The search functionality is under construction.

Author Search Result

[Author] Qi LIU(8hit)

1-8hit
  • Dynamically Constrained Vector Field Convolution for Active Contour Model

    Guoqi LIU  Zhiheng ZHOU  Shengli XIE  Dongcheng WU  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E96-D No:11
      Page(s):
    2500-2503

    Vector field convolution (VFC) provides a successful external force for an active contour model. However, it fails to extract the complex geometries, especially the deep concavity when the initial contour is set outside the object or the concave region. In this letter, dynamically constrained vector field convolution (DCVFC) external force is proposed to solve this problem. In DCVFC, the indicator function with respect to the evolving contour is introduced to restrain the correlation of external forces generated by different edges, and the forces dynamically generated by complex concave edges gradually make the contour move to the object. On the other hand, traditional vector field, a component of the proposed DCVFC, makes the evolving contour stop at the object boundary. The connections between VFC and DCVFC are also analyzed. DCVFC maintains desirable properties of VFC, such as robustness to initialization. Experimental results demonstrate that DCVFC snake provides a much better segmentation than VFC snake.

  • A Detection and Measurement Approach for Memory Leaked Objects in Java Programs

    Qiao YU  Shujuan JIANG  Yingqi LIU  

     
    PAPER-Software Engineering

      Pubricized:
    2015/02/04
      Vol:
    E98-D No:5
      Page(s):
    1053-1061

    Memory leak occurs when useless objects cannot be released for a long time during program execution. Memory leaked objects may cause memory overflow, system performance degradation and even cause the system to crash when they become serious. This paper presents a dynamic approach for detecting and measuring memory leaked objects in Java programs. First, our approach tracks the program by JDI and records heap information to find out the potentially leaked objects. Second, we present memory leaking confidence to measure the influence of these objects on the program. Finally, we select three open-source programs to evaluate the efficiency of our approach. Furthermore, we choose ten programs from DaCapo 9.12 benchmark suite to reveal the time overhead of our approach. The experimental results show that our approach is able to detect and measure memory leaked objects efficiently.

  • Research on the Impedance Characteristic of a Two-Coil Wireless Power Transfer System

    Suqi LIU  Jianping TAN  Xue WEN  

     
    PAPER-Electronic Circuits

      Vol:
    E101-C No:9
      Page(s):
    711-717

    Wireless power transfer (WPT) via coupled magnetic resonances has more than ten years history of development. However, it appears frequency splitting phenomenon in the over-coupled region, thus, the output power of the two-coil WPT system achieves the maximum output power at the two splitting angular frequencies and not at the natural resonant angular frequency. By investigating the relationship between the impedances of the transmitter side and receiver side, we found that WPT system is a power superposition system, and the reasons were given to explaining how to appear the frequency splitting and impact on the maximum output power of the system in details. First, the circuit model was established and transfer characteristics of the two-coil WPT system were studied by utilizing circuit theories. Second, the mechanism of the power superposition of the WPT system was carefully researched. Third, the relationship between the impedances of the transmitter side and receiver side was obtained by investigating the impedance characteristics of a two-coil WPT system, and also the impact factors of the maximum output power of the system were obtained by using a power superposition mechanism. Finally, the experimental circuit was designed and experimental results are well consistent with the theoretical analysis.

  • Data-Sparsity Tolerant Web Service Recommendation Approach Based on Improved Collaborative Filtering

    Lianyong QI  Zhili ZHOU  Jiguo YU  Qi LIU  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2017/06/06
      Vol:
    E100-D No:9
      Page(s):
    2092-2099

    With the ever-increasing number of web services registered in service communities, many users are apt to find their interested web services through various recommendation techniques, e.g., Collaborative Filtering (i.e., CF)-based recommendation. Generally, CF-based recommendation approaches can work well, when a target user has similar friends or the target services (i.e., services preferred by the target user) have similar services. However, when the available user-service rating data is very sparse, it is possible that a target user has no similar friends and the target services have no similar services; in this situation, traditional CF-based recommendation approaches fail to generate a satisfying recommendation result. In view of this challenge, we combine Social Balance Theory (abbreviated as SBT; e.g., “enemy's enemy is a friend” rule) and CF to put forward a novel data-sparsity tolerant recommendation approach Ser_RecSBT+CF. During the recommendation process, a pruning strategy is adopted to decrease the searching space and improve the recommendation efficiency. Finally, through a set of experiments deployed on a real web service quality dataset WS-DREAM, we validate the feasibility of our proposal in terms of recommendation accuracy, recall and efficiency. The experiment results show that our proposed Ser_RecSBT+CF approach outperforms other up-to-date approaches.

  • Bee Colony Algorithm Optimization Based on Link Cost for Routing and Wavelength Assignment in Satellite Optical Networks Open Access

    Yeqi LIU  Qi ZHANG  Xiangjun XIN  Qinghua TIAN  Ying TAO  Naijin LIU  Kai LV  

     
    PAPER-Internet

      Pubricized:
    2019/12/18
      Vol:
    E103-B No:6
      Page(s):
    690-702

    Rapid development of modern communications has initiated essential requirements for providing efficient algorithms that can solve the routing and wavelength assignment (RWA) problem in satellite optical networks. In this paper, the bee colony algorithm optimization based on link cost for RWA (BCO-LCRWA) is tailored for satellite networks composed of intersatellite laser links. In BCO-LCRWA, a cost model of intersatellite laser links is established based on metrics of network transmission performance namely delay and wavelengths utilization, with constraints of Doppler wavelength drift, transmission delay, wavelength consistency and continuity. Specifically, the fitness function of bee colony exploited in the proposed algorithm takes wavelength resources utilization and communication hops into account to implement effective utilization of wavelengths, to avoid unnecessary over-detouring and ensure bit error rate (BER) performance of the system. The simulation results corroborate the improved performance of the proposed algorithm compared with the existing alternatives.

  • Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing

    Zhangjie FU  Xingming SUN  Qi LIU  Lu ZHOU  Jiangang SHU  

     
    PAPER-Network

      Vol:
    E98-B No:1
      Page(s):
    190-200

    Cloud computing is becoming increasingly popular. A large number of data are outsourced to the cloud by data owners motivated to access the large-scale computing resources and economic savings. To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. So how to design an efficient, in the two aspects of accuracy and efficiency, searchable encryption scheme over encrypted cloud data is a very challenging task. In this paper, for the first time, we propose a practical, efficient, and flexible searchable encryption scheme which supports both multi-keyword ranked search and parallel search. To support multi-keyword search and result relevance ranking, we adopt Vector Space Model (VSM) to build the searchable index to achieve accurate search results. To improve search efficiency, we design a tree-based index structure which supports parallel search to take advantage of the powerful computing capacity and resources of the cloud server. With our designed parallel search algorithm, the search efficiency is well improved. We propose two secure searchable encryption schemes to meet different privacy requirements in two threat models. Extensive experiments on the real-world dataset validate our analysis and show that our proposed solution is very efficient and effective in supporting multi-keyword ranked parallel searches.

  • Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation

    Zhili ZHOU  Ching-Nung YANG  Beijing CHEN  Xingming SUN  Qi LIU  Q.M. Jonathan WU  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/03/07
      Vol:
    E99-D No:6
      Page(s):
    1531-1540

    For detecting the image copies of a given original image generated by arbitrary rotation, the existing image copy detection methods can not simultaneously achieve desirable performances in the aspects of both accuracy and efficiency. To address this challenge, a novel effective and efficient image copy detection method is proposed based on two global features extracted from rotation invariant partitions. Firstly, candidate images are preprocessed by an averaging operation to suppress noise. Secondly, the rotation invariant partitions of the preprocessed images are constructed based on pixel intensity orders. Thirdly, two global features are extracted from these partitions by utilizing image gradient magnitudes and orientations, respectively. Finally, the extracted features of images are compared to implement copy detection. Promising experimental results demonstrate our proposed method can effectively and efficiently resist rotations with arbitrary degrees. Furthermore, the performances of the proposed method are also desirable for resisting other typical copy attacks, such as flipping, rescaling, illumination and contrast change, as well as Gaussian noising.

  • Real-Valued Reweighted l1 Norm Minimization Method Based on Data Reconstruction in MIMO Radar

    Qi LIU  Wei WANG  Dong LIANG  Xianpeng WANG  

     
    PAPER-Antennas and Propagation

      Vol:
    E98-B No:11
      Page(s):
    2307-2313

    In this paper, a real-valued reweighted l1 norm minimization method based on data reconstruction in monostatic multiple-input multiple-output (MIMO) radar is proposed. Exploiting the special structure of the received data, and through the received data reconstruction approach and unitary transformation technique, a one-dimensional real-valued received data matrix can be obtained for recovering the sparse signal. Then a weight matrix based on real-valued MUSIC spectrum is designed for reweighting l1 norm minimization to enhance the sparsity of solution. Finally, the DOA can be estimated by finding the non-zero rows in the recovered matrix. Compared with traditional l1 norm-based minimization methods, the proposed method provides better angle estimation performance. Simulation results are presented to verify the effectiveness and advantage of the proposed method.