Most Down Articles

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    In last 3 years
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Mobile Robot Path Planning Based on Fusion of Improved A* and DWA Algorithms
    PANG Yong-xu, YUAN De-cheng
    Computer and Modernization    2022, 0 (01): 103-107.  
    Abstract1300)      PDF(pc) (2046KB)(1016)       Save
    Aiming at the path planning requirements of mobile robot to achieve global optimal path in complex environment and dynamic and real-time obstacle avoidance in unknown environment, the traditional A* (A-star) algorithm is improved, and Dynamic Window Approach (DWA) is integrated to achieve dynamic and real-time obstacle avoidance. Firstly, the obstacle proportion in the grid environment is analyzed. The obstacle proportion is introduced into the traditional A* algorithm to optimize the heuristic function h(n), so as to improve the evaluation function f(n) and improve its search efficiency in different environments. Secondly, in view of the intersection between the trajectory and the vertex of obstacles optimized by the traditional A* algorithm in the complex grid environment, the selection method of child nodes is optimized, and the redundant nodes in the path are deleted to improve the smoothness of the path. Finally, Dynamic Window Approach is integrated to realize dynamic and real-time obstacle avoidance of mobile robot in complex environment. The comparative simulation experiments under MATLAB show that the improved algorithm is optimized in the path length, path smoothness and elapsed time, meets the global optimal and can realize dynamic and real-time obstacle avoidance, and has better path planning effect.
    Reference | Related Articles | Metrics | Comments0
    Multi-UAV Power Inspection Task Planning Technology Based on Deep Reinforcement Learning
    MA Rui, OUYANG Quan, WU Zhao-xiang, CONG Yu-hua, WANG Zhi-sheng
    Computer and Modernization    2022, 0 (01): 98-102.  
    Abstract347)      PDF(pc) (1806KB)(570)       Save
    UAVs have been widely used in the inspection tasks of power grid lines and electrical towers due to their advantages of flexibility, low cost and strong maneuverability. Because of the limited range of a single UAV, multiple UAVs are required to cooperate in a wide range grid inspection. However, the traditional planning methods cannot work well because of slow computing speed and unobvious collaborative effect. To remedy these deficits, a new mission planning algorithm is proposed in this work, which is based on multi-agent reinforcement learning algorithm QMIX. On the basis of the framework of intensive training and decentralized execution, this algorithm establishes RNN network for each UAV and gets the joint action value function guideline for training by mixing network. To simulate the collaboration capabilities of multi-agents, a reward function for collaboration task is designed, and it solves the problem of low collaboration efficiency in multi-UAV mission planning. The simulation results demonstrate that the proposed algorithm takes 350.4 seconds less than VDN algorithm.
    Reference | Related Articles | Metrics | Comments0
    Microblog Rumor Detection Based on Sentiment Analysis and Transformer Model
    FENG Ru-jia, ZHANG Hai-jun, PAN Wei-min
    Computer and Modernization    2021, 0 (10): 1-7.  
    Abstract729)      PDF(pc) (1087KB)(537)       Save
    Aiming at realizing the rumor detection on microblog, this paper deeply excavates the semantic information of the body content of microblog, and emphasizes the emotional tendency reflected by users in microblog comments, so as to improve the effect of rumor identification. In order to improve the rumor detection accuracy, based on XLNet word embedding method, the Transformer’s Encoder model is used to extract the semantic features of microblog body content. Combined with the BiLSTM+Attention network, the emotional feature extraction of microblog comments is realized. Two kinds of feature vectors are spliced and fused to further enrich the input features of neural network. Then, the microblog event classification results are output, and the microblog rumors detection is achieved. The experimental results show that the accuracy of the model in rumor recognition reaches 94.8%.
    Reference | Related Articles | Metrics | Comments0
    Prediction of COVID-19 Based on Mixed SEIR-ARIMA Model
    DONG Zhang-gong, SONG Bo, MENG You-xin
    Computer and Modernization    2022, 0 (02): 1-6.  
    Abstract584)      PDF(pc) (1176KB)(501)       Save
    Novel coronavirus pneumonia, referred to as COVID-19, is an acute infectious pneumonia caused by novel coronavirus, which is of highly infectious and generally susceptible to the population. Therefore, the prediction of the number of novel coronavirus pneumonia infections is not only beneficial for the country to make scientific decisions in the face of the epidemic, but also facilitates the timely integration of epidemic prevention resources. In this paper, a hybrid model SEIR-ARIMA constructed by the model SEIR based on the traditional infectious disease dynamics and the differential integrated moving average autoregressive model ARIMA is proposed to make prediction and analysis of the novel coronavirus pneumonia epidemic in different time periods and locations. From the experimental results, the prediction based on the SEIR-ARIMA hybrid model has better prediction effect than the common logistic regression Logistic, long short-term memory artificial neural network LSTM, SEIR model, and ARIMA model used for COVID-19 prediction. In order to truly reflect whether the improvement of the experimental effect originates from the advantage of combining SEIR and ARIMA models, this paper also implements the SEIR-Logistic hybrid model and SEIR-LSTM hybrid model, and compares the analysis with SEIR-ARIMA to conclude that both SEIR-ARIMA predictions achieve better prediction results. Therefore, the analysis of the development trend of COVID-19 based on the SEIR-ARIMA hybrid model is relatively reliable, which is conducive to the scientific decision-making of the country in the face of the epidemic and has good application value for the prevention of other types of infectious diseases in China in the future.
    Reference | Related Articles | Metrics | Comments0
    Group Activity Recognition Algorithm Based on Interaction Relationship Grouping Modeling Fusion
    WANG Chuan-xu, LIU Ran
    Computer and Modernization    2022, 0 (01): 1-9.  
    Abstract447)      PDF(pc) (3063KB)(429)       Save
    The modeling of interaction relationship between group members is the core technology of group activity recognition. High complexity and information redundancy in relational reasoning are tough problems in complex scenarios when modeling its group interactions. In order to solve these problems, we propose a model of grouping interactive relation. Firstly, CNN and RoIAlign are used to extract the scene information and personal information as initial features in each frame, and the whole group is divided into two subgroups by the personal spatial coordinates (For example, in the Volleyball data set, the X coordinates of participants’bounding boxes are used to rank, then, everyone set is set up an ordinal ID and 12 people are divided into two group from left to right). Secondly, the two local groups and the global scene groups are divided, the Graph Convolutional Network (GCN) is used to deduce their interaction relationship respectively, and the key persons in each group are determined. Then, we can regard global relationship features as the real value, and merge the characteristics of local relation of two groups as predicted value. In order to match the key figures of two groups with key figures from the whole group successfully, the cross-entropy loss function is built between the two and feedback to optimize the upper-level group GCN interaction relationship network. Next, with the information of key figures in the global interaction relationship as a guide, the key figures in the two subgroups are matched respectively. After successful matching, the matched key figures in the two subgroups are taken as the target nodes to establish a relationship graph between these two subgroups, and then it is deduced by GCN. Finally, the initial features are fused with intergroup and global interaction characteristics respectively to obtain two group behavior branches, and the final recognition result is obtained through decision fusion. The experiment shows that the accuracy is 93.1% on Volleyball data set and the accuracy is 48.1% on NBA data set.
    Reference | Related Articles | Metrics | Comments0
    Multi-UAV Hunting Based on Improved Whale Optimization Algorithm
    LING Wen-tong, NI Jian-jun, CHEN Yan, TANG Guang-yi
    Computer and Modernization    2021, 0 (06): 1-5.  
    Abstract375)      PDF(pc) (1931KB)(419)       Save
    UAV hunting is a challenging and realistic task. In order to enable UAVs to hun moving targets successfully and effectively, a multi-UAV hunting algorithm based on dynamic prediction of hunting points and improved whale optimization algorithm is proposed. When the environment is unknown and the target motion trajectory is unknown, this paper first uses polynomial fitting to predict the target motion trajectory, obtains the prediction point by dynamically predicting the number of steps, sets up hunting points around it, and then uses the two-way negotiation method to make reasonable assign each target point. Aiming at the shortcomings of the whale optimization algorithm that it is easy to fall into the local optimum, a method based on adaptive weights and changing the position of the spiral is proposed to improve the development ability and search ability of the algorithm. Finally, several experimental simulations were carried out in different experimental environments, and the experimental results showed the effectiveness of the proposed algorithm.
    Reference | Related Articles | Metrics | Comments0
    Multi-objective Optimization Algorithm for Flexible Job Shop Scheduling Problem
    XU Ming, ZHANG Jian-ming, CHEN Song-hang, CHEN Hao
    Computer and Modernization    2021, 0 (12): 1-6.  
    Abstract471)      PDF(pc) (1427KB)(406)       Save
    Flexible job shop scheduling problems have the characteristics of diversified solution sets and complex solution spaces. Traditional multi-objective optimization algorithms may fall into local optimality and lose the diversity of solutions when solving those problems. In the case of establishing a flexible job shop scheduling model with the maximum completion time, maximum energy consumption and total machine load as the optimization goals, an improved non-dominated sorting genetic algorithm (INSGA-II) was proposed to solve this problem. Firstly, the INSGA-II algorithm  combines random initialization and heuristic initialization methods to improve population diversity. Then it adopts a targeted crossover and mutation strategies for the process part and the machine part to improve the algorithm’s global searching capabilities. Finally,  adaptive crossover and mutation operators are designed to take into account the global convergence and local optimization capabilities of the algorithm. The experimental results on the mk01~mk07 standard data set show that the INSGA-II algorithm has better algorithm convergence and solution set diversity.
    Reference | Related Articles | Metrics | Comments0
    Relationship Extraction Method Based on BiLSTM and ResCNN
    XU Xiao-liang, ZHAO Ying
    Computer and Modernization    2022, 0 (01): 10-16.  
    Abstract368)      PDF(pc) (1310KB)(335)       Save
    Most of relationship extraction methods cannot obtain long-distance dependent information from long sentences, and the performance of relationship extraction is degraded due to the data noise. This paper proposes a new relationship extraction model based on BiLSTM and ResCNN to solve these problems. The model uses BiLSTM to obtain the context information vector of words. The features of the middle or low layer in the convolutional neural network are transferred to the high layer through residual network, which effectively solves the problem of vanishing gradient. At the same time, embedding the squeeze-and-excitation block into the residual network can greatly reduce the data noise and strengthen the feature transfer. The piecewise max pooling method is used to capture the structural information of the entity pair. This paper designs verification experiments on NYT-Freebase dataset. Experimental results show that this model can fully learn features and significantly improve the effect of relationship extraction.
    Reference | Related Articles | Metrics | Comments0
    Certificateless Signcryption Scheme Based on Blockchain
    ZHANG Tian-xi, WANG Li-peng, FU Jun-jun, CUI Ci, JIN Meng-lu
    Computer and Modernization    2022, 0 (01): 120-126.  
    Abstract300)      PDF(pc) (969KB)(315)       Save
    Signcryption algorithm can realize encryption and signature functions at the same time in a logical step. Compared with the traditional scheme of signing first and then encrypting, signcryption algorithm has the advantages of low calculation amount and communication cost, and is widely used in electronic payment, Internet of Things, etc. Existing signcryption schemes based on elliptic curve and bilinear pairing generally have the problem of low execution efficiency. Therefore, this paper proposes a certificateless signcryption scheme based on blockchain. The new scheme is implemented based on discrete logarithm puzzle and has the advantages of high execution efficiency. The new scheme also takes advantage of the non-tamperable modification and traceability of the blockchain to achieve non-repudiation. Security analysis shows that the proposed scheme has the characteristics of non-repudiation, confidentiality, and unforgeability. Performance analysis shows that the new scheme is more efficient in execution. Simulation experiments show that the introduction of blockchain has little effect on the overall performance of the system.
    Reference | Related Articles | Metrics | Comments0
    Application of YOLOv4 with Mixed-domain Attention in Ship Detection
    ZHAO Yu-rong, GUO Hui-ming, JIAO Han, ZHANG Jun-wei
    Computer and Modernization    2021, 0 (09): 75-82.  
    Abstract300)      PDF(pc) (2297KB)(304)       Save
    Marine ship detection plays an important role in the maritime field. Due to the complicated environment and the diversity of ships, existing methods based on convolutional neural network cannot achieve both high accuracy and real-time performance. To solve the problem of ship’s real-time detection in complicated environment, a YOLO-marine model based on YOLOv4 is proposed in which the domain attention mechanism is introduced into backbone. Firstly, the Mosaic method is used to preprocess the ship data. Then the K-Means++ algorithm is used to get initial anchors. The model is implemented on Darknet for training and evaluation with the real ship dataset. The experimental result show that compared with YOLOv4, YOLO-marine improves the mAP of ship detection task by 2.1 percentage points. The model can effectively improve the accuracy of ship detection while ensuring real-time performance. It also gives outstanding results in small and occluded target.
    Reference | Related Articles | Metrics | Comments0
    Face Mask Detection Algorithm Based on DCN-SERes-YOLOv3
    LI Guo-jin, RONG Yu
    Computer and Modernization    2021, 0 (09): 12-20.  
    Abstract315)      PDF(pc) (13180KB)(302)       Save
    With the outbreak of the COVID-19 epidemic in 2020, wearing mask is one of the important measures to effectively suppress the rebound of the epidemic. It is of great practical significance to study the use of machine vision technology to detect whether face masks are worn or not. This paper proposes a face mask detection algorithm based on DCN-SERes-YOLOv3 to solve the problems of occlusion, small detection targets, unobvious feature information, and difficult identification of the target group when wearing masks in video image. Firstly, the algorithm uses the combination of ResNet50 and YOLOv3 to replace the backbone network with the ResNet50 residual network. In order to balance the accuracy and speed of the model, the convolutional layer in the residual block is improved and the average pooling layer is added to reduce the model’s loss and complexity, improve the detection speed. Secondly, the conventional convolution of the fourth residual block in the ResNet50 residual network is replaced with DCN deformable convolution to improve the model’s ability to adapt to geometric deformation when wearing masks. Finally, the SENet channel attention mechanism is introduced to enhance the ability to express characteristic information. The experimental results show that the average accuracy of the algorithm proposed in this paper is as high as 95.36%, which is about 4.1 percent point higher than the traditional YOLOv3 algorithm, and the detection speed is increased by 11.7 fps. The proposed algorithm improves the precision and the speed of the task of detecting faces wearing masks and has high application prospect.
    Reference | Related Articles | Metrics | Comments0
    Fast Memory Synchronization Technology for Container Thermal Migration
    YOU Qiang-zhi, HU Huai-xiang, CHEN Xiang-yu
    Computer and Modernization    2022, 0 (01): 17-22.  
    Abstract318)      PDF(pc) (944KB)(288)       Save
    Container hot migration is the basis of cloud platform load balancing technology, and also an important guarantee for cluster fault management and underlying system maintenance. At present, the implementation of container hot migration is mainly based on checkpoint/restore mechanism, that is to do checkpoint operation on the running container, then stop the container, transfer the image file to the destination host, and then recover. The migration time includes checkpoint time, transmission time and recovery time. In order to reduce the downtime of container hot migration and reduce the transmission consumption, this paper designs and implements a container hot migration scheme based on pre-copy migration algorithm, and adopts the key technology of fast memory synchronization, which includes three methods: fine-grained dirty memory identification, dirty memory compression and transfer, and merging incremental memory in advance. Experiments show that the proposed scheme and optimization technology can significantly reduce the downtime and transmission overhead.
    Reference | Related Articles | Metrics | Comments0
    Stencil Character Recognition of Paper Medicine Packaging Based on Mask-RCNN
    WU Biao, ZHOU Qing-hua, ZENG Xiao-wei
    Computer and Modernization    2022, 0 (02): 108-113.  
    Abstract197)      PDF(pc) (2568KB)(280)       Save
    In order to realize the real-time detection of stencil characters on paper medical packaging, a stencil character recognition system based on image processing and deep learning is designed. The system first uses a variety of image processing methods to preprocess the image under the original lighting, thereby automatically extracting the region of interest in the image, and inputting it into the trained Mask-RCNN network for instance segmentation, then the pixel positions of different characters and their character values in each picture are obtained. The experimental results show that, compared with the traditional character recognition method, this method can solve the problem of insignificant gray-scale jumps in the stencil character pictures of paper medical packaging well, and accurately segment and mark the stencil characters in the picture of the paper packaging box. It has high practical value and its character recognition accuracy rate reaches 99%, which provides a new solution for the recognition and recording of stamped characters on the production line.
    Reference | Related Articles | Metrics | Comments0
    Optimization of Container Cloud   Resource Allocation Based on  Genetic Algorithm
    XU Sheng-chao, XIONG Mao-hua
    Computer and Modernization    2022, 0 (01): 108-112.  
    Abstract218)      PDF(pc) (784KB)(275)       Save
    This paper proposes a genetic algorithm approach for resource allocation optimization in container-based cloud environment. Considering resource allocation when VMS are configured on physical hosts and containers are configured on VMS, the objective function is to minimize the overall energy consumption of the container cloud platform data center. The machine should correspond to the container and other constraints, and the genetic algorithm is used to solve the objective function through five steps of chromosome expression, initialization, crossover operation, mutation operation and setting fitness function to obtain the optimal virtual resource allocation result. The experimental results show that the proposed method can realize the reasonable allocation of virtual resources in the container cloud environment and keep the energy consumption of the container cloud platform data center to a minimum and achieve the goal of resource efficient utilization.
    Reference | Related Articles | Metrics | Comments0
    A Survey of Text Classification Based on Deep Learning
    JIA Peng-tao, SUN Wei
    Computer and Modernization    2021, 0 (07): 29-37.  
    Abstract583)      PDF(pc) (1071KB)(264)       Save
    With the continuous development of the Internet, there is an increasing number of text data on the Internet. If these data can be effectively classified, it is more conducive to mining valuable information. Therefore, the management and integration of text data is very important. Text classification is a basic task in natural language processing tasks. It is mainly used in the fields of public opinion detection and news text classification. The purpose is to sort and classify text resources. The text classification based on deep learning shows a good classification effect in the processing of text data. The article elaborates on the deep learning algorithms used for text classification, classifies according to different deep learning algorithms, and analyzes the characteristics of various algorithms, and finally summarizes the future research directions of deep learning algorithms in the field of text classification.
    Reference | Related Articles | Metrics | Comments0
    A Survey of Encrypted Traffic Classification Based on Deep Learning
    LENG Tao ,
    Computer and Modernization    2021, 0 (08): 112-120.  
    Abstract642)      PDF(pc) (1055KB)(258)       Save
    In recent years, in order to protect the public privacy, a lot of traffic on the Internet is encrypted. The accuracy of traditional deep packet inspection and machine learning methods in the face of encrypted traffic has dropped significantly. With the application of deep learning automatic learning features, the encryption flow identification and classification technology based on deep learning algorithms have been rapidly developed. This article reviews these studies. First, this paper briefly introduces the application scenarios of encrypted traffic detection based on deep learning. Then, it summarizes and evaluates the existing works from three aspects: the use and construction of data sets, the detection model and the detection performance. The detection technology focuses on data preprocessing, unbalanced data set processing, neural network construction, real-time detection, etc. Finally, the problems in current research and future development directions and prospects are discussed, so as to provide some references for researchers in this field.
    Reference | Related Articles | Metrics | Comments0
    Landslide Image Detection Based on Dilated Convolution and Attention Mechanism
    LIU Xue-hu, OU Ou, ZHANG Wei-jing, DU Xue-lei
    Computer and Modernization    2022, 0 (04): 45-51.  
    Abstract301)      PDF(pc) (4767KB)(257)       Save
    Landslide area image detection and recognition has rich application and research value in disaster scope recognition, disaster data analysis and disaster prevention and mitigation. In this paper, a target detection method combining attention mechanism CBAM and dilated convolution is proposed to solve the problems of the diversity of landslide body shape and texture in landslide image and the unsatisfactory detection and recognition effect of landslide target area. On the basis of the traditional target detection algorithm Faster R-CNN, the attention mechanism model is added to the convolutional neural network layer. The landslide image features are extracted through the CBAM model combining spatial attention and channel attention, and the dilated convolution module is added to enlarge the receptive field area, and to improve the learning ability of the landslide target recognition and non-standard size in the remote sensing image area of the neural network, so as to further improve the detection accuracy of the landslide target area. The experimental results show that, based on the traditional target detection algorithm, the combination of the two methods can improve the recall rate and precision rate of target detection on the remote sensing images of landslides, and it has a certain validity and robustness.

    Reference | Related Articles | Metrics | Comments0
    Rumor Source Detection Based on Extended Epidemic Model
    WU Yang1, WU Guo-wen1, ZHANG Hong1, SHEN Shi-gen2, CAO Qi-ying
    Computer and Modernization    2022, 0 (01): 113-119.  
    Abstract265)      PDF(pc) (1868KB)(255)       Save
    In order to study the issue of rumors detection of better fitting the actual situation, this paper considers the ability of banning and isolating nodes that spread rumors in social networks,proposes a new model called SIOR (Susceptible-Infected-isOlated-Removed), which is based on the classic model called SIR. Then this paper obtains the source estimator through the optimal information propagation process and verifies that the estimated value is similar to the Jordan Infection Center in the network topology based on the SIOR model. Finally, this paper proposes a reverse infection propagation algorithm for the SIOR model, which can identify the Jordan infection center in the network topology,then  compares the algorithm with other centrality detection algorithms through simulation experiments to verify the feasibility of the estimator. In addition, the accuracy under SIOR model is improved compared with SIR model.
    Reference | Related Articles | Metrics | Comments0
    A Spark Streaming Parameter Optimization Method Based on Deep Reinforcement Learning
    LIU Lu, SHEN Guo-wei, GUO Chun, CUI Yun-he, JIANG Chao-hui, WU Da-yong
    Computer and Modernization    2021, 0 (10): 49-56.  
    Abstract270)      PDF(pc) (1879KB)(248)       Save
    Spark Streaming is the mainstream open source distributed stream analysis framework, and its performance optimization is one of the current research hotspots. In Spark Streaming performance optimization, configuration parameter optimization in business scenarios is an important factor in its performance improvement. In the Spark Streaming system, there are more than 200 configurable parameters, which requires high experience for parameter tuning personnel. Non optimized parameter configuration will affect the execution performance of streaming jobs. Therefore, in view of the parameter configuration optimization problem of Spark Streaming, a Spark Streaming parameter optimization method based on deep reinforcement learning (DQN-SSPO) is proposed, which converts the parameter optimization configuration problem of Spark Streaming into the problem of obtaining the maximum return in deep reinforcement learning model training, and a weighted state space transfer method is proposed to increase the probability of high feedback rewards for model training. Experiments on three typical streaming analysis tasks show that the performance of streaming jobs on Spark Streaming after parameter optimization is reduced by 27.93% in total scheduling time and 42% in total processing time.
    Reference | Related Articles | Metrics | Comments0
    Multi-scene Fusion Algorithm for Fine-grained Image Caption
    LI Xin-ye, ZHANG Cheng-qiang, ZHOU Xiong-tu, GUO Tai-liang, ZHANG Yong-ai
    Computer and Modernization    2021, 0 (09): 1-6.  
    Abstract293)      PDF(pc) (1256KB)(247)       Save
    In terms of the poor performance of image caption task in different scenes, a multi-scene image caption generation algorithm based on convolutional neural network and prior knowledge is proposed. The algorithm generates visual semantic units by convolutional neural network, then uses named entity recognition to identify and predict image scenes, uses the result of classifying to adjust the focusing parameter of self-attention mechanism automatically, and calculate the multi-scene attention score. Finally, the obtained region coding and semantic prior knowledge are inserted into Transformer text generator to guide sentence generation. The results show that the algorithm can effectively solve the problem that the caption lacks the key scene information. Evaluation indicators are used to evaluate the model on the MSCOCO dataset and Flickr30k dataset, and the CIDEr score of MSCOCO dataset reaches 1.210, which is better than similar image description generation models.
    Reference | Related Articles | Metrics | Comments0
    Mask Wearing Detection Algorithm Based on Improved YOLOv4
    JIN Xin, ZENG Si-ke, LIU Yang, WU Chu-han
    Computer and Modernization    2022, 0 (01): 85-90.  
    Abstract295)      PDF(pc) (3871KB)(243)       Save
    In order to solve the problems of low detection speed and large amount of model parameters of YOLOv4 in the target detection task, an improved target detection algorithm of YOLOv4 is proposed. CSPDarknet53 of the YOLOv4 backbone is replaced by Mobilenet to improve the feature extraction network of YOLOv4, and the original standard 3×3 convolution of PANet is replaced by a depth-division convolution to reduce the computational burden, so as to improve the detection speed and reduce the model parameters. The K-means+〖KG-*3〗+ algorithm is then used to perform anchor dimension clustering on a dataset consisting of 8565 images to improve the accuracy of the algorithm. At the same time, a system for recording pedestrian wearing of masks and measuring people’s temperature is built to perform epidemic control tasks in crowded places. The FPS has been improved by 200% and the model parameters have been reduced by 82% compared with the original algorithm, while maintaining the accuracy of the YOLOv4-Mobilenet. The improved model can detect an average of 67 frames per second, which can detect mask wearing in real applications, and the results show that the model is efficient and reliable.
    Reference | Related Articles | Metrics | Comments0
    Automatic Sleep Staging Based on 3CNN-BiGRU
    TANG Jie, WEN Yuan-mei
    Computer and Modernization    2022, 0 (02): 120-126.  
    Abstract157)      PDF(pc) (1290KB)(223)       Save
    Aiming at the efficiency and accuracy of single-channel EEG signal sleep automatic staging, this paper proposes to use three-scale parallel Convolutional Neural Networks to extract sleep signal features and Bidirectional Gated Recurrent Unit 3CNN-BiGRU automatic sleep staging model to learn the internal time relationship between sleep stages. First, the model performs band-pass filtering on the original single-channel EEG signal, and uses the synthetic minority oversampling technique for class balance, and then sends it to the built model for training and verification experiments. Pre-training and fine-tuning training  are used for optimizing the model, and  10-folds and 20-folds cross-validation is uses to improve training reliability. The experimental results of different models under different data sets show that the 3CNN-BiGRU model has achieved better training efficiency and better staging accuracy.
    Reference | Related Articles | Metrics | Comments0
    Application of Edge Computing in Intelligent Transportation Systems
    WU Jian-bo, ZHU Wen-xia, JU Liang, XU Zhi-fang
    Computer and Modernization    2021, 0 (12): 103-109.  
    Abstract383)      PDF(pc) (1839KB)(217)       Save
    With the popularization of automobiles, traffic congestion is becoming increasingly serious. Although the cloud-based intelligent transportation systems (ITS) can relieve traffic pressure, it can no longer meet the demand of transmission bandwidth and delay requirements of new on-board applications such as assisted driving and autonomous driving. In order to realize the data real-time processing, ensure public information and traffic safety, and improve the transportation system efficiency, edge computing (EC) is applied to ITS. The development of ITS is described and the overall architecture of edge-based ITS is proposed, which makes full use of the characteristics of edge computing such as physical proximity, high bandwidth, low latency and location recognition to solve the problems of information transmission delay, data processing delay and large transmission load. Next, the key technologies of edge computing in ITS are discussed from the aspects of wireless transmission, information perception, computing offloading and collaborative processing. Finally, the future opportunities and challenges for the application of EC in ITS are pointed out.
    Reference | Related Articles | Metrics | Comments0
    Track Data Hot Spot Mining Algorithm Based on K-means
    XU Wen-jin, GUAN Ke-hang, MA Yue, HUANG Hai-guang
    Computer and Modernization    2021, 0 (10): 23-28.  
    Abstract410)      PDF(pc) (1759KB)(217)       Save
    In view of the characteristics of time series and large quantity of fishing boat trajectory data, this paper proposes a trajectory hot spot mining algorithm, which overcomes the disadvantage that K-means algorithm cannot capture hot spot distribution in fishing boat trajectory data. The main idea is as follows: firstly, time dimension is used to process the data, and based on confidence and KL divergence to measure the reliability and correctness of the selected data, data with high information content is selected from a large number of trajectory data, and then the K-means clustering algorithm is used to cluster the processed data. The algorithm proposed in this paper only needs to set the significant level parameter a and time interval T, the algorithm itself can independently complete the data selection and the calculation of the confidence, KL divergence by using the method of time dimension data processing, and the clustering validity measure method is introduced to realize the whole process of hot spot mining by self-searching K value of K-means. The comparison test between the proposed algorithm and K-means algorithm and the reference test of data heat map are carried out on the trajectory data of fishing boats. The results show that the proposed algorithm is superior and correct in finding hot spots of trajectory data.
    Reference | Related Articles | Metrics | Comments0
    Speech Recognition in Complex Noise Environment
    ZHANG Yun-yao, HUANG He-ming, ZHANG Hui-yun,
    Computer and Modernization    2021, 0 (09): 68-74.  
    Abstract203)      PDF(pc) (1507KB)(216)       Save
    Speech recognition is an important way of human-computer interaction. Aiming at the poor performance of traditional speech recognition systems for noisy speech recognition and inappropriate feature selection, a deep autoencoder recurrent neural network model based on transfer learning is proposed. The model consists of encoder, decoder and acoustic model. Among them, the acoustic model is composed of stack bidirectional recurrent neural network, which is used to improve the recognition performance. The encoder and decoder are composed of full connected layers for feature extraction. The structure and parameters of the encoder are transferred to the acoustic model for joint training, the experimental results on noisy Google commands dataset show that the proposed model can effectively enhance the recognition performance of noisy speech and has good robustness and generalization.
    Reference | Related Articles | Metrics | Comments0
    Tabu Search for Target Localization in Grid Map
    DIAO Shuo
    Computer and Modernization    2021, 0 (10): 8-14.  
    Abstract156)      PDF(pc) (1398KB)(214)       Save
    Based on tabu search algorithm, the article proposes a novel model for the searching process in grid maps and proposes an improved tabu search algorithm that can use experience knowledge. This algorithm provides reference for the realization of intelligent auxiliary tools in the fields of guidance, water source detection, and post-disaster rescue. The article analyzes the key advantages of the tabu search algorithm, and proposes a map grid division method using regular hexagons as the grid cell to model the problem as an optimization that can be solved by the tabu search. The article takes the desert water source detection as an example to run experiments. Multiple desert elements are selected as relevant indicator parameters for water source detection. Experiments show that the proposed method performs well in a grid map with less than 10000 cells, and the rate of paths successfully planned can reach 91.7%, which is more than Hill Climbing strategy 36.68 percentage points, and the number of search steps is optimized by more than 88.4% compared with the traversal strategy.
    Reference | Related Articles | Metrics | Comments0
    Substation Equipment Operation and Maintenance System and Its Construction Based on Digital Twin#br#
    YANG Ke-jun, ZHANG Ke, HUANG Wen-li, CHEN Bo-wen
    Computer and Modernization    2022, 0 (02): 58-64.  
    Abstract314)      PDF(pc) (3097KB)(211)       Save
    In view of the problems of difficult periodic state control and low operation and inspection efficiency of substation equipment, based on the digital twin theory, a digital model and system based on the operation and and maintenance of real substation equipment is constructed. Firstly, the digital twins, which can reflect the real state of three kinds of equipment, namely converter transformer, condenser and GIS, are set up on the information layer. Secondly, the substation equipment of digital twins is analyzed with the historical big data of converter transformer, condenser and GIS, and then the next state of the substation state is predicted according to the collected state data, operation and inspection data of substation for realizing the data fusion of the physical layer and information layer in the actual substation of substation equipment. Lastly, the substation equipment operation and maintenance are considered as the experimental objects, the embedded information and physical fusion system is used to integrate and synchronize the operation and inspection data of substation equipment, forming the final digital twin framework system of substation equipment operation and inspection. Research shows that digital twin technology can improve the intelligent degree of substation equipment operation and inspection, and provide theoretical support for future substation construction. 
    Reference | Related Articles | Metrics | Comments0
    ElasticSearch Index Optimization Strategy for Engineering Data Retrieval
    XU Xian-hui, WANG Shu-ying, ZENG Wen-qu
    Computer and Modernization    2022, 0 (02): 79-84.  
    Abstract320)      PDF(pc) (1114KB)(203)       Save
    With the development of manufacturing industry, various industries generate a large amount of engineering data during the manufacturing process, the data retrieval requirements of the modern engineering field requires that the corresponding results can be retrieved quickly and accurately through keywords. The retrieval of engineering data can be achieved by using ElasticSearch, but there is still space for optimization in terms of its performance. In order to solve this problem, based on the in-depth study of the underlying theory of ElasticSearch, the index creation, index fragmentation and index segment merging of ElasticSearch are optimized. Firstly, the ElasticSearch tokenizer is modified and a custom dictionary is configured. Secondly, an index sharding strategy based on the performance of the cluster node and the size of the index data is proposed. Finally, the timing of index segment merging based on node performance is optimized. Through the experiments based on the retrieval of subway engineering data, the experimental results show that the improvement method can indeed improve the data writing and query performance of ElasticSearch.
    Reference | Related Articles | Metrics | Comments0
    Recommendation Algorithm Based on Knowledge Graph and Bi-LSTM
    WANG Yu-ying, WANG Yong
    Computer and Modernization    2021, 0 (09): 90-98.  
    Abstract416)      PDF(pc) (1255KB)(203)       Save
    At present, most of the existing model-based recommendation algorithms input the score data into the deep learning model for training to get the recommendation results. Its defect is that it is unable to analyze the interpretability of the prediction results. In addition, the algorithm can not effectively solve the cold start problem. Therefore, this paper proposes a recommendation algorithm based on knowledge map and Bi-LSTM to effectively solve the problem of interpretability and cold start of the algorithm. Firstly, the data set is preprocessed to generate precoding vector. According to the connectivity of data aggregation points, the domain knowledge map is constructed. Secondly, the meta path extraction technology of knowledge map is used to obtain multiple user item path information, which is input into Bi-LSTM. A layer of attention mechanism is added to each node of the path, so that the model could effectively obtain the information of remote nodes. Finally, the training results of multiple paths are input into the average pooling layer to distinguish the importance of different paths. The cross-entropy loss function is used to train the model and the prediction results are obtained. The experimental results show that, compared with the traditional recommendation algorithm based on the cyclic neural network model, this algorithm can effectively improve the interpretability and prediction accuracy of the algorithm, and alleviate the cold start problem of the algorithm.
    Reference | Related Articles | Metrics | Comments0
    A High Real-time Video Fusion Algorithm Based on Multi Direction Perception
    MO Wei, TANG Qing-shan, HUANG Tao
    Computer and Modernization    2021, 0 (10): 81-87.  
    Abstract199)      PDF(pc) (8973KB)(203)       Save
    Aiming at the problems of virtual shadow, color brightness difference on both sides of the stitching line and the inability of real-time stitching at high resolution in the multi-channel video fusion stage, this paper proposes a multi-directional perception video fusion algorithm. Firstly, in the stage of image registration, SIFT is used to extract feature points and feature descriptors to register the image. Then, in the image fusion stage, the weight lookup table constructed by exponential function is used to guide the fusion transition. Combined with the distance between the projection position of video frame and the seam, the image seam is fused adaptively by morphological operation. Finally, a large number of multi-threaded parallel operations on GPU platform are used to integrate matrix operations such as projection and fusion, so as to cover the delay and achieve the purpose of real-time. Experimental results show that the algorithm can eliminate the virtual shadow and blur in the overlapping area, and has a good real-time stitching effect.
    Reference | Related Articles | Metrics | Comments0
    Channel Pruning of Convolutional Neural Network Based on Transfer Learning
    FENG Jing-xiang
    Computer and Modernization    2021, 0 (12): 13-18.  
    Abstract263)      PDF(pc) (1012KB)(201)       Save
    Convolutional neural networks are widely used in many fields like computer vision. However, large number of model parameters and huge cost make many edge devices unable to offer enough storage and computing resource. Aiming at problems above, a migration learning method is introduced to improve the sparsity proportion of the channel pruning method based on the scaling factor of the BN layer. The effects of different levels of migration on the sparsity proportion and channel pruning are compared, and  experiments based on the NAS viewpoint are designed  to explore its pruning accuracy limit and iterative structure convergence. The results show that compared with the original model, with the accuracy loss under 0.10, the parameter amount is reduced by 89.1%, and the model storage size is reduced by 89.3%. Compared with the original pruning method, the pruning threshold is increased from 0.85 to 0.97, further reducing the parametes by 42.6%. Experiments have proved that the introduction of migration method makes it easier to fully sparse the weights, increases the tolerance of the channel pruning threshold, and gets a higher compression rate. In the pruning network architecture search process, the migration provides a more efficient starting point to search, which seems easy to converge to a local optimal solution of the NAS.
    Reference | Related Articles | Metrics | Comments0
    Poverty-returning Prediction Based on Ensemble Learning and Unbalanced Data
    GONG Yun-xiang, YUAN Shi-fang, LIU Fu-qian
    Computer and Modernization    2022, 0 (04): 12-16.  
    Abstract169)      PDF(pc) (1137KB)(199)       Save
    While China has made the decisive achievement on working on poverty alleviation, there are still some people out of poverty who exist risk of returning to poverty. Based on the unbalanced data set, this paper used the model of SMOTE to do sampling process for multi-class samples of returning to poverty. The sample’s ratio of returned to poverty and non-returned to poverty is 3〖DK〗∶1. After that, based on ensemble learning of Stacking, this paper constructed a prediction model of poverty-returning, used grid search to optimize hyper parameters of every model and improved the generalization ability by combining the 10-fold cross-validation. In this paper, four different integration models are used to predict whether the poor households will return to poverty. Compared with the single model, the experiments indicate that the classification results with fusion model are better. Among them, the optimal Acc and F1-score of fusion model are 0.962 and 0.946.
    Reference | Related Articles | Metrics | Comments0
    Data Augmentation for Chinese Named Entity Recognition Task
    LI Jian, ZHANG Ke-liang, TANG Liang, XIA Rong-jing, REN Jing-jing
    Computer and Modernization    2022, 0 (04): 1-6.  
    Abstract518)      PDF(pc) (1025KB)(198)       Save
    In low-resource natural language processing (NLP) tasks, the existing data is not enough to train an ideal deep learning model. Text data augmentation is an effective method to improve the training effect of such tasks. This paper proposes a group of data augmentation methods based on instance substitution for the task of Chinese named entity recognition. A named entity in the training sample can be replaced by another entity of the same kind without changing the label. The specific algorithms include: 1) crossover substitution between existing entities; 2) synonymous replacement of entity components; 3) automatic generation of Chinese names. These methods are applied to PeopleDailyNER and CLUENER2020 datasets respectively, and the augmentation data is used to train the BERT+CRF model. The experimental results show that the F1 value of the model can be improved by about 10% and 7% respectively on the two datasets with only adding the same amount of augmentation data as the original data under the condition of small samples, and it also has a significant improvement when the training samples increase.
    Reference | Related Articles | Metrics | Comments0
    Leaf Recognition Method of Invasive Alien Plants Based on Improved VGGNet Model
    YUAN Zhong-hu, WANG Wei, SU Bao-ling
    Computer and Modernization    2021, 0 (09): 7-11.  
    Abstract282)      PDF(pc) (856KB)(194)       Save
    In view of the leaves of different species of plants in nature may have small differences, which leads to the problem of leaf recognition errors of some native plants and invasive plants with similar edge profiles, a PF-VGGNet model is proposed. The common VGGNet model performs well in image classification. Using the sequential connection structure, it can extract the high-level semantic information features of the image, but the shallow contour and texture features of some images also play a key role in the classification. The PF-VGGNet model can fuse the shallow contour and texture features with the deep semantic information of the network to realize the automatic recognition of plant leaves. The experimental results show that the PF-VGGNet model has better recognition effect than other algorithms on the self built data set of alien invasive plant leaves, and the accuracy rates in training set and test set are 99.89% and 99.63% respectively. The PF-VGGNet can effectively reduce the problem of recognition error caused by the similar edge contour of leaves, can quickly identify the leaves of alien invasive plants, and provide support for the prevention and control of alien plants.
    Reference | Related Articles | Metrics | Comments0
    An Intelligent Information Retrieval System Based on Ranking Learning Algorithm
    WANG Zhen-yu, ZHENG Yang-fei
    Computer and Modernization    2021, 0 (10): 35-40.  
    Abstract247)      PDF(pc) (1072KB)(189)       Save
    This paper aims to solve the pain points of low information retrieval efficiency and low accuracy of retrieval results in the data asset management system, and integrates an intelligent retrieval system based on the ranking learning algorithm to improve the relevance of retrieval results and user requests. The theory of ranking learning algorithm is studied, the commonly used ranking learning algorithms are optimized, the classification problem is extended to the text ranking problem, the related objective function and loss function are defined, and the machine learning method is used to improve the accuracy of the retrieval results. The intelligent retrieval system built in vertical distributed search engine technology and ranking learning algorithm improves the efficiency of retrieval request conversion through correlation engineering. Experiments show that this system can enhance the relevance between retrieval sentences and returned results on the basis of optimizing retrieval rate and polish up the accuracy of retrieval.
    Reference | Related Articles | Metrics | Comments0
    Fast Paper Edge Detection Method Based on HED Network
    ZHAO Qi-wen, XU Kun, XU Yuan
    Computer and Modernization    2021, 0 (05): 1-5.  
    Abstract483)      PDF(pc) (2564KB)(185)       Save
    The Holistically-nested Edge Detection (HED) network is one of the deep learning network models with better edge detection performance at present. However, when the HED is used for edge detection of paper, the detection speed is slow and cannot meet the real-time requirements. On the premise of ensuring the detection accuracy, this paper proposes a fast paper edge detection method based on HED network. This article uses the lightweight network MobileNetV2 as the HED backbone network, and removes the last two bottleneck modules of the MobileNetV2 network and the convolutional layer with a large number of output channels to further accelerate the detection speed. In addition, the pooling layer in the network is removed, and a 5×5 convolutional layer with a step length of 1 is added to improve the detection accuracy. A paper data set MPDS containing a variety of situations is produced, the method proposed in this paper is trained and tested on MPDS. The experimental results show that the proposed model increases the ODS and OIS indicators to 0.867 and 0.876, respectively. The detection speed is 42.68 FPS. The method proposed in this paper can quickly and accurately detect the edge of the paper and meet the requirements of the desktop enhancement system for paper detection.
    Reference | Related Articles | Metrics | Comments0
    Recipe Recommendation Algorithm Based on Knowledge Graph and Collaborative Filtering
    GENG Hua-cong, LIANG Hong-tao, LIU Guo-zhu
    Computer and Modernization    2021, 0 (08): 24-29.  
    Abstract523)      PDF(pc) (920KB)(175)       Save
    In view of the traditional collaborative filtering-based recipe recommendation algorithm that only uses the user-item score matrix and does not consider the semantic information of the item itself resulting in low recommendation accuracy, this paper introduces the semantic information between recipes as an important recommendation basis by constructing a knowledge graph, and proposes a personalized diet recommendation algorithm based on knowledge graph embedding and collaborative filtering. By representing the recipe entity and relationship in two different low-dimensional continuous vector spaces, the semantic similarity between the dishes is calculated, and the semantic similarity is incorporated into the collaborative filtering recommendation for recommendation. The method in this paper alleviates the problems of data sparsity and cold start by strengthening the use of hidden information between dishes, and makes the recommendation result more reasonable. Experiments on the dataset show that the method has a significant effect on recipe recommendation, and it has a significant improvement in recall and AUC.
    Reference | Related Articles | Metrics | Comments0
    Malicious TLS Traffic Identification Based on Deep Generation Adversarial Network
    QIN Ming-yue, NIAN Mei, ZHANG Jun,
    Computer and Modernization    2022, 0 (04): 121-126.  
    Abstract326)      PDF(pc) (1151KB)(174)       Save
    The class imbalance problem in the public data sets of malicious encrypted traffic identification seriously affects the performance of malicious traffic prediction. In this paper, we propose to use the generator and discriminator in the depth generation adversarial network DGAN to simulate the generation of real data sets and the expansion of small sample data to form balanced data sets. In addition, in order to solve the problems that traditional machine learning methods rely on artificial feature extraction, which leads to the decrease of classification accuracy, a malicious traffic recognition model based on the combination of two-way gating loop unit BiGRU and attention mechanism is proposed. The deep learning algorithm automatically obtains the important feature vectors of different time series of data sets to identify malicious traffic. Experiments show that compared with the common malicious traffic recognition algorithms, the model has a good improvement in accuracy, recall, F1 and other indicators, and can effectively realize the identification of malicious encrypted traffic.
    Reference | Related Articles | Metrics | Comments0
    An Improved Instrument Detection Algorithm Based on YOLOv3
    HUANG Zi-ping, HUANG Ji-feng, ZHOU Xiao-ping
    Computer and Modernization    2022, 0 (01): 77-84.  
    Abstract255)      PDF(pc) (2642KB)(172)       Save
    Instrument detection is an indispensable part of intelligent instrument testing, its effect directly determines the accuracy of instrument testing. In view of the complex positioning background of the instrument and the requirement of fast detection speed, a target detection algorithm based on improved YOLOv3 is proposed. Based on YOLOv3 algorithm, the last two network blocks in the Darknet are first replaced with DenseNet (Densely Connected Convolutional Networks) so as to enhance the reuse of features by the model. And then the lightweight Darknet-48 is used as feature extraction networks, and the convolution neural network in the DenseNet is modified to the deep separable convolution network, and then  the 6 layer convolution before all detection layers (YOLO Detection) is modified to 2 layers so as to reduce the parameters of the model. At the same time, GDIOU bounding box is introduced to regress coordinates loss, and  the weight of the loss function is readjusted according to the detection requirements. Experimental results show that compared with the original algorithm, the number of parameters of the improved YOLOv3 algorithm is reduced by 40%, and the accuracy  and recall  in instrument detection reach 95.83% and 94.98%, respectively, which is increased by 2.21 percentage points and 2.09 percentage points. The average accuracy is increased by 2.42 percentage points  and the detection speed is increased by 30.18%.
    Reference | Related Articles | Metrics | Comments0
    Vehicle Re-identification Method Based on Non-local Attention and Local Features
    WAN Dong-hou, ZHANG De-xian, DENG Miao-lei,
    Computer and Modernization    2022, 0 (03): 23-29.  
    Abstract176)      PDF(pc) (3323KB)(172)       Save
    Vehicle re-identification refers to re-identifying the same vehicle from different cameras. The result of vehicle re-identification is easily affected by other factors such as vehicle angle and illumination, which is a very challenging task. Many vehicle re-identification methods pay too much attention to the global features of the vehicle, but ignore the local resolution features of the vehicle image, which result in the problem of low accuracy of vehicle re-recognition. To solve this problem, this paper proposes a vehicle re-identification method integrating non-local attention and multi-scale features. The attention mechanism is used to obtain vehicle salient features and integrate multi-scale features, so as to improve the retrieval accuracy of vehicle re-identification. Firstly, the backbone feature extraction network and attention module are used to obtain the significant fine-grained features of vehicles. Then, the feature is divided into multiple branches for metric learning. The local and global features of vehicles are learned respectively, and the global features and fine-grained local features are fused to construct the features of vehicle re-identification. Finally, this method is used to extract the characteristics of different vehicles and calculate the similarity of different vehicles and judge whether they have the same identity. The experimental results show that the vehicle re-identification algorithm using attention mechanism and local features has higher accuracy.
    Reference | Related Articles | Metrics | Comments0