switching scheme for high-availability transmission services. Firstly, a path planning model with path disjoint is constructed based on the mesoscopic centrality of data plane nodes in SDN architecture. Secondly, a two-stage strategy is used to perform bandwidth compensation and path switching separately, the transfer of subflows on the transmission blocked path is accelerated to achieve path switching with lower throughput. Finally, Levy flight is introduced into the model update of AOA to prevent the algorithm from converging prematurely and enhance the ability to jump out of the local optimum, thus ensuring that the algorithm is optimal when optimizing the subflow path weights. Experimental results show that the method proposed in this paper has the advantages of smaller fluctuation range of throughput, lower delay and less jitter when performing sub-stream path switching. In addition, the improved AOA algorithm can obtain higher convergence efficiency when calculating the optimal weight vector.

    Reference | Related Articles | Metrics | Comments0
    Image Classification of COVID-19 Based on Contrast Learning MocoV2
    XU Yue-wen1, LI Ming1, LI Li2
    Computer and Modernization    2024, 0 (02): 81-87.   DOI: 10.3969/j.issn.1006-2475.2024.02.013
    Abstract21)      PDF(pc) (3940KB)(70)       Save
    Abstract: Pneumonia is a common multi-infectious disease that predisposes the elderly and those with weakened immune systems to infection, and early detection can help with later treatment. Factors such as the location, density and clarity of lung lesions can affect the accuracy of pneumonia image classification. With the development of deep learning, convolutional neural network is widely used in medical image classification tasks, however, the learning ability of the network depends on the number of training samples and labels. Aiming at the classification of pneumonia images in computed tomography (CT), a network model based on self-supervised comparative learning (MCLSE) is proposed, which can learn features from unmarked data and improve the accuracy of the network model. Firsly, auxiliary tasks were designed to mine representations from unmarked images to complete pre-training, improving the ability of the model to learn data mapping relationships in vector space. Secondly, the convolutional neural network is used to extract features. In order to effectively capture higher level feature information, the compression excitation network is selected to improve the classification model and the correlation between the feature channels is modeled. Finally, the trained weights are loaded into the improved classification model, and the network is trained again with marked data in the downstream task. Experiments were carried out on open data sets, SARS-CoV-2 CT and CT Scan for COVID-19 Classification. The results show that the accuracy of the MCLSE model in this paper for the overall sample classification reached 99.19% and 99.75%, respectively, which was greatly improved compared with the mainstream model.
    Reference | Related Articles | Metrics | Comments0
    Nested Named Entity Recognition Based on Semantic Segmentation
    CUI Shao-guo, HU Guang-ping
    Computer and Modernization    2024, 0 (02): 69-74.   DOI: 10.3969/j.issn.1006-2475.2024.02.011
    Abstract25)      PDF(pc) (1307KB)(70)       Save
    Abstract: Named entity recognition aims to extract entities from an unstructured text, and a nested structure often exists between entities. However, most of the previous studies only focused on the recognition of flat named entities while ignoring nested entities. Therefore, a nested named entity recognition method based on semantic segmentation is proposed, which describes the task of nested named entity recognition as a semantic segmentation task. First, we calculate the element similarity, cosine similarity and bilinear similarity between words and words. Then, the 3 similarity features are spliced as an image which will be input into the semantic segmentation model to obtain the relationship matrix between words and words. Finally, we extract nested entity from the relationship matrix. The experimental results show that the proposed method can effectively recognize nested entities, and the F1 value on the public nested named entity recognition dataset GENIA reaches 80.0%, which is superior to most existing nested entity recognition methods.
    Reference | Related Articles | Metrics | Comments0
    Lightweight YOLOv4-based Target Detection Method for Remote Sensing Images of#br# Airport Fields
    YANG Ke, DONG Bing, WU Yue, HAO Kuan-gong, PENG Zi-chen
    Computer and Modernization    2024, 0 (02): 93-99.   DOI: 10.3969/j.issn.1006-2475.2024.02.015
    Abstract23)      PDF(pc) (4815KB)(68)       Save
    Abstract: Aiming at the problems that existing remote sensing image target detection methods suffer from the loss of local feature information in deep CNNs and low detection accuracy of complex scenes, a target detection method based on lightweight YOLOv4 is proposed. Firstly, the lightweight neural network Ghostnet is used to replace the cspdarknet53 network used as the backbone feature extraction in YOLOv4. Secondly, to improve the complex environment detection capability, CycleGAN is used to simulate night scenes, and again, the transformer module is fused to make the model easy to capture inter-feature relationships and local information of the network. Finally, Adam optimiser and K-means++ screening anchor frame are used to accelerate the convergence speed, and the example is validated with RSOD aerial remote sensing dataset. The experimental results show that the MAP value is improved by 6.65 percentage points and the number of parameters is reduced by 84.7% compared with the original YOLOv4, i.e. the algorithm in this paper can meet the real-time target detection of aircraft on the airport field in complex scenes.
    Reference | Related Articles | Metrics | Comments0
    Collaborative Device-based Large-scale Offloading: A Bi-level Optimization Algorithm Fusing Divide-and-conquer and Greedy
    YAN Yang, ZHAN Zi-jun, CAO Shao-hua
    Computer and Modernization    2023, 0 (11): 13-21.   DOI: 10.3969/j.issn.1006-2475.2023.11.003
    Abstract74)      PDF(pc) (2607KB)(68)       Save
    Abstract: With the rapid development of communication technology, the number of mobile devices is constantly increasing, which will also lead to frequent large-scale offloading scenarios. However, solving large-scale offloading problems in polynomial time remains a challenge. In this paper, we propose a bi-level optimization algorithm based on the cooperative computing network architecture, called DCGreedy, which fuses divide-and-conquer and greedy. This algorithm can efficiently solve the offloading strategy and resource allocation scheme of all tasks in polynomial time. It can effectively reduce the total energy consumption of the system while meeting all constraints. We evaluate the performance of DCGreedy based on the total number of tasks meeting deadlines, total system energy consumption, and algorithm runtime in a simulation scenario of at least 400 mobile devices. We conducted extensive experimental comparisons between DCGreedy and four other benchmark algorithms and found that in different scale offloading scenarios, the average total energy consumption of DCGreedy was 2.11% higher than the second ranked algorithm, while the algorithm’s running time was only 0.0049%. This fully confirms that DCGreedy effectively reduces the algorithm’s running time while optimizing system energy consumption.
    Reference | Related Articles | Metrics | Comments0
    A Remote Sensing Image Change Detection Model Based on CNN-Transformer Hybrid Structure
    XU Ye-tong, GENG Xin-zhe, ZHAO Wei-qiang, ZHANG Yue, NING Hai-long, LEI Tao
    Computer and Modernization    2023, 0 (07): 79-85.   DOI: 10.3969/j.issn.1006-2475.2023.07.014
    Abstract352)      PDF(pc) (2633KB)(68)       Save
    The emergence of convolutional neural network and Transformer model has made continuous progress in remote sensing image change detection technology, but at present, these two methods still have shortcomings. On the one hand, the convolutional neural network cannot model the global information of remote sensing images due to its local perception of convolution kernel. On the other hand, although Transformer can capture the global information of remote sensing images, it cannot model the details of image changes well, and its computational complexity increases quadrally with the resolution of images. In order to solve the above problems and obtain more robust change detection results, this paper proposes a CNN-Transformer Change Detection Network (CTCD-Net) based on convolutional neural network and Transformer hybrid structure. Firstly, CTCD-Net uses convolutional neural network and Transformer based on encoding and decoding structure in series to effectively encode local and global features of remote sensing images, so as to improve the feature learning ability of the network. Secondly, the cross-channel Transformer self-attention module (CSA) and attention feedforward network (A-FFN) are proposed to effectively reduce the computational complexity of Transformer. Full experiments on LEVIR-CD and CDD datasets show that the detection accuracy of CTCD-Net is significantly better than that of other mainstream methods.
    Related Articles | Metrics | Comments0
    Survey of Supply Chain Oriented Consensus Algorithms
    CHAI Li, WANG Xiao, GONG Jia-hao, WANG Yang, JI Shun-hui, ZHANG Peng-cheng
    Computer and Modernization    2023, 0 (11): 22-27.   DOI: 10.3969/j.issn.1006-2475.2023.11.004
    Abstract118)      PDF(pc) (993KB)(67)       Save
    Abstract: As one of the core technologies in the blockchain, consensus algorithm is an important method for the system to maintain data consistency and security. This paper firstly investigates and analyzes the relevant research on the universal consensus algorithms in the alliance chain, classifies algorithms from the perspective of whether they are based on the Byzantine problem, and combs and summarizes consensus algorithms from four aspects: problem entry, principle description, performance analysis and application scenarios. In addition, focusing on the application scenarios related to the supply chain, this paper analyzes the challenges it brings to the consensus algorithm in the alliance chain, and sorts out and summarizes the consensus algorithms in the alliance chain under this scenario. Finally, the paper discusses the challenges faced by the consensus algorithm and the direction for future development, with an intention of providing references for researchers in this field.
    Reference | Related Articles | Metrics | Comments0
    Apple Defect Detection Algorithm Based on NAM-YOLO Network
    ZHANG Jia-Qi, XU Qi-lei
    Computer and Modernization    2023, 0 (10): 53-58.   DOI: 10.3969/j.issn.1006-2475.2023.10.008
    Abstract113)      PDF(pc) (4281KB)(67)       Save
    Aiming at the problems of apple defect detection, such as frequent false detection, leakage detection and easy confusion of defects, we propose an apple defect detection algorithm based on improved YOLOv5. Apple defect detection is very important for apple sorting. The existing methods of apple defect detection mainly extract color and texture features through machine learning or convolutional neural network, but there are problems such as error detection, missing detection and insufficient feature extraction ability. It can not meet the requirements of accuracy and real-time defect detection. NAM-YOLO algorithm mainly has three core ideas: 1) By adding TRANS module to the backbone network, features and global information can be better integrated; 2) The weighted bidirectional feature pyramid network is used to fuse features of different scales; 3) The NAM attention mechanism based on normalization is introduced into the neck network to strengthen the key features of the target region and improve the detection accuracy of the network. Experimental results show that the mAP of the improved algorithm reaches 98.90% and the accuracy is 98.73%. Compared with other models, this model has better feature fusion ability and can better meet the actual needs of apple sorting.
    Reference | Related Articles | Metrics | Comments0
    Analyzing to Shield Tunnel Segments Deformation Data Based on ICEEMDAN-LSTM
    FENG Xin-xin, BU Lei, ZHANG Xiao-yu, SHI Yu-feng
    Computer and Modernization    2023, 0 (11): 57-61.   DOI: 10.3969/j.issn.1006-2475.2023.11.009
    Abstract56)      PDF(pc) (3338KB)(67)       Save
    Abstract:Measures of subway tunnel safety monitoring and monitoring data analysis and prediction are important means to ensure the safety of subway tunnel. Due to the influence of construction environment, there are noise in the monitoring data inevitably. Taking the automatic deformation monitoring data of shield subway tunnel segments as the research object, a deformation monitoring data analysis and prediction method was presented based on ICEEMDAN-LSTM. Firstly, ICEEMDAN was used to decompose the monitoring data and obtain the IMF and residual components of the monitoring data. The LSTM network model was built, and it was used to predict the IMF and residual components of the monitoring data. Finally, the predicted values of IMF and residual components were superimposed and reconstructed to obtain the predicted values of deformation. The experimental results show that ICEEMDAN-LSTM model has higher prediction accuracy than BP and LSTM model.
    Reference | Related Articles | Metrics | Comments0
    EEG Recognition of Motor Imagination Based on Efficiency Channel Attention Module
    ZHOU Cheng-cheng, ZENG Qing-jun, YANG Kang, HU Jia-ming, HAN Chun-wei
    Computer and Modernization    2023, 0 (12): 19-23.   DOI: 10.3969/j.issn.1006-2475.2023.12.004
    Abstract57)      PDF(pc) (1293KB)(67)       Save
    Abstract: The brain-computer interface technology based on motor imagination is helpful to the rehabilitation of patients with hand movement disorders, so it is widely used in the field of rehabilitation medicine. Aiming at the problem of poor classification of motor imagination-electroencephalogram (MI-EEG) due to its low signal-to-noise ratio in current motor imagination-electroencephalogram, in view of the ability of the attention module to focus on important features related to motor imagination classification tasks and ignore unimportant features, we propose a convolutional neural network based on the efficient channel attention (ECA) module for feature extraction and classification of left and right-handed MI-EEG. In order to facilitate the recognition of EEG signals by convolutional neural network (CNN), this paper uses wavelet transform to convert the timing signals of C3 and C4 channels into two-dimensional time-frequency graphs, then designs a CNN structure and parameters based on ECA. Finally, the proposed method is tested on EEG data set. The experimental results show that compared with CNN and the CNN method based on fusion convolution attention, the CNN method based on ECA can effectively improve the recognition accuracy of MI-EEG, indicating that the proposed method is effective in motor imagination EEG recognition.

    Reference | Related Articles | Metrics | Comments0
    Real-time Detection of Arbitrary Shape Scene Text Based on Segmentation
    XU Hong-kui, LI Zhen-ye, GUO Wen-tao, ZHAO Jing-zheng, GUO Xu-bin
    Computer and Modernization    2023, 0 (11): 95-100.   DOI: 10.3969/j.issn.1006-2475.2023.11.015
    Abstract123)      PDF(pc) (1710KB)(66)       Save
    Abstract:The current challenges of scene text detection technology are mainly reflected in two aspects: the trade-off between model real-time performance and accuracy, and the detection of arbitrary shape text. They determine whether scene text detection is feasible in real scenes. Aiming at the above two problems, this paper proposes a lightweight backbone network with strong feature extraction ability based on segmentation method, which can accurately detect natural scene text of arbitrary shape in real time. Specifically, a simple dual-resolution residual backbone network and a deep aggregate pyramid pooling module with low computational cost are used, and the features extracted from them are fused and segmented using a differentiable binarization module. Through the comparative experiment on the standard English dataset ICDAR2015, the result show that the improved method proposed in this paper is effective, and achieves comparable results in real-time performance and accuracy.
    Reference | Related Articles | Metrics | Comments0
    Improved DOA Based on PWLCM and Bald Eagle’s Swooping Mechanism
    OU Ji-fa, CAI Mao-guo, HONG Guang-jie, ZHAN Kai-jie
    Computer and Modernization    2024, 0 (01): 109-116.   DOI: 10.3969/j.issn.1006-2475.2024.01.018
    Abstract26)      PDF(pc) (1163KB)(66)       Save
    Abstract: Aiming at the problems of slow convergence speed and low optimization accuracy of dingo optimization algorithm (DOA), an improved dingo optimization algorithm (IDOA) based on PWLCM and the bald eagle’s swooping mechanism is proposed. Firstly, a piecewise linear chaotic map with eriodicity is used to initialize the dingo population, effectively increasing the diversity of the dingo population. Secondly, the bald eagle’s swooping mechanism is introduced into the persecution strategy to  accelerate the speed of prey capture and strengthen the ability of the algorithm to explore local areas. Finally, the spiral search factor is introduced into the scavenger strategy to enhance the local development and exploration ability of the algorithm, so as to further improve the optimization speed and accuracy of the algorithm. Simulation experiment data, ablation experiment and Wilcoxon rank sum test all show that the proposed IDOA has better optimization speed and optimization accuracy than other comparison algorithms; Compared to other improved dingo optimization algorithms, the proposed IDOA shows better overall performance.
    Reference | Related Articles | Metrics | Comments0
    A DNN Compression Method for Environmental Sound Classification on Microcontroller Unit
    MENG Na, FANG Wei-wei, LU Hong-ying
    Computer and Modernization    2024, 0 (01): 80-86.   DOI: 10.3969/j.issn.1006-2475.2024.01.013
    Abstract13)      PDF(pc) (1307KB)(65)       Save
    Abstract: Environmental Sound Classification (ESC) is known as one of the most important topics of the non-speech audio classification task. In recent years, deep neural networks (DNNs) have made a lot of progress in ESC. However, DNNs are computationally and memory-intensive, and cannot be directly deployed on IoT devices based on microcontroller units (MCU). To address this problem, this paper proposes a DNN compression method for highly resource-constrained devices. Since DNNs have a large number of parameters, which cannot be directly deployed, so this paper proposes to use the pruning method for substantial compression. Afterwards, aiming at the problem of accuracy loss caused by this operation, we design a knowledge distillation based on the feature information of multiple intermediate layers. Tests are carried out on public datasets (UrbanSound8K, ESC-50) using the STM32F746ZG device. The experimental results demonstrate that proposed method can achieve up to 97% compression rate while maintaining good inference performance and speed.
    Reference | Related Articles | Metrics | Comments0
    Anomalous Behavior Detection Network Based on Dilated Convolution and Fused Temporal#br# Features
    MA Cai-sha, JIAO Li-nan, LIU You-quan, LI Xin
    Computer and Modernization    2024, 0 (02): 75-80.   DOI: 10.3969/j.issn.1006-2475.2024.02.012
    Abstract15)      PDF(pc) (2029KB)(64)       Save
    Abstract: In this paper, we propose a multi-scale deep autoencoder network based on dilated convolution, incorporating pedestrian prototypes and spatio-temporal features. To better exploit the temporal features of pedestrians in videos, a dual-branch structure is added to the potential space of the encoder and decoder, the ST-RNN branch of the recurrent neural network for predicting spatio-temporal features and the memory storage module for preserving the normal patterns of pedestrians. To enhance pedestrian feature extraction, ignore the effect of background information,and improve the generalization ability of the model, an improved atrous spatial pyramid pooling (ASPP) module is added in the encoder, the hybrid dilated convolution (HDC) principle is used in the convolution block to solve the pedestrian size variation problem, while a multi-level residual channel attention mechanism is introduced in the decoder to obtain more contextual information. The corresponding area under the ROC curve (AUC) of this model reaches 0.982, 0.928 for USCD ped2, CUHK Avenue datasets, respectively.
    Reference | Related Articles | Metrics | Comments0
    Real-time Rendering Algorithm for Spatial Targets in Air-space 3D Simulation
    ZHANG Chun-hui, NIE Yun, WANG Guo-wei
    Computer and Modernization    2023, 0 (11): 82-88.   DOI: 10.3969/j.issn.1006-2475.2023.11.013
    Abstract55)      PDF(pc) (1894KB)(64)       Save
    Abstract: In recent years, with the deepening research of manned spaceflight, the complexity and reliability requirements of space missions have been increasing. Real-time position calculation of massive targets and scene rendering are the key and difficult points of real-time rendering of space targets. To take advantage of the hierarchical detail model (LOD) in dynamic rendering, a real-time rendering method for massive space targets is proposed, which focuses on optimizing the traditional batch LOD model into an R-tree-based LOD model. When constructing the R-tree-based LOD model, there are issues such as index space overlap, low query efficiency, and LOD model texture mutation. Therefore, a node-based depth adjustment strategy is proposed to eliminate index space overlap, a fast pruning algorithm is adopted to improve query efficiency, and the shader-based alpha testing technique is used to achieve smooth transitions between LOD models. Through the collaborative processing of these three optimization algorithms, the optimized LOD model has improved in scene rendering time, space occupancy rate, frame rate, and other aspects.
    Reference | Related Articles | Metrics | Comments0
    Prediction of Diabetes Mellitus Using LightGBM Classifier with RF-RFECV
    LIU Jing-le, LUO Xiang, GONG Cheng-rong, ZHANG Guo-peng
    Computer and Modernization    2023, 0 (11): 36-43.   DOI: 10.3969/j.issn.1006-2475.2023.11.006
    Abstract124)      PDF(pc) (2220KB)(63)       Save
    Abstract: In order to find the high-risk population of diabetes in China as early as possible and provide targeted intervention measures, the data set of China Health and Retirement Longitudinal Study (CHARLS), which represents the Chinese population, was selected as the research object, and a hybrid algorithm based on RF-RFECV and LightGBM (RF-RFECV-LightGBM) was proposed, and compared with five other algorithms through experiments. The results show that RF-RFECV- LightGBM has the best overall performance, the accuracy, precision, recall, F1 value and AUC value are 0.9772, 0.9952, 0.8178, 0.8978, and 0.9357, respectively. The prediction time is 0.0428 s, which is 0.0549 s shorter than the prediction time of LightGBM before feature selection (increased by 56.19%), indicating the effectiveness of RF-RFECV algorithm. Finally, the same prediction process was tested on the Pima Indian dataset, and the results achieved an accuracy of 0.9415, further verifying the excellent performance of the proposed algorithm RF-RFECV-LightGBM, which can assist in clinical diagnosis and treatment of diabetes.
    Reference | Related Articles | Metrics | Comments0