Show all abstracts
View Session
- Front Matter: Volume 8768
- International Conference on Graphic and Image Processing (ICGIP 2012)
Front Matter: Volume 8768
Front Matter: Volume 8768
Show abstract
This PDF file contains the front matter associated with SPIE Proceedings Volume 8768, including the Title Page, Copyright information, Table of Contents, Introduction (if any), and Conference Committee listing.
International Conference on Graphic and Image Processing (ICGIP 2012)
A frequency-domain equalizer based on least mean square algorithm for direct-detection optical OFDM transmission system
Show abstract
In order to overcome the defects of least squares (LS) estimator used to eliminate phase noise in the direct-detection
(DD) optical orthogonal frequency division multiplexing (OOFDM) transmission system, we present an adaptive Least
Mean Square (LMS) estimator which has the same computational complexity as LS estimator. The performance of the
proposed estimator is evaluated in an experimental system with 2.5Gbits/s DD-OOFDM signal transmission over 100km
standard single mode fiber (SSMF). The experimental results show that the performance of the system with LMS
estimator is much better than that with LS estimator.
Implementation of secure AODV in MANET
Show abstract
Mobile Ad hoc Networks (MANETs) comprised of autonomous and self-organizing mobile computing devices which do not have a fixed infrastructure but rather they use ad-hoc routing protocols for data transmission and reception. Ad hoc on demand distance vector (AODV) is an IP reactive routing protocol which is optimized for MANETs and it can also be used for other wireless ad-hoc networks. Nodes in network cannot perform route discovery or maintenance functions itself. This problem is resolved by using AODV as it computes the routing distance from sending node to receiving node at preset intervals.
This research paper proposed Secure Routing Protocol (SRP) AODV for MANETs and its implementation. Performance of proposed SRP is compared to ordinary AODV. The simulation results reveal that proposed SRP is more efficient and secure than ordinary AODV. SRP AODV can be used for further research towards development of a commercial demand for the MANET routing protocol using Blowfish cryptosystem for encryption and decryption for secure routing in a given mobile ad hoc network.
The capacity kernel of communication networks
Show abstract
The capacity factor, as a useful tool, was used to characterize the dependence of every link on the capacity changes of a network coding based network. In this paper, we shall investigate the relationship between the network capacity and the set of capacity factors. We firstly introduce a new concept, the capacity kernel, which is a subnetwork deduced from the original network. It will be shown that the capacity kernel of a network maintains most important capacity-related properties of the original network. The capacity kernel can also deduce a projection operator, which to the best of our knowledge, is the first known projection operator acting on the space of all the communication networks. We further introduce and discuss the properties of the C-contra links based on the capacity kernel. As an application, a tighter upper bound on the capacity factor size is then obtained.
Research on secure routing algorithm in wireless sensor network
Bo Zhang
Show abstract
Through the research on the existing wireless sensor network (WSN) and its security technologies, this paper
presents a design of the WSN-based secure routing algorithm. This design uses the existing routing algorithm as chief
source, adding the security guidance strategy, introducing the location key information, to enhance the security
performance of WSN routing. The improved routing algorithm makes the WSN routing achieve better anti-attack in the
case of little overhead increase, therefore has high practical value.
File recovering from YAFFS2 based on object headers and metadata
Show abstract
With the popularity of the mobile devices, flash memories have drawn much attention of investigators. In this paper, a method to recover deleted files from YAFFS2 file system was proposed. The YAFFS2 tags stored in spare area of flash and the object header of each files provide a lot of opportunities for investigators, thus were used to find and reassemble all the original files. The simulated experiment results under Linux operating system showed that the proposed method could recover the deleted files as long as they are still on the flash.
Hybridizing particle swarm optimization with differential evolution based on feasibility rules
Show abstract
This paper presents a novel algorithm named HPSODE for constrained optimization problems. The proposed algorithm integrates particle swarm optimization (PSO) with differential evolution (DE) on the basis of an optimal information sharing mechanism firstly, which avoids premature convergence defects of the single algorithm. Then under the guidance of the feasibility rules, the algorithm quickly finds better feasible solution. Finally, HPSODE is tested on two engineering design problems. Comparisons show that HPSODE has higher computational precision, better robustness and is more effective for solving constrained optimization problem.
Application distribution model and related security attacks in VANET
Show abstract
In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker‘s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.
Design of cognitive engine for cognitive radio based on the rough sets and radial basis function neural network
Show abstract
Cognitive radio (CR) is an intelligent wireless communication system which can dynamically adjust the parameters to improve system performance depending on the environmental change and quality of service. The core technology for CR is the design of cognitive engine, which introduces reasoning and learning methods in the field of artificial intelligence, to achieve the perception, adaptation and learning capability. Considering the dynamical wireless environment and demands, this paper proposes a design of cognitive engine based on the rough sets (RS) and radial basis function neural network (RBF_NN). The method uses experienced knowledge and environment information processed by RS module to train the RBF_NN, and then the learning model is used to reconfigure communication parameters to allocate resources rationally and improve system performance. After training learning model, the performance is evaluated according to two benchmark functions. The simulation results demonstrate the effectiveness of the model and the proposed cognitive engine can effectively achieve the goal of learning and reconfiguration in cognitive radio.
A visual sensitivity based low-bit-rate image compression algorithm
Show abstract
In this paper, we present a visual sensitivity based low-bit-rate image compression algorithm. Using the idea that different image regions have different perceptual significance relative to quality, the input image is divided into edges, textures and smooth regions. For the edges, the standard JPEG algorithm with an appropriate quantitative step is applied so that the details can be preserved. For the textures, the JPEG algorithm is applied on the down-scale version. For the smooth regions, a skipping scheme is employed in the compression process so as to save bits. Experimental results show the superior performance of our method in terms of both compression efficiency and visual quality.
A deformable spherical planet exploration robot
Show abstract
In this paper, a deformable spherical planet exploration robot has been introduced to achieve the task of environmental detection in outer space or extreme conditions. The robot imitates the morphology structure and motion mechanism of tumbleweeds. The robot is wind-driven. It consists of an axle, a spherical steel skeleton and twelve airbags. The axle is designed as two parts. The robot contracts by contracting the two-part axle. The spherical robot installs solar panels to provide energy for its control system.
Efficient model checking of network authentication protocol based on SPIN
Show abstract
Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.
Security issues in cooperative spectrum sensing for cognitive radio network
Show abstract
In the CR networks, the unlicensed users can access the idle spectrum when they sense that licensed users are not using this spectrum. Due to the ability of dynamically reusing the spare spectrum resources, there is a remarkable increase of the spectrum utilization. However cognitive radio has brought new problems and concerns, especially in safety. Primary user emulation attack (PUEA) and Spectrum Sensing Data Falsity (SSDF) attack are typical attacks in spectrum sensing. In this paper we will give a detailed introduce of this two threats. Then we will represent some methods to weaken the effectiveness of these attacks.
A new support vector machine model for outlier detection
Show abstract
Outlier detection has attracted more and more attentions from researchers due to its extensive applications in various fields. In this paper, a new SVM (Support Vector Machine) model is presented for a special type of outlier detection problem, where the majority of training data is normal sample and it also contains a small number of anomaly samples. The experimental results on several datasets show that the proposed algorithm is valid and can achieve better accuracy compared with the published algorithms.
Numerical integration based on evolutionary functional network
Show abstract
In this paper, a novel evolutionary functional network (EFN) is introduced. Firstly the generalized basis function is introduced, and then genetic programming is improved by changing the objects and structure of encoding. Sequences of generalized basis functions acts as individuals, general tree structure is used to encode them. Least square method (LSM) is used to design fitness function and by a number of evolutions, the optimum approximated model is achieved. The algorithm is used to compute the numerical integrals of all kinds of functions. Finally, results of 5 experiments show that this algorithm is effectively feasible and more accurate.
Neural computing thermal comfort index PMV for the indoor environment intelligent control system
Show abstract
Providing indoor thermal comfort and saving energy are two main goals of indoor environmental control system. An intelligent comfort control system by combining the intelligent control and minimum power control strategies for the indoor environment is presented in this paper. In the system, for realizing the comfort control, the predicted mean vote (PMV) is designed as the control goal, and with chastening formulas of PMV, it is controlled to optimize for improving indoor comfort lever by considering six comfort related variables. On the other hand, a RBF neural network based on genetic algorithm is designed to calculate PMV for better performance and overcoming the nonlinear feature of the PMV calculation better. The formulas given in the paper are presented for calculating the expected output values basing on the input samples, and the RBF network model is trained depending on input samples and the expected output values. The simulation result is proved that the design of the intelligent calculation method is valid. Moreover, this method has a lot of advancements such as high precision, fast dynamic response and good system performance are reached, it can be used in practice with requested calculating error.
A restricted Steiner tree problem is solved by Geometric Method II
Show abstract
The minimum Steiner tree problem has wide application background, such as transportation system, communication network, pipeline design and VISL, etc. It is unfortunately that the computational complexity of the problem is NP-hard. People are common to find some special problems to consider. In this paper, we first put forward a restricted Steiner tree problem, which the fixed vertices are in the same side of one line L and we find a vertex on L such the length of the tree is minimal. By the definition and the complexity of the Steiner tree problem, we know that the complexity of this problem is also Np-complete. In the part one, we have considered there are two fixed vertices to find the restricted Steiner tree problem. Naturally, we consider there are three fixed vertices to find the restricted Steiner tree problem. And we also use the geometric method to solve such the problem.
Research on signal strength difference of arrival based indoor outdoor geolocation
Xiaorong Zhao
Show abstract
This paper investigates indoor outdoor geolocation of cellular handsets based on signal strength difference of arrival (SSDOA) which taken by a cellular handset of the surrounding base stations. To predict and generate SSDOA maps, propagation and penetration models are built to represent different environments. This location system generates the location fix by matching the SSDOA signature to the predicted received signal strength database(PSD).The closest match gives the location estimate. Cramer rao lower bound(CRLB) is derivate. To improve the accuracy, firstly, this paper analyzes the main cause of measurement errors and the method of reducing measurement errors. Secondly, a simulation experiment has been conducted based on typical parameters which play an important role of location accuracy, to find the relationship between parameters and accuracy. Finally, this paper gives a conclusion according to detailed analysis.
Appearance-based color face recognition with 3d model
Show abstract
Appearance-based face recognition approaches explore color cues of face images, i.e. grey or color information for
recognition task. They first encode color face images, and then extract facial features for classification. Similar to
conventional singular value decomposition, hypercomplex matrix also exists singular value decomposition on
hypercomplex field. In this paper, a novel color face recognition approach based on hypercomplex singular value
decomposition is proposed. The approach employs hypercomplex to encode color face information of different channels
simultaneously. Hypercomplex singular value decomposition is utilized then to compute the basis vectors of the color
face subspace. To improve learning efficiency of the algorithm, 3D active deformable model is exploited to generate
virtual face images. Color face samples are projected onto the subspace and projection coefficients are utilized as facial
features. Experimental results on CMU PIE face database verify the effectiveness of the proposed approach.
Study on the principle and defense of buffer overflow attacks
Wang Lin
Show abstract
Buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area. With specific programs, this paper describes in detail the type of buffer overflow attacks and technical principles, so we have a good understanding of them, and then gives several common preventive measures.
Research on statistical process control for solvent residual quantity of packaging materials
Yingzhe Xiao,
Yanan Huang
Show abstract
Statistical Process Control (SPC) and the basic tool of its controlling – control chart - are discussed in this paper based on the development of quality management, current situation of quality management of Chinese packaging enterprises, and the necessity of applying SPC. On this basis, X-R control chart is used to analyze and control the solvent residual in the compound process. This work may allow field personnel to find the shortcomings in the quality control by noticing the corresponding of fluctuations and slow variations in the process in time. In addition, SPC also provides objective basis for the quality management personnel to assess semi-products or products quality.
The application of fuzzy neural network in distribution center location
Show abstract
In this paper, the establishment of the fuzzy neural network model for logistics distribution center location applied the fuzzy method to the input value of BP algorithm and took the experts' evaluation value as the expected output. At the same time, using the network learning to get the optimized selection and furthermore get a more accurate evaluation to the programs of location.
The mechanism for the slumping congeries starting response to rainfall
Show abstract
The starting process of slumping congeries is the key of Landslide fluidization. Taking Jinlong gully of Yalong River as a typical instance, the characteristics of slumping congeries on the response of heavy rainfall are analyzed firstly, then dynamic mechanism is made to retrieve the starting of slumping congeries by mechanical model. Finally Conclusions of slumping congeries starting response to rainfall are given: (1) The response to rainfall amount is reflected in the transition period of the dry season to rainy season when transformation of debris flows are concentrative happened. (2) The response to rainfall intensity is characterized by short-term index of rainfall intensity, and after calculating the index of rainfall intensity in Jinlong gully, debris flow is likely to outbreak when the index is greater than 800. (3) Taking a loose debris body as the simplified mechanics model, the starting process of slumping congeries is that under the heavy rainfall the increased water force and decreased soil cohesions reduce the stability and then lead to the starting of the slumping congeries and generate debris flow. All the conclusions and results in the paper can provide references for the theory study of landslide fluidization and the starting of debris flow.
The efficient discrete Tchebichef transform for spectrum analysis of speech recognition
Show abstract
Spectrum analysis is an elementary operation in speech recognition. Fast Fourier Transform (FFT) is a famous technique to analyze frequency spectrum of the signal in speech recognition. The Discrete Tchebichef Transform (DTT) is proposed as possible alternative to the FFT. DTT has lower computational complexity and it does not require complex transform with imaginary numbers. This paper proposes an approach based on 256 discrete orthonormal Tchebichef polynomials for efficient to analyze a vowel and a consonant in spectral frequency of speech recognition. The comparison between 1024 discrete Tchebichef transform and 256 discrete Tchebichef transform has been done. The preliminary experimental results show that 256 DTT has the potential to be efficient to transform time domain into frequency domain for speech recognition. 256 DTT produces simpler output than 1024 DTT in frequency spectrum. The used of 256 Discrete Tchebichef Transform can produce concurrently four formants F1, F2, F3 and F4 for the consonant.
Research and development of intelligent controller for high-grade sanitary ware
Show abstract
With the social and economic development and people's living standards improve, more and more emphasis on modern society, people improve the quality of family life, the use of intelligent controller applications in high-grade sanitary ware physiotherapy students. Analysis of high-grade sanitary ware physiotherapy common functions pointed out in the production and use of the possible risks, proposed implementation of the system hardware and matching, given the system software implementation process. High-grade sanitary ware physiotherapy intelligent controller not only to achieve elegant and beautiful, simple, physical therapy, water power, deodorant, multi-function, intelligent control, to meet the consumers, the high-end sanitary ware market, strong demand, Accelerate the enterprise product Upgrade and improve the competitiveness of enterprises.
Solving time-varying knapsack problem based on binary harmony search algorithm
Show abstract
In order to using harmony search algorithm (HSA) to solve dynamic optimization problems, this paper proposed a
binary harmony search algorithm (BHSA) based on hybrid double-coding method. In this paper we use the BHSA,
DS_BPSO and PDGA to solve time-varying knapsack problem. The results show that dynamic search capability and
ability of tracing optimal solution of BHAS are nearly as same as DS_BPSO, but the robustness and the universality are
more superior.
Research on web performance optimization principles and models
Xin Wang
Show abstract
The Internet high speed development, causes Web the optimized question to be getting more and more prominent, therefore the Web performance optimizes into inevitably. the first principle of Web Performance Optimization is to understand, to know that income will have to pay, and return is diminishing; Simultaneously the probability will decrease Web the performance, and will start from the highest level to optimize obtained biggest. Web Technical models to improve the performance are: sharing costs, high-speed caching, profiles, parallel processing, simplified treatment. Based on this study, given the crucial Web performance optimization recommendations, which improve the performance of Web usage, accelerate the efficient use of Internet has an important significance.
Word frequency statistics by tree-structure algorithm research
Huanqin Li,
Shi-Tao Yan
Show abstract
English articles for obtaining statistics is very convenient, Because there are space between words , While due to the characteristics of Chinese word-formation, Chinese articles statistical is very difficult 。In the study on the basis of previous methods ,put forward a new kind of more keywords matching method-- Word frequency statistics by Treestructure algorithm。In implementing this algorithm based on its performance is analyzed,The result shows that this method can realize a scan statistics shows all words of information,Consumed time is greatly reduced.
Criteria for passivity of uncertain neural networks with time-varying delay
Xuyang Lou,
Huibin Zhu,
Baotong Cui
Show abstract
This paper deals with the delay-dependent passivity problem for neural networks with norm-bounded parameter uncertainties and time-varying delay. Some new delay-dependent criteria ensuring delayed neural networks to be passive are derived with the aid of the Leibniz-Newton formula. By exploiting free-weighting matrix (relaxation matrix) approach and an inequality technique, we essentially remove the requirement of Lipschitz condition on neuron activation functions and rigorous assumption on the derivative of the time-varying delay to be less than one.
An incremental algorithm based on rough set for concept hierarchy tree
Show abstract
In an open dynamic concept hierarchy tree of technological terms, universe keeps changing and then leads to changes in the system’s structure and size characteristics. This study presents an efficient incremental algorithm based on rough set for maintaining the concept hierarchy tree in dynamic datasets. While taking into account the relationship between the new terms and the original concept hierarchy tree, the paper focus on when the condition attributes is known and the decision attributes is unknown, how to add a new term into the original concept hierarchy tree. The paper proposes a novel algorithm which can be used for updating concept hierarchy tree dynamically and proves the rationality of the algorithm theoretically. The paper has furthermore proved its efficiency and reliability with an empirical study of the Micro-Electro-Mechanical System, MEMS.
Handheld three-dimensional pipe measurement system with a slit-ray projector
Show abstract
We propose a point cloud data acquisition system that employs slit ray projection. In this system, a slit laser projector and a high-resolution CCD camera are connected to a Microsoft Kinect Sensor. The system is sufficiently compact that it can be hand held. In measurements of pipes, the user directs the laser slit ray at the measurement target. Kinect then detects point cloud data while the CCD camera simultaneously detects the laser streak generated on the target surface. The user manually scans the system by directing the laser slit ray along the measurement pipe. The point cloud data obtained by Kinect is used to determine the movement of the system by adjusting overlapping data in consecutive frames using the ICP (Iterative Closest Point) algorithm. This permits the system to be freely scanned. The pipe cross section is estimated from data obtained by the slit-ray projection method. The three-dimensional shape of the pipe is constructed on a computer from the obtained cross sections.
A method of approximately reconstructing JPEG quantization table via saturated overflow
Show abstract
Header information is vital to decode and display a JPEG file. Therefore, it is necessary for head-missing JPEG fragment to estimate the header information. In this paper, a novel method is proposed to approximately reconstruct JPEG quantization tables. Based on the saturated overflow phenomenon introduced in the inverse DCT transform, the original quantization tables can be approximately rebuilt by our algorithm. The experimental results show that the estimated quantization tables can be used to normally display the image with no visual distorted. Experiments also prove that the method is more effective when the compression quality is high.
Vehicle recognition based on positive feature
Show abstract
The existing chief methods of vehicle recognition is introduced in this paper, a new approach is presented to solve
the shortcoming based on the actual situation of criminal technology. We first detect the edge with improved PCNN, and
then the four coefficients are designed to represent the feature image. Finally, a BP neural network is constructed to
classify the car types automatically. Expermiental results show that the proposed vehicle recognition is fast, simple and
effective.
Demonstration scheme for impulse response of various systems
Show abstract
In linear system theory impulse response of any system is of great significance. It is the impulse response which is
helpful in determining the convolution in continuous time system (unit sample response in Digital Signal Processing).
The impulse response of simple systems can be calculated from the system differential equation or from the transfer
function of the system (by taking the inverse Fourier Transform of transfer function). To the best of author’s knowledge
there exists no such scheme in the literature so far showing any practical method that can demonstrate the impulse
response of a system on the oscilloscope. In this paper the method of demonstrating the impulse response of any linear
system to the undergraduate students is presented. The approach is simple and is developed with minimum component
count.
Scalable distributed RDFS reasoning using MapReduce and Bigtable
Show abstract
The reasoning over massive RDF data has a great advancement in last few years. Many methods have been proposed in past several years, including the method with MapReduce. But the current MapReduce approach contains four reasoning steps and avoids data duplication by special data processing and partitioning. Our work is to propose an algorithm for RDFS reasoning with MapReduce and Bigtable. Through the optimization of RDFS rules’ applying sequence in map and reduce methods, our approach can complete RDFS closure reasoning without special data preprocessing and partitioning in only one MapReduce reasoning step. We have implemented our method on Hadoop and HBase with 3 nodes. We compute the RDFS closure over different datasets and our practice enjoys faster speed and better speedup, calculating RDFS closure of 260 million triples in 50 minutes, about 15 minutes faster than WebPIE.
The design and implementation of MPI master-slave parallel genetic algorithm
Shuping Liu,
Yanliu Cheng
Show abstract
In this paper, the MPI master-slave parallel genetic algorithm is implemented by analyzing the basic genetic algorithm and parallel MPI program, and building a Linux cluster. This algorithm is used for the test of maximum value problems (Rosen brocks function) .And we acquire the factors influencing the master-slave parallel genetic algorithm by deriving from the analysis of test data. The experimental data shows that the balanced hardware configuration and software design optimization can improve the performance of system in the complexity of the computing environment using the master-slave parallel genetic algorithms.
A web-based 3D geological information visualization system
Show abstract
Construction of 3D geological visualization system has attracted much more concern in GIS, computer modeling, simulation and visualization fields. It not only can effectively help geological interpretation and analysis work, but also can it can help leveling up geosciences professional education. In this paper, an applet-based method was introduced for developing a web-based 3D geological information visualization system. The main aims of this paper are to explore a rapid and low-cost development method for constructing a web-based 3D geological system. First, the borehole data stored in Excel spreadsheets was extracted and then stored in SQLSERVER database of a web server. Second, the JDBC data access component was utilized for providing the capability of access the database. Third, the user interface was implemented with applet component embedded in JSP page and the 3D viewing and querying functions were implemented with PickCanvas of Java3D. Last, the borehole data acquired from geological survey were used for test the system, and the test results has shown that related methods of this paper have a certain application values.
Research on phone contacts online status based on mobile cloud computing
Wen-jinga Wang,
Weib Ge
Show abstract
Because the limited ability of storage space, CPU processing on mobile phone, it is difficult to realize complex applications on mobile phones, but along with the development of cloud computing, we can place the computing and storage in the clouds, provide users with rich cloud services, helping users complete various function through the browser has become the trend for future mobile communication. This article is taking the mobile phone contacts online status as an example to analysis the development and application of mobile cloud computing.
Optimal control for a class of system
Show abstract
A class of system consists of the same creatures or the same model man-made machines, and the power consumption of this system only depends on the total efficiency and ideal power. The theorem of efficiency optimization of is proved for this system, and the optimal control method is given also.
The design and implementation of application level transparent firewall system based on NIC driver
Show abstract
On the analysis of the Intel 100 Mbps NIC driver, a scheme of implementing application level transparent firewall system using Intel 100 Mbps NIC driver was presented. Base on this scheme, the program can capture all network data packets through the NIC, analyze and process data according to the loaded rules and transmit packets. At the same time, this method can greatly improve the efficiency on depth analyzing network data in application-layer and rule matching.
Influence of secondary flow on aero-engine performance
Xiao-bo Zhang,
Zhan-xue Wang,
Zeng-wen Liu
Show abstract
In the actual design of turbofan engine with a high thrust-weight ratio, its secondary flow comes from the engine compression parts (fan or high pressure compressor), no matter the Fluidic Thrust Vector (FTV) nozzle is based on Shock Vectoring Controlling (SVC) or Throat Shift (TS). When the turbofan engine works in the state of thrust vector, regardless of the air bleeding from fan or high pressure compressor, the secondary flow have an impact on the components matching and engine performance. Therefore, the study of FTV technology in structurally fixed nozzle cannot just focus on a single nozzle, in the meantime, nozzle should be installed in the actual environment considering the synthesis of flow loss caused by bleed air (for example, bleed air from the compressor) and mixing of the main flow and secondary flow in the nozzle expansion section as well as effect on engine cycle and performance caused by the shockwave loss. Based on this consideration, this article proposes a component-based matching technique, which is applied via numerical simulation in the real environment. The main purpose of this article is research on the effect of FTV on the engine thermodynamic cycle and performance (thrust, fuel consumption and other parameters), considering the processes both air bleeds from fan/high pressure compressor, and it injects into the nozzle expansion section through the holes / slot.
Research on attainable moment subset of the control allocation system
Show abstract
The purpose of control allocation is to choose a configuration of the control effectors to meet a specified objective. Mathematically, the attainable moment subset (AMS) produced by control surfaces can be expressed as a mapping of the subset of constrained controls into the moment space. The determination of the AMS is very important to the solving of the allocation problem. For the two-dimensional allocation problem, a numerical algorithm is proposed to solve the AMS on-line. For the complex three-dimensional allocation problem, by analyzing its allocation characteristic, some comprehensive mathematic analyses are given to solve the three-dimension AMS. After that, an improved direct allocation algorithm based on the determination of AMS is proposed. Compared to the common direct allocation algorithm at fast speed, the improved algorithm can find the right facet which intersects with the desired moment and improves the real time performance of the allocation system well.
A new model for optimizing relief window size
Show abstract
Local relief is defined by the difference in height between the peaks of highest elevation and the valley bottoms in a region, which is scale dependent. The higher the altitude is, the larger the relief is. But each DEM data has only optimal relief window size, which just reflects the physical integrity of the landscape and has strong representation within a certain range. In this paper, we argue the optimum relief window size in Xunhua-Guide district, in the northeast Tibetan Plateau, which is 450m × 450m, and discuss the geomorphological characteristics of Xunhua-Guide district based on a high quality digital elevation model (DEM). The largest relief is localized along the plateau’s mountain rim, and mainly associated with active faults. It is characterized by low values of local relief which are related to sediment-floored flats and the deeply incised valleys prevailing in the low elevations and planation surface in the high elevations. Relief Window Size provides an effective means to obtain more accurate surface information and quantitative analysis of the terrain.
Development of automatic movement analysis system for a small laboratory animal using image processing
Show abstract
Activity analysis in a small laboratory animal is an effective procedure for various bioscience fields. The simplest way to obtain animal activity data is just observation and recording manually, even though this is labor intensive and rather subjective. In order to analyze animal movement automatically and objectivity, expensive equipment is usually needed. In the present study, we develop animal activity analysis system by means of a template matching method with video recorded movements in laboratory animal at a low cost.
Research and implement of remote vehicle monitoring and early-warning system based on GPS/GPRS
Shiwu Li,
Jingjing Tian,
Zhifa Yang,
et al.
Show abstract
Concerning the problem of road traffic safety, remote monitoring and early-warning of vehicle states was the key to prevent road traffic accidents and improve the transportation effectiveness. Through the embedded development technology, a remote vehicle monitoring and early-warning system was developed based on UNO2170 industrial computer of Advantech with WinCE operating system using Embedded Visual C++ (EVC), which combined with multisensor data acquisition technology, global positioning system (GPS) and general packet radio service (GPRS). It achieved the remote monitoring and early-warning of commercial vehicle. This system was installed in a CA1046L2 light truck. Through many road tests, test results showed that the system reacted rapidly for abnormal vehicle states and had stable performance.
Adaptive mean shift and particle filter tracking method based on joint feature
Show abstract
In the object tracking area, both particle filter and mean shift algorithm have proven successful approaches. However, both of them have notable weakness. In this paper, we present a new algorithm which combined the two algorithms to track the target. First, the mean shift algorithm is employed to search an object candidate near the target state. Then, if the candidate is good enough, it will be used to adapt the particle filter parameters, including the number of particle filter, and etc. Finally, the particle filter will estimate the target state based on these new parameters. Further, the paper introduces the color-texture combined feature instead of color feature.
Damage identification of simply supported bridge based on RBF neural network
Hanbing Liu,
Yubo Jiao
Show abstract
Efficient non-destructive damage detection procedures for bridge structures have become an important research topic. In this paper, the damage location is detected using modal shape curvature, while the damage severity is identified based on RBF neural network. A numerical example for a simply supported beam bridge with five girders is provided to verify the feasibility of the method. The contrast analysis between RBF and BP neural networks is conducted to confirm the superiority of RBF network.The results shown that the convergence speed of RBF is faster than BP, and the RBF network also possesses more favorable damage identification results.
Computational investigation of rocket based combined cycle
Xiao-bo Zhang,
Zhan-xue Wang,
Zeng-wen Liu
Show abstract
Based on Computational Fluid Dynamic technology, the mixing process of Rocket Based Combined Cycle (RBCC) propulsion system is researched. The idea of RBCC propulsion system means combining rocket engine with ramjet engine effectively, which can flight from sea level to high altitude in wide Mach ranges. In order to analyze how the length of the mixing part affects mixing process, different length of mixing part are researched. As it is indicated, with a constant Mach number, increasing the length of mixing part makes main flow and second flow mix more evenly. Moreover, the length of mixing part has a slight impact on the thrust. Obviously the main consequence of increasing the length of mixing part is promoting the mix of main flow and second flow. Therefore, in order to decrease the weight of aircraft, it is of importance to reduce the length. Through comparing distribution of different cases, when working in the situation of maximum power, the flow in the nozzle of rocket engine is under expansion, while that in the nozzle is fully expanded. Nevertheless, in the case of high altitude and high Mach number, there exists a vortex in the nozzle of rocket engine because of over expansion; meanwhile, the flow in the nozzle is under expansion. Therefore, it is necessary to adjust nozzle throat area in order to increase the thrust of RBCC at high altitude.
Intelligent control system of trajectory planning for a welding robot
YueHai Wang,
Ning Chi
Show abstract
Trajectory planning for the welding robot manipulator plays an important role at the intelligent control of industrial robot. The traditional robot welding method, which based on an antique welding process, was hard to control the robot intelligently. As a result, it can’t meet the industrial demand of high efficiency and low energy consumption well. This paper, based on the Denavit-Hartenberg theory and Hamilton circuit ideas, optimizes the welding robot's welding task from the system energy and time respectively. The ability of self-study on track programming for manipulator was effective of industrial demand. Robot welding chip verified that this control algorithm.
Comparing of several modified joint probabilistic data association algorithms
Show abstract
The Joint Probabilistic Data Association algorithm is one of the most widely used Data Association algorithm which can effectively finish multi-target tracking in clutter environment. But it will cause track coalescence phenomenon in parallel neighboring or small-angle crossing scene. For avoiding track coalescence, four modified Joint Probabilistic Data Association algorithms are introduced in this paper. Through Monte Carlo simulations, it is confirmed that these algorithms all can avoid this problem, but the tracking performances of these algorithms are different. So tracking performances of them in tracking precision, computation and anti-jamming ability are compared through simulation test, which can provide the basis for applying these new algorithms in practical.
Analytic criterion and algorithm for the lowest common ancestor of two neighboring nodes in a complete binary tree
Xingbo Wang,
Jun Zhou
Show abstract
Finding the lowest common ancestor (LCA) of two nodes in a binary tree has been focused both in graph theory and computer science. The paper puts forward and proves an analytic criterion for the LCA of two neighboring nodes in a complete binary tree. The criterion mainly concerns addition, subtraction and bitwise operations, needs no searching procedures and thus is easy to implement in software programming as well as hardware programming. An algorithm that has logarithmic time complexity is also presented with C-language implementation in the paper.
Research and design of logistical information system based on SOA
Show abstract
Through the study on the existing logistics information systems and SOA technology, based on the current situation of enterprise logistics management and business features, this paper puts forward a SOA-based logistics system design program. This program is made in the WCF framework, with the combination of SOA and the actual characteristics of logistics enterprises, is simple to realize, easy to operate, and has strong expansion characteristic, therefore has high practical value.
Automatic feature template generation for maximum entropy based intonational phrase break prediction
You Zhou
Show abstract
The prediction of intonational phrase (IP) breaks is important for both the naturalness and intelligibility of Text-to- Speech (TTS) systems. In this paper, we propose a maximum entropy (ME) model to predict IP breaks from unrestricted text, and evaluate various keyword selection approaches in different domains. Furthermore, we design a hierarchical clustering algorithm for automatic generation of feature templates, which minimizes the need for human supervision during ME model training. Results of comparative experiments show that, for the task of IP break prediction, ME model obviously outperforms classification and regression tree (CART), log-likelihood ratio is the best scoring measure of keyword selection, compared with manual templates, templates automatically generated by our approach greatly improves the F-score of ME based IP break prediction, and significantly reduces the size of ME model.
Research on allocation efficiency of the daisy chain allocation algorithm
Show abstract
With the improvement of the aircraft performance in reliability, maneuverability and survivability, the number of the control effectors increases a lot. How to distribute the three-axis moments into the control surfaces reasonably becomes an important problem. Daisy chain method is simple and easy to be carried out in the design of the allocation system. But it can not solve the allocation problem for entire attainable moment subset. For the lateral-directional allocation problem, the allocation efficiency of the daisy chain can be directly measured by the area of its subset of attainable moments. Because of the non-linear allocation characteristic, the subset of attainable moments of daisy-chain method is a complex non-convex polygon, and it is difficult to solve directly. By analyzing the two-dimensional allocation problems with a “micro-element” idea, a numerical calculation algorithm is proposed to compute the area of the non-convex polygon. In order to improve the allocation efficiency of the algorithm, a genetic algorithm with the allocation efficiency chosen as the fitness function is proposed to find the best pseudo-inverse matrix.
Research of improved banker algorithm
Show abstract
In the multi-process operating system, resource management strategy of system is a critical global issue, especially when many processes implicating for the limited resources, since unreasonable scheduling will cause dead lock. The most classical solution for dead lock question is the banker algorithm; however, it has its own deficiency and only can avoid dead lock occurring in a certain extent. This article aims at reducing unnecessary safety checking, and then uses the new allocation strategy to improve the banker algorithm. Through full analysis and example verification of the new allocation strategy, the results show the improved banker algorithm obtains substantial increase in performance.
Remote sensing image restoration with modulation transfer function compensation technology in-orbit
Show abstract
In order to improve the characteristic of light-duty of space optical remote sensors and the quality of remote sensing images. A novel means was designed. It is used for remote sensing image restoration in-orbit that based on the modulation transfer function compensation (MTFC). The principle of the modulation transfer function compensation in-orbit was given, and the control system in-orbit of the modulation transfer function compensation was designed. The modulation transfer function curve was obtained by direct measurement in laboratory. The remote sensing image restoration was realized by constrained least square filter. The indexes including mean, standard deviation, edge intensity and others are used to evaluate the quality of remote sensing image restoration. The results show that the evaluation indicators of the restored image are better than the original image, and the MTF at Nyquist frequency is increased to 0.1635 from 0.1501. It totally satisfies the requirement for real-time remote sensing image restoration in-orbit, and significantly improves the image quality.
A method of 3D CAD model retrieval based on feature adjacent graph
Show abstract
To reuse the 3D CAD model, a new method of 3D CAD model retrieval based on feature adjacent graph is proposed. First, a representation of feature adjacent graph for the CAD model is extracted by automatic identification-based and interactive identification-assisted. Next, the vertex product graph of the two CAD model’s feature adjacent graphs is constructed, and then the ant colony algorithm is employed to detect the maximum-cliques in the vertex product graph. At last, the similarity of the models is calculated by comparing the maximum-cliques. Experimental results show that this method can realize the 3D CAD model retrieval and its efficiency meets the requirements of applications.
Digital speech enhancement based on DTOMP and adaptive quantile
Show abstract
Compressed Sensing (CS) that can effectively extract the information contained in the signal is a new sampling theory based on signal sparseness. This paper applies CS theory in digital speech signal enhancement processing, proposes an adaptive quantile method for the noise power estimation and combines the improved double-threshold orthogonal matching pursuit algorithm for speech reconstruction, then achieves speech enhancement processing. Compared with the simulation results of the spectral subtraction and the subspace algorithm, the experiment results verify the feasibility and effectiveness of the algorithm proposed in this paper applied to speech enhancement processing.
3D gaze estimation based on facial feature tracking
Show abstract
A 3D gaze estimation and tracking algorithm based on facial feature tracking is presented in this paper. Firstly, we used the Active Shape Model (ASM) to extract facial feature points with a stereo camera. Then, the full 3D pose of head is estimated by comparing the feature points of current pose with initial head pose. After that, the center of eyeball is obtained based on a 3D eye model which is related to head pose and the middle point of eye corners. Thereby, optical axis was computed as 3D vectors through the center of eyeball to the center of pupil. Finally, visual axis was gotten by adding an angle to optical axis. Here, in our system, a one-time personal calibration is used to determine this angle. The experimental results show the accuracy of our gaze tracking system achieves less than 3 degree.
An approach for images with low-frequency noise denoising via pre-emphasis and high-pass filter
Qi Zhang,
Shaobo Ma,
Li Cao
Show abstract
Wavelet-based denoising methods have been successfully applied in processing images with high-frequency noise, such as salt noise, Gausian noise, Poisson noise, etc. However, it is less effective when processing images with low-frequency noise. Seemingly, we can consider using high-pass filter directly to remove the low-frequency noise, but it turns out that when the noise is removed, the useful low-frequency information is also weakened during the process. In this paper, we proposed a new approach to denoise the images with low-frequency noise via pre-emphasis and high-pass filtration. Thereby we removed the low-frequency noise effectively without losing useful low-frequency information. The approach can be well applied in decreasing the interference of low-frequency noise in image transmission.
An improved method for network congestion control
Show abstract
The rapid progress of the wireless network technology has great convenience on the people’s life and work.
However, because of its openness, the mobility of the terminal and the changing topology, the wireless network is more
susceptible to security attacks. Authentication and key agreement is the base of the network security. The authentication
and key agreement mechanism can prevent the unauthorized user from accessing the network, resist malicious network
to deceive the lawful user, encrypt the session data by using the exchange key and provide the identification of the data
origination. Based on characteristics of the wireless network, this paper proposed a key agreement protocol for wireless
network. The authentication of protocol is based on Elliptic Curve Cryptosystems and Diffie-Hellman.
Accurate depth estimation for image defogging using Markov random field
Show abstract
This paper presents an automatic method for the defogging process from a single haze image. To recover a foggy image, an accurate depth map is estimated from a multi-level estimation method, which fuses depth maps with different sizes of patches by dark channel prior. Markov random field (MRF) is applied to label the depth level in adjacent region for the compensation of wrong estimated regions. The accurate estimation of scene depth provides good restoration with respect to visibility and contrast but without oversaturating. The algorithm is verified by a handful of foggy and hazy images. Experimental results demonstrate that the defogging method can recover high-quality images through accurate estimation of depth map.
Automatic image enhancement by artificial bee colony algorithm
Adiljan Yimit,
Yoshihiro Hagihara,
Tasuku Miyoshi,
et al.
Show abstract
With regard to the improvement of image quality, image enhancement is an important process to assist human with better perception. This paper presents an automatic image enhancement method based on Artificial Bee Colony (ABC) algorithm. In this method, ABC algorithm is applied to find the optimum parameters of a transformation function, which is used in the enhancement by utilizing the local and global information of the image. In order to solve the optimization problem by ABC algorithm, an objective criterion in terms of the entropy and edge information is introduced to measure the image quality to make the enhancement as an automatic process. Several images are utilized in experiments to make a comparison with other enhancement methods, which are genetic algorithm-based and particle swarm optimization algorithm-based image enhancement methods.
A speaker change detection method based on coarse searching
Show abstract
The conventional speaker change detection (SCD) method using Bayesian Information Criterion (BIC) has been widely used. However, its performance relies on the choice of penalty factor and suffers from mass calculation. The twostep SCD is less time consuming but generates more detection errors. The limitation of conventional method’s performance originates from the two adjacent data windows. We propose a strategy that inserts an interval between the two adjacent fixed-size data windows in each analysis window. The dissimilarity value between the data windows is regarded as the probability of a speaker identity change within the interval area. Then this analysis window is slid along the audio by a large step to locate the areas where speaker change points may appear. Afterwards we only focus on these areas and locate precisely where the change points are. Other areas where a speaker change point unlikely appears are abandoned. The proposed method is computationally efficient and more robust to noise and penalty factor compared with conventional method. Evaluated on the corpus of China Central Television (CCTV) news, the proposed method obtains 74.18% reduction in calculation time and 22.24% improvement in F1-measure compared with the conventional approach.
Research on model of combining multiple neural networks by fuzzy integral-MNNF
Show abstract
The method of multiple neural network Fusion using Fuzzy Integral (MNNF) presented by this paper is to improve the detection performance of data mining-based intrusion detection system. The basic idea of MNNF is to mine on distinct feature training dataset by neural networks separately, and detect TCP/IP data by different neural networks, and then nonlinearly combine the results from multiple neural networks by fuzzy integral. The experiment results show that this technique is superior to single neural networks for intrusion detection in terms of classification accuracy. Compared with other combination methods such as Majority, Average, Borda count, fuzzy integral is better than one of them.
Asymptotic property of dual frames of a wavelet frame yielded by several refinable functions
Xiaojun Cao,
Jincang Han
Show abstract
Wavelet tight frames have attracted more and more attention. In this paper, we show that there exist wavelet frames generated by two functions which have good dual wavelet frames, but for which the standard dual wavelet frame does not consist of wavelets. That is to say, the standard dual wavelet frame cannot be generated by the translations and dilations of a single function.
Floorplanning with boundary constraints by using AE-TCG
YiMing Li,
MingTian Zhou,
Yi Li
Show abstract
It is practical and crucial that a designer will want to control the positions of some modules along the chip boundary in the final packing for I/O connection. To solve the problem we propose an algorithm named Area Estimate Transitive Closure Graphs (AE-TCG). By analyzing the feasible condition of boundary constraints, AE-TCG guarantees that the result of each perturbation is a feasible placement with boundary constraints, and doesn’t need to transform the infeasible solution to feasible one. Unlike most of the previous algorithms getting the target area after packing, AE-TCG can satisfy the boundary constraints and estimate the area of feasible placement without packing after random perturbation, then accept the beneficial perturbation. For the property of concentrate itself, AE-TCG is running without Simulated Annealing (SA) process. The experimental results show that AE-TCG is effective and efficient than other algorithms with boundary constraints in commonly used MCNC benchmark circuits.
Camera motion estimation using normal flows
Show abstract
An autonomous system must have the capability of estimating or controlling its own motion parameters. There already exit tens of research work to fulfill the task. However, most of them are based on the motion correspondences establishment or full optical flows estimation. The above solutions put restrictions on the scene: either there must be presence of enough distinct features, or there must be dense texture. Different from the traditional works, utilizing no motion correspondences or epipolar geometry, we start from the normal flow data, ensure good use of every piece of them because they could only be sparsely available. We apply the spherical image model to avoid the ambiguity in describing the camera motion. Since each normal flow gives a locus for the location of the camera motion, the intersection of such loci offered by different data points will narrow the possibilities of the camera motion and even pinpoint it. A voting scheme in φ-θ domain is applied to simplify the 3D voting space to a 2D voting space. We tested the algorithms introduced above by using both synthetic image data and real image sequences. Experimental results are shown to illustrate the potential of the methods.
Research and implementation on transaction process model of web service
Li Yi,
Yufang Qiu,
Yuebin Wang
Show abstract
The transaction processing as one of the key techniques of web services, decides whether web services can be adopted broadly by the enterprise. Therefore, transaction technologies for web services have to provide the abilities to coordinate short-lived and long-lived transactions. This paper improves a Web Services Transaction Model (WSTM), which can handle Atomic transaction and Cohesion transaction simultaneously, and transaction compensation. Finally, the prototype model is implemented and the experimental result shows that the model works well.
A hybrid approach for intrusion-detection based on fuzzy GNP and probabilistic classification
Show abstract
An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. Intrusion detection systems, which can effectively detect intrusion accesses, have attracted attention. Our work describes a novel fuzzy genetic network programming (GNP) and probabilistic classification for detecting network intrusions.Proposed method can be flexibly applied to both misuse and anomaly detection in network-intrusion-detection problems.Examples and experimental results using intrusion detection datasets DARPA99 from MIT Lincoln Laboratory demonstrate the potential of the approach.
The non-independence discussion about cycle structure in the computer language: the final simplification of computer language in the structural design
Show abstract
In the first place, the article discusses the theory, content, development, and questions about structured programming
design. The further extension on this basement provides the cycle structure in computer language is the sequence
structure, branch structure, and the cycle structure with independence. Through the deeply research by the writer, we find
the non-independence and reach the final simplification about the computer language design. In the first, the writer
provides the language structure of linear structure (I structure) and curvilinear structure (Y structure). This makes the
computer language has high proficiency with simplification during the program exploration. The research in this article
is corresponding with the widely used dualistic structure in the computer field. Moreover, it is greatly promote the
evolution of computer language.
A CORDIC based FFT processor for MIMO channel emulator
Yanwei Xiong,
Jianhua Zhang,
Ping Zhang
Show abstract
With the advent of Multi Input Multi Output (MIMO) systems, the system performance is highly dependent on the accurate representation of the channel condition that causes the wireless channel emulation to become increasingly important. The conventional Finite Impulse Response (FIR) based emulator has a high real-time but the complexity rapidly becomes impractical for larger array sizes. However, the frequency domain approach can avoid this problem and reduce the complexity for higher order arrays. The complexity comparison between in time domain and in frequency domain is made in this paper. The Fast Fourier Transform (FFT) as an important component of signal processing in frequency domain is briefly introduced and an FGPA system architecture based on CORDIC algorithm is proposed. The full design is implemented in Xilinx’s Virtex-5.
Blind parameters estimation of co-channel multiple signals based on power spectral density difference
Show abstract
A blind parameters estimation algorithm based on forward difference of power spectral density is presented to solve the problems in co-channel multiple signals processing. The proposed algorithm can fast and accurately estimate such parameters as number of signals, center frequency, signal power, noise power and signal to noise ratio of the mixed signals. Both theoretical analysis and simulation results show that the algorithm is effective.
Faster multiplier and squaring units for evaluation of powers and monomials: a hardware approach
Show abstract
In processors, especially DSPs, the most recurring operations are those that involve exponents and monomials. In this paper, the use of a multiplier and squaring technique based on Vedic mathematics is suggested. Algorithms for calculation of monomials and exponents that make use of the described hardware are also stated.
A novel adaptive 3D medical image interpolation method based on shape
Show abstract
Image interpolation of cross-sections is one of the key steps of medical visualization. Aiming at the problem of fuzzy boundaries and large amount of calculation, which are brought by the traditional interpolation, a novel adaptive 3-D medical image interpolation method is proposed in this paper. Firstly, the contour is obtained by the edge interpolation, and the corresponding points are found according to the relation of the contour and points on the original images. Secondly, this algorithm utilizes volume relativity to get the best point-pair with the adaptive methods. Finally, the grey value of interpolation pixel is got by the matching point interpolation. The experimental results show that the method presented in the paper not only can meet the requirements of interpolation accuracy, but also can be used effectively in medical image 3D reconstruction.
Image analysis using radial bi-Krawtchouk moments
Bo Li,
Bo Fu
Show abstract
Radial discrete orthogonal moments are often used in characterizing image shapes for applications in pattern recognition and image analysis for their good properties. In this paper, a new set of radial Krawtchouk moments is presented. Compared with classical radial discrete moments, the proposed moments take a new sampling method, which uses variational number of sampling point for different radius. In addition, a new discrete orthogonal vector set is constructed by making the discrete Krawtchouk polynomials orthogonal in radial direction to the discrete Krawtchouk polynomials orthogonal in circumferential direction. Experimental results show that the proposed moments have good performance in image reconstruction and computing efficiency.
Analytical solution and modulation of time periodic parameter for dynamic systems
Yuanzi Zhou,
Yanzhong Wang
Show abstract
Pseudo closed form complete solution for nonlinear dynamical systems subjected to inhomogeneous generalized forcing using state transition matrices was developed, based on the Fourier expansion of periodic matrices and substitution of matrix exponential terms via Lagrange-Sylvester theorem. With a prescribed frequency spectrum, a jump modulation procedure was employed to avoid the aliasing effect when constructing approximation for equivalent stairstep stiffness function, yielding the appropriate constant value over each subinterval. A Hill-Messiner type of two degree-of-freedom system was presented afterwards to demonstrate methods for the forced response and the procedure for the modulation of time periodic parameter. The obtained results are presented and discussed.
Recognition and inference of crevice processing on digitized paintings
Show abstract
This paper is designed to detect and removal of cracks on digitized paintings. The cracks are detected by threshold. Afterwards, the thin dark brush strokes which have been misidentified as cracks are removed using Median radial basis function neural network on hue and saturation data, Semi-automatic procedure based on region growing. Finally, crack is filled using wiener filter. The paper is well designed in such a way that most of the cracks on digitized paintings have identified and removed. The paper % of betterment is 90%. This paper helps us to perform not only on digitized paintings but also the medical images and bmp images. This paper is implemented by Mat Lab.
Geological occurrence response to trace elemental migration in coal liquefaction based on SPSS: take no. 11 coalbed in Antaibao mine for example
Show abstract
Coal liquefaction is an adoptable method to transfer the solid fossil energy into liquid oil in large scale, but the dirty material in which will migrate to different step of liquefaction. The migration rule of some trace elements is response to the react activity of macerals in coal and the geological occurrence of the element nature of itself. In this paper, from the SPSS data correlation analysis and hierarchical clustering dendrogram about the trace elements with macerals respond to coal liquefaction yield, it shows the trace elements in No.11 Antaibao coal seam originated from some of lithophile and sulphophle elements. Correlation coefficient between liquefaction yield of three organic macerals and migration of the elements in liquefaction residue indicated that the lithophile are easy to transfer to residue, while sulphophle are apt to in the liquid products. The activated macerals are response to sulphophle trace elements. The conclusion is useful to the coal blending and environmental effects on coal direct liquefaction.
The aeronautics face-gear NC hobbing machining technology
Canhui Wu,
Yanzhong Wang
Show abstract
Face-gear drives become the main direction of research for aeronautical drives because of their special advantages. Face-gear machining problems have became to baffle the embedded research for face-gear. The basal coordinate systems of face-gear hobbing were setted up according to the face-gear hobbing theory. The hobbing surface equation of facegear was established by using the equation of pinion tooth surface and matrix for coordinate transform based on the gear geometry and applied theory, then the hobbing tooth surface constrain conditions for dedendum undercutting were analyzed, at the same time, the hobbing nodal points were used to construct the three-dimensional basal worm model of face-gear hob by recurring to the three-dimensional software. Furthermore, the special hob for face-gear machining was designed and manufactured. The exact assembly and machining simulation were finished by using the program development software VC++6.0 and the UG customization function in the light of the face-gear hobbing theory. It validates the hob correctness and gets the gear hobbing program. According to the result of machining simulation, facegear numerical control(NC) hob machining was realized in the four-axis NC machine tool. It improves the cutting efficiency and establishs the base for face-gear grinding.
Application of nanometer material in ultraviolet prevention thin film
Aihong Guo,
Xuejiao Tang
Show abstract
To mankind, ultraviolet ray from the sun is harmful and beneficial. But, in daily life, a lot of occasions, we hope to block the ultraviolet ray. Some people studied the nanometer particles which can block Ultraviolet ray. In this paper, the protection performance of nanometer particles, prapared by sol-gel method, added into polypropylene sour to ultraviolet has been studied. In order to improve the ultraviolet blocking of the thin film, more than one kind of nanometer particles are added into the polypropylene sour, the protection performance of the thin film is strengthened. When the ratio of the volume of 2% nanometer Al2O3 sol to the volume of 3% nanometer Fe2O3 sol is 1:3, the shielding effect on the ultraviolet including UVC, UVB and UVA band is significant. When the ratio of the volume of 2% nanometer Al2O3 sol to the volume of 2% nanometer Y2O3 sol is 1:3, the shielding effect on the UVC is the best. When the ratio of the volume of 2% nanometer Al2O3 sol to the volume of 1% nanometer ZnO sol is 1:2, the shielding effect on the UVC is the best. When the ratio of the volume of 3% nanometer Fe2O3 sol to the volume of 1% nanometer ZnO sol is 1:1, the shielding effect on the UVC is the best. To UVB and UVA, the shielding effect of 3% nanometer Fe2O3 single component is the best.When the ratio of the volume of 3% nanometer Fe2O3 sol to the volume of 2% nanometer Y2O3 sol is 1:2, the shielding effect on the UVC is the best. To UVB and UVA, the shielding effect of 3% nanometer Fe2O3 single component is the best.When the ratio of the volume of 1% nanometer ZnO sol to the volume of 2% nanometer Y2O3 sol is 1:2, the shielding effect on the ultraviolet including UVC, UVB and UVA band is significant.
Design and implementation of web service-based mobile reply testing management system
Show abstract
This paper introduces the design and implementation of a reply testing management system that based-on C#, Web
Service and ASP .Net. With the system, teachers can manage reply site through Windows Mobile, judges can grade onscene
by visiting WAP site through GPRS. Then this paper discusses details of the implementation and key technologies
of the system.
Research on unrepeated and ultra-long span transmission technologies in communication network based on SDH
Rong Shan,
Guojun Zhang
Show abstract
The paper briefly introduces the limiting factors of ultra-long span and unrepeated for optical transmission system, Which are fiber of loss, dispersion, nonlinear. Introduces the current status of technology development in international. Then proposes some solutions ,including Raman Fiber Amplifier and technology of FEC. Finally, it puts forward the scheme of 2.5G/bit unrepeated and ultra-long span transmission based on SDH. The scheme adopts mature technique, uses devices easily available, therefore has high ratio of quality over price.
An improved Gaussian mixture model
Dayong Gong,
Zhihua Wang
Show abstract
An improved Gaussian mixture model is presented to substitute the typical method of Chris Stauffer which revealed its weakness in uncontrollability of the background constructing course and foreground mergence time as well as invalidation to the low duty background. By setting appropriate time parameters which meet the monitoring needs, the improved method effectively controls the estimates updating process of each background in Gaussian mixture model via layered attenuating the estimates and intensifying the recurrence events while requires almost the same computation. The simulation of traffic monitoring videos indicates that: this model has no scraps of provisionally staying objects, efficaciously picks up the low duty background.
Multi-sensor image automatic registration using mutual information
Jing Jiang,
Xuesong Zhang
Show abstract
A novel multi-sensor image registration algorithm was introduced, which was based on wavelet transform and the maximization of mutual information. Firstly, the region of interest was determined by search of wavelet magnitude maxima in the preprocessing step of images, and the affine transform was chosen as the image transform model. Secondly, the probability distribution of grey value was estimated by interpolation of pixel values to calculate image intensity histogram. Finally, the simulated annealing algorithm was used to approximate the global optimum. The experiment data show that the algorithm was effective and feasible.
New method for assessing risks of email
Show abstract
E-mail technology, has become one of the requirements of human lives for correspondence between individuals. Given this, the important point is that the messages, server and client of e-mail and correspondences that exchanged between different people have acceptable security, to make people sure to use of this technology. In the information age, many of financial and non financial transactions are done electronically, data exchange takes place via the internet and theft and manipulation of data can make exorbitant cost in terms of integrity, financial, political, economic and culture. E-mail correspondence in there is same and it is very important. With review took place, a method that will focus on email system for risks assessment is not provided. We are examining ways of assessing for other systems and their strengths and weaknesses, then we use Mr Convery method for assessing email risks which it is for assessing network risks. At the end of paper we have offered special table for email risk assessment.
Research on a three-systems framework of carrying capacity evolution
Min Li,
Jing Chen
Show abstract
Carrying capacity research is one of the most appealing topics as well as a theoretical frontier in modern ecology. Based on an overall review of the studies of carrying capacity, the paper surveyed the evolution and development process of the carrying capacity concepts and a framework including three systems (natural ecosystem; human ecosystem; socio-economic activity system) are presented. This framework shows clearly the evolution process of the concept of carrying capacity and this work reveals the relations, similarities and differences of all of the carrying capacity concepts.
Target classification algorithm based on feature aided tracking
Show abstract
An effective target classification algorithm based on feature aided tracking (FAT) is proposed, using the length of target (target extent) as the classification information. To implement the algorithm, the Rao-Blackwellised unscented Kalman filter (RBUKF) is used to jointly estimate the kinematic state and target extent; meanwhile the joint probability data association (JPDA) algorithm is exploited to implement multi-target data association aided by target down-range extent. Simulation results under different condition show the presented algorithm is both accurate and robust, and it is suitable for the application of near spaced targets tracking and classification under the environment of dense clutters.
Application of flywheel battery in mobile power station
Xinggui Wang,
Bing Zhang,
Xiaoying Li,
et al.
Show abstract
The flywheel battery is used to the mobile station for continuous power supply, once the commercial power or other independent power supply is outage or failure, the flywheel battery will provide uninterrupted power supply during the switch to the commercial power and the diesel generator sets, ensuring the power supply system is continuous and maintaining the performance and parameters of the power supply which will not influence or discontinuous change because of commercial power failure. Simulation results show that the flywheel battery used to the mobile station can effectively improve the performance of the mobile power station system.
Designation of rapid detection system for chlorophyll fluorescence parameters based on LED irradiation
Zhengming Li,
Jianwei Ji,
Minghu Xu
Show abstract
Adopting high-power light-emitting diode (LED) as excitation light source, the study designed a rapid detection system for fluorescence parameters based on MINIPAM. The system uses a microcomputer as the core of the programmable power supply to provide constant current drive of the LED array, and the LED array as a fluorescence excitation light source produces light photochemical system needed. It also uses MINIPAM to detect the fluorescence, analyzing the fluorescence parameters of the mathematical model, studying the plant photosystemⅡ light response curve. The System is of great significance in the evaluation of chlorophyll photosynthesis ability and the plant physiological stress response and the appropriate mechanism.
Circular array radar technical and applications
Chengfa Xu,
Chonghui Wang,
Yongbin Hong
Show abstract
A new type circular array radar is introduced in this paper. First, the working theory of this radar is introduced, as well as the signal processing method. The characteristics and advancements of this type of radar are detailed analyzed, and the key technology of the circular array radar is proposed. Second, two applications of circular array radar are introduced; they are VHF circular array long-range surveillance radar and L band mini circular array radar. Finally, the potential prospect of this circular array radar is proposed.
Recognition of chatter type based on improved neural network
Xiaozheng Xie,
Yongpeng Xie,
Rongzhen Zhao,
et al.
Show abstract
By studying chatter dynamic model, this paper discusses chatter phenomenon between metal cutting tool and workpiece during the cutting. From the point of energy, phase position difference of chatter mark, phase position difference of vibration mode, lagging phase position angle and change rate about cutting force relative to the cutting speed are respectively determined as characteristic parameter of regenerative, coupling vibration, lagging and fricative mode of chatter. With the four input parameters, multilayer feed forward neural network learning algorithm is used to diagnose the type of cutting chatter, and experiments show that this method is effective.It is essential to take appropriate measures on vibration suppression.
The optimal design of service level agreement in IAAS based on BDIM
Show abstract
Cloud Computing has become more and more prevalent over the past few years, and we have seen the importance of
Infrastructure-as-a-service (IaaS). This kind of service enables scaling of bandwidth, memory, computing power and
storage. But the SLA in IaaS also faces complexity and variety. Users also consider the business of the service. To meet
the most users requirements, a methodology for designing optimal SLA in IaaS from the business perspectives is
proposed. This method is different from the conventional SLA design method, It not only focuses on service provider
perspective, also from the customer to carry on the design. This methodology better captures the linkage between service
provider and service client by considering minimizing the business loss originated from performance degradation and IT
infrastructure failures and maximizing profits for service provider and clients. An optimal design in an IaaS model is
provided and an example are analyzed to show this approach obtain higher profit.
Research of trust model in p2p network based on trusted computing
Show abstract
In order to strengthen the security of P2P networks, it is necessary to build trust relationships between nodes of
networks. However, the traditional trust evaluation models can't resist the attacks of Pseudospoofing and Pseudostheft
effectively. To resolve the problems, in this paper, the trusted computing method is introduced into P2P networks, and an
idea of group trust model based on trusted computing methods is proposed. In the process of trust evaluation, the model
can realize the anonymous attestation of the node body, which improves the creditability of trust relationships between
nodes and resolves the security problems of P2P networks.
The study of water supply network optimization based on the immune mechanism of ant colony algorithm
Zongjiang Wang
Show abstract
For ant colony algorithm to search for a long time, easy to occur Stagnant phenomenon and sink into local most superior defects, and puts forward a kind of immune mechanism of the ant colony algorithm, and the algorithm is applied to typical water supply network in the combinatorial optimization problem. Combined with water supply network for example problem using respectively based on immune mechanisms of the ant colony algorithm and genetic algorithm and the basic ant colony algorithm for example to analysis. The results show that the improved algorithm is easier to realize the global optimal solution, and high efficiency, the optimization algorithm is better than other traditional optimization for solving water distribution network ability. So demonstrate the effectiveness of the algorithm.
Towards a parameterless 3D mesh segmentation
Show abstract
This paper proposes a novel technique for 3D mesh segmentation using multiple 2D pose footprints. Such a problem has been targeted many times in the literature, but still requires further development especially in the area of automation. The proposed algorithm applies cognition theory and provides a generic technique to form a 3D bounding contour from a seed vertex on the 3D mesh. Forming the cutlines is done in both 2D and 3D spaces to enrich the available information for the search processes. The main advantage of this technique is the possibility to operate without any object-dependent parameters. The parameters that can be used will only be related to the used cognition theory and the seeds suggestion, which is another advantage as the algorithm can be generic to more than one theory of segmentation or to different criterion. The results are competitive against other algorithms, which use object-dependent or tuning parameters. This plus the autonomy and generality features, provides an efficient and usable approach for segmenting 3D meshes and at the same time to reduce the computation load.
Improved ant colony algorithm and its simulation study
Zongjiang Wang
Show abstract
Ant colony algorithm is development a new heuristic algorithm through simulation ant foraging. For its convergence rate slow, easy to fall into local optimal solution proposed for the adjustment of key parameters, pheromone update to improve the way and through the issue of TSP experiments, results showed that the improved algorithm has better overall search capabilities and demonstrated the feasibility and effectiveness of this method.
DSP code optimization based on cache
Chengfa Xu,
Chengcheng Li,
Bin Tang
Show abstract
DSP program‟s running efficiency on board is often lower than which via the software simulation during the program development, which is mainly resulted from the user‟s improper use and incomplete understanding of the cache-based memory. This paper took the TI TMS320C6455 DSP as an example, analyzed its two-level internal cache, and summarized the methods of code optimization. Processor can achieve its best performance when using these code optimization methods. At last, a specific algorithm application in radar signal processing is proposed. Experiment result shows that these optimization are efficient.
Adaptive SVM fusion for robust multi-biometrics verification with missing data
Xiuna Zhai,
Yan Zhao,
Jingyan Wang,
et al.
Show abstract
Conventional multimodal biometrics systems usually do not account for missing data (missing modalities or incomplete score lists) that is commonly encountered in real applications. The presence of missing data in multimodal biometric systems can be inconvenient to the client, as the system will reject the submitted biometric data and request for another trial. In such cases, robust multimodal biometric verification is needed. In this paper, we present the criteria, fusion method and performance metrics of a robust multimodal biometrics verification system that verifies the client’s identity at any condition of data missing. A novel adaptive SVM classification method is proposed for missing dimensional values, which can handle the missing data in multimodal biometrics. We show that robust multibiometrics imposes additional requirements on multimodal fusion when compared to conventional multibiometrics. We also argue that the usual performance metrics of false accept and false reject rates are insufficient yardsticks for robust verification and propose new metrics against which we benchmark our system.
Temperature control system of resistance-heated furnace based on variable fuzzy-PI control
Dequan Shi,
Guili Gao,
Zhiwei Gao,
et al.
Show abstract
In order to solve the problem that resistance-heated furnace has the disadvantage of non-linearity, slow time-variant and large delay and so on, a temperature control system of the resistance-heated furnace has been designed according to the fuzzy-PI algorithm. Because this method has the merits of both PI and fuzzy control, the temperature control effect is improved to large extent. When the temperature error between given value and measured value is too large, the fuzzy control is adopted. When the error is too small, the PI control is used. The simulation test is performed by MATLAB, and the results indicate that this system has the advantages of small overshoot, short adjusting time and good robustness.
Anti-noise performance of correlation detection method for ranging system based on combined modulation
Show abstract
A kind of signal processing method of the correlation detection is presented for the radio ranging system combined pseudo-random code binary-phase modulation with linear frequency modulation. The autocorrelation function of the ranging system is deduced. Especially, the anti-noise performance of this method is analyzed and simulated. The simulation result is consonant with the calculation value. The results show that the correlation detection method for the ranging system has strong anti-noise capability.
A model driven testing environment for embedded software
Shunkun Yang,
Jianping Fu
Show abstract
This paper presents a hardware-in-loop (HIL) real-time simulation environment for embedded software testing,
namely the Embedded Software Simulation Test Environment (ESSTE). We give a detailed description of methods,
architecture and critical components of ESSTE. For validation purposes, the proposed real-time HIL testing approach
and ESSTE is applied in experiments and some application examples. Experiment results show that the test environment
employed in this paper can be applied to systems in practice. And different domain of applications approved that the
proposed ESSTE can go far forward to improve the reliability and quality of the embedded software.
Time selection for ISAR imaging based on time-frequency analysis
Rui Li,
Jiang Tao,
Wang De Shi
Show abstract
Because of target’s complicated movement, conventional ISAR imaging algorithm can not meet the demands of maneuvering target imaging. On the basis of analyzing the phase model of target scatterer, a new time selection method for maneuvering target imaging is proposed. Based on adaptive optimal kernel (AOK) time-frequency representation, instantaneous Doppler frequencies of echoes in range bins are estimated. According to the estimated Doppler frequencies, imaging time can be selected. Raw radar data verify the effectiveness of the proposed method.
Research of MPPT for photovoltaic generation based on two-dimensional cloud model
Shuping Liu,
Wei Fan
Show abstract
The cloud model is a mathematical representation to fuzziness and randomness in linguistic concepts. It represents a qualitative concept with expected value Ex, entropy En and hyper entropy He, and integrates the fuzziness and randomness of a linguistic concept in a unified way. This model is a new method for transformation between qualitative and quantitative in the knowledge. This paper is introduced MPPT (maximum power point tracking, MPPT) controller based two- dimensional cloud model through analysis of auto-optimization MPPT control of photovoltaic power system and combining theory of cloud model. Simulation result shows that the cloud controller is simple and easy, directly perceived through the senses, and has strong robustness, better control performance.
An intelligent monitoring system of soft ground stratified settlement
Yunjie Zhang,
Lei Bao,
Yanzhou Feng
Show abstract
Stratified Settlement observation is one of the most important technologies for soft ground treatment. However, there are some problems with the traditional stratified settlement instruments which are used widely nowadays. These problems include low automaticity, low reliability, belated data and low precision measurement. In order to resolve the problems above mentioned, a remote intelligent monitoring and analysis system is developed combined with embedded technology, advanced sensor technology and communication technology. The system can realize remote real-time data analyzing and processing, which is composed by a monitoring center and some remote monitoring terminals. The principle of the system, the design of the main peripheral interface and the frame of software design are introduced. Experimental results demonstrate the validity of the proposed system.
An algorithm of airborne dual-channel curvilinear SAR ground moving target indication
Hongyin Shi,
Xiuhua Guo,
Zhitao Hou
Show abstract
Traditional dual-channel Synthetic Aperture Radar (SAR) system can detect moving targets, but it can not estimate the location and velocity of moving target. To solve this problem, a method of dual-channel Curvilinear SAR (CSAR) system is presented. From the spatial geometry model and echo signal of the system, the theory of clutter suppression, moving target detection and parameter estimation is derived in detail. Finally, computer simulation results validate its effectiveness.
The strategy research and method realization for the computer network flow control
Jian-qing Du
Show abstract
FARIMA (p, d, q) model fitting the real network traffic and the input of noise is viewed as the non-controllable input in this paper. The differential operator embodies the long and short correlation of self-similar correlation. However, the order is too high because it’s difficult to control, this paper uses Pade reduced-order algorithm to reduce order. And then the reduced expression is converted into noise terms with the use of minimum variance control to eliminate the uncontrollable input caused by the impact of the system output error, making the system output (queue length) stable in the vicinity of thresholds. Finally, the feasibility and stability of the system is applicability on the minimum variance control algorithm through analyzing the theory that is self-similar network traffic control, but there are some differences in the theory.
The research of security and real-time based on the control information network
Xiao-hui Su,
Shu-Ping Xu
Show abstract
Aiming at the security issues, the construction of the remote motor control server based on the Web is studied, the scheme of two server programs based on the virtual server technology is proposed. The safety and application occasion of the scheme are described respectively, and the encryption algorithm which Improve certification accuracy is proposed. Aiming at the real-time problem, a new control method is proposed, which is based on neural network predictive control to solve the existing closed-loop network control system random delay. The experiment verification and system simulated are completed. These methods provide a new way to integrate the control network and information network, and to lay a solid foundation for the development of the control network.
Accelerated Gaussian mixture model and its application on image segmentation
Jianhui Zhao,
Yuanyuan Zhang,
Yihua Ding,
et al.
Show abstract
Gaussian mixture model (GMM) has been widely used for image segmentation in recent years due to its superior adaptability and simplicity of implementation. However, traditional GMM has the disadvantage of high computational complexity. In this paper an accelerated GMM is designed, for which the following approaches are adopted: establish the lookup table for Gaussian probability matrix to avoid the repetitive probability calculations on all pixels, employ the blocking detection method on each block of pixels to further decrease the complexity, change the structure of lookup table from 3D to 1D with more simple data type to reduce the space requirement. The accelerated GMM is applied on image segmentation with the help of OTSU method to decide the threshold value automatically. Our algorithm has been tested through image segmenting of flames and faces from a set of real pictures, and the experimental results prove its efficiency in segmentation precision and computational cost.
Design of bit error rate tester based on a high speed bit and sequence synchronization
Xuanmin Wang,
Xiangmo Zhao,
Lichuan Zhang,
et al.
Show abstract
In traditional BER(Bit Error Rate) tester, bit synchronization applied digital PLL and sequence synchronization utilized sequence's correlation.It resulted in a low speed on bit and sequence synchronization. this paper came up new method to realize bit and sequence synchronization .which were Bit-edge-tracking method and Immitting-sequence method.The BER tester based on FPGA was designed.The functions of inserting error-bit and removing the false sequence synchronization were added. The results of Debuging and simulating display that the time to realize bit synchronization is less than a bit width, the lagged time of the tracking bit pulse is 1/8 of the code cycle,and there is only a M sequence's cycle to realize sequence synchronization.This new BER tester has many advantages,such as a short time to realize bit and sequence synchronization,no false sequence synchronization,testing the ability of the receiving port's error -correcting and a simple hareware.
Infrared image enhancement based on NSCT and neighborhood information
Show abstract
Infrared images are usually subject to low contrast, edge blurring and a large amount of noise. Aiming at improving the quality of the infrared images, this paper presents a novel adaptive algorithm on infrared image enhancement. Firstly, the input image is decomposed via the nonsubsampled Contourlet transform (NSCT) to achieve the coefficients of subbands at different scales and directions. Next, the coefficients of high frequency are classified into three categories automatically by using an adaptive classification method which analyzes the coefficients in their local neighborhood. After that, a nonlinear mapping function is adopted to modify the coefficients, in order to highlight the edges and suppress the high frequency noise. Finally, the enhanced image is obtained by reconstructing via the above modified coefficients. Experiment results show that the proposed algorithm could effectively enhance image contrast and highlight edges while avoiding the image distortion and noise amplification.
Accurate registration of coronary arteries for volumetric CT digital subtraction angiography
Show abstract
In the diagnosis of coronary artery disease with coronary computed tomography angiography, accurate evaluation remains challenging in the presence of calcifications or stents. Volumetric CT Digital Subtraction Angiography is a novel method that may become a powerful tool to overcome these limitations. However, precise registration of structures is essential, as even small misalignments can produce striking and disruptive bright and dark artefacts. Moreover, for clinical acceptance, the tool should require minimal user interaction and fast turnaround, thereby raising several challenges. In this paper we address the problem with a registration method based on a global non- rigid step, followed by local rigid refinement. In our quantitative analysis based on 10 datasets, each consisting of a pair of pre- and post-contrast scans of the same patient, we achieve an average Target Registration Error of 0.45 mm. Runtimes are less than 90 seconds for the global step, while each local refinement takes less than 15 seconds to run. Initial clinical evaluation shows good results in cases of moderate calcification, and indicates that around 50% of severely calcified and previously non-interpretable cases have been made interpretable by application of our method.
Enhanced visual secret sharing for graphical password authentication
Show abstract
Password is a very common and widely used authentication method to provide security to valuable data. It is desirable to make password more memorable and easier for people to use. Traditionally passwords are alphanumeric, numbers & symbols. Some problems of normal password appear like stolen the password, forgetting the password, week password. Study shows that text-based passwords suffer with both security and authentication problems. To overcome these problems, Graphical passwords have been developed. Visual secret sharing (VSS) scheme is a secret sharing scheme in which an image is converted into shares. No information can be revealed by observing any share (Dotted image). The information about the original image will be revealed only after stacking sufficient number of shares (Dotted images). In this paper, we have used XNOR operation instead of OR operation and contrast of the decrypted image is clearer than existing Enhanced Visual Secret Sharing (EVSS) scheme. Also, we are presenting new approach to authenticate graphical password image using 2-out-of-2 EVSS scheme. Which can be used to protect machines with additional security.
Enhanced algorithms for enterprise expert search system
Valentin Molokanov,
Dmitry Romanov,
Valentin Tsibulsky
Show abstract
We present the results of our enterprise expert search system application to the task introduced at the Text Retrieval Conference (TREC) in 2007. The expert search system is based on analysis of content and communications topology in an enterprise information space. An optimal set of weighting coefficients for three query-candidate associating algorithms is selected for achieving the best search efficiency on the search collection. The obtained performance proved to be better than at most TREC participants. The hypothesis of additional efficiency improvement by means of query classification is proposed.
Facial region watermarking robust against rotation, scaling and translation attacks
Iwan Setyawan,
Ivanna K. Timotius
Show abstract
This paper presents a watermarking system for images containing a single frontal facial region that is robust against rotation, scaling and translation attacks. The system presented can automatically detect the facial region within the host image, using an algorithm that does not rely on skin color information and is therefore insensitive to the variations of apparent skin color of the subject. The system then normalizes the rotation, scale and translation of the facial region. Therefore, the system is able to re-synchronize the watermark in the event of a rotation, scaling and translation attack. The experiments showed that the proposed system performed well under such attack. The system also showed good performance against common signal processing attacks such as filtering and JPEG compression.
A SVM-based method for sentiment analysis in Persian language
Show abstract
Persian language is the official language of Iran, Tajikistan and Afghanistan. Local online users often represent their opinions and experiences on the web with written Persian. Although the information in those reviews is valuable to potential consumers and sellers, the huge amount of web reviews make it difficult to give an unbiased evaluation to a product. In this paper, standard machine learning techniques SVM and naive Bayes are incorporated into the domain of online Persian Movie reviews to automatically classify user reviews as positive or negative and performance of these two classifiers is compared with each other in this language. The effects of feature presentations on classification performance are discussed. We find that accuracy is influenced by interaction between the classification models and the feature options. The SVM classifier achieves as well as or better accuracy than naive Bayes in Persian movie. Unigrams are proved better features than bigrams and trigrams in capturing Persian sentiment orientation.
Research and application of oracle performance optimizing technologies for building airplane environment resource database"
Jianjun Zhang,
Jianyong Sun,
Conggao Cheng
Show abstract
Many problems exist in processing experimental aircraft vibration (temperature, humidity) data and generating the intermediate calculations during the construction of airplane environment resource database, such as the need to deal with both structural and non-structural data, weak capacity of the client browser for data processing and massive network data transferring etc. To solve the above problems, some strategies on tuning and optimization performance of database are employed base on Oracle11g, which include data storage structure tuning, the memory configuration of the server, the disk I/O tuning and SQL statement tuning. The experimental results show that the performance of airplane environment resource database is enhanced about 80% compared with the database developed in the initial demonstration and validation phase. The application of new optimization strategies to the database construction can lay a sound foundation for finishing building airplane environment resource database.
Effective scene matching for intelligent video surveillance
Show abstract
This paper proposes a novel method on scene matching which aims to detect the unauthorized change of the camera’s field of view (FOV) automatically. The problem is substantially difficult due to mixed representation of FOV change and scene content variation in actual situation. In this work, a local viewpoint-invariant descriptor is firstly proposed to measure the appearance similarity of the captured scenes. And then the structural similarity constraint is adopted to further distinguish whether the current scene remains despite the content change in the scene. Experimental results demonstrate that the proposed method works well in existence of viewpoint change, partial occlusion and structural similarities in real environment. The proposed scheme has been proved to be practically applicable and reliable by its use in an actual intelligent surveillance system.
Study of risk based on web software testing
Xin Wang
Show abstract
Web-based test systems that have particular difficulties and challenges, The article points out a Web application system security risk, through the analysis of the implementation issues involved Web-based testing, proposed workflow based on Web test, And how to choose the risk of the process by adding a detailed study, Discussed the security, performance, accuracy, compatibility, reliability and other details of the risk factors. These risks need for Web application testing program be established in order to make better Web-based test plan.
A direct torque control scheme for permanent magnet synchronous motors based on space vector modulation
Xiao-hui Su ,
Shu-Ping Xu
Show abstract
In order to solve the problem of direct torque control (DTC) for permanent magnet synchronous motor (PMSM) related to the flux and the torque ripple and the uncertainty of switching frequency, A novel direct torque control system based on space vector modulation(SVM-DTC) for permanent magnet synchronous motor was proposed. In this method flux and torque are controlled through stator voltage components in stator flux linkage coordinate axes and space vector modulation is used to control inverters. Therefore, the errors of torque and flux linkage could be compensated accurately. The whole system has only one easily adjustable PI adjuster and needs no high for hardware and easy for realize. The simulation results verify the feasibility of this method, reduction of the flux and the torque ripple, and the good performance of DTC.
A hybrid algorithm with GA and DAEM
HongJie Wan,
HaoJiang Deng,
XueWei Wang
Show abstract
Although the expectation-maximization (EM) algorithm has been widely used for finding maximum likelihood estimation of parameters in probabilistic models, it has the problem of trapping by local maxima. To overcome this problem, the deterministic annealing EM (DAEM) algorithm was once proposed and had achieved better performance than EM algorithm, but it is not very effective at avoiding local maxima. In this paper, a solution is proposed by integrating GA and DAEM into one procedure to further improve the solution quality. The population based search of genetic algorithm will produce different solutions and thus can increase the search space of DAEM. Therefore, the proposed algorithm will reach better solution than just using DAEM. The algorithm retains the property of DAEM and gets the better solution by genetic operation. Experiment results on Gaussian mixture model parameter estimation demonstrate that the proposed algorithm can achieve better performance.
Design and implementation of wireless sensor networks database
Show abstract
Data management and processing as the core application of wireless sensor network technology have become the research hotspot in the new database. This article studied mainly data management in wireless sensor networks, in connection with the characteristics of the data in wireless sensor networks, discussed wireless sensor network data query, integrating technology in-depth, proposed a mobile database structure based on wireless sensor network and carried out overall design and implementation for the data management system on this basis.
Database security and encryption technology research and application
Show abstract
The main purpose of this paper is to discuss the current database information leakage problem, and discuss the
important role played by the message encryption techniques in database security, As well as MD5 encryption technology
principle and the use in the field of website or application. This article is divided into introduction, the overview of the
MD5 encryption technology, the use of MD5 encryption technology and the final summary. In the field of requirements
and application, this paper makes readers more detailed and clearly understood the principle, the importance in database
security, and the use of MD5 encryption technology.
Centerline correction of incorrectly segmented coronary arteries in CT angiography
Show abstract
For computer-aided diagnosis of cardiovascular diseases, accurately extracted centerlines of coronary arteries are important. However, centerlines extracted from incorrectly segmented vessels are usually unsatisfactory. For this reason, we propose two automatic centerline correction methods in this paper. First, a method based on the local volume comparison and the morphological comparison is presented to remove false centerlines from over-segmented tissues. Second, another method based on the judgment of vessel identity and the gradient-SDF (source distance field) calculation is presented to add missing centerlines of under-segmented vessels. We have validated the proposed centerline correction methods on real CT angiographic datasets of coronary arteries. The quantitative evaluation results show that the proposed methods can effectively correct centerline errors arising from erroneous vessel segmentation in most cases.
Modified weighted fair queuing for packet scheduling in mobile WiMAX networks
Show abstract
The increase of user mobility and the need for data access anytime also increases the interest in broadband wireless access (BWA). The best available quality of experience for mobile data service users are assured for IEEE 802.16e based users. The main problem of assuring a high QOS value is how to allocate available resources among users in order to meet the QOS requirement for criteria such as delay, throughput, packet loss and fairness. There is no specific standard scheduling mechanism stated by IEEE standards, which leaves it for implementer differentiation. There are five QOS service classes defined by IEEE 802.16: Unsolicited Grant Scheme (UGS), Extended Real Time Polling Service (ertPS), Real Time Polling Service (rtPS), Non Real Time Polling Service (nrtPS) and Best Effort Service (BE). Each class has different QOS parameter requirements for throughput and delay/jitter constraints. This paper proposes Modified Weighted Fair Queuing (MWFQ) scheduling scenario which was based on Weighted Round Robin (WRR) and Weighted Fair Queuing (WFQ). The performance of MWFQ was assessed by using above five QoS criteria. The simulation shows that using the concept of total packet size calculation improves the network’s performance.
The application of improved neural network in hydrocarbon reservoir prediction
Xiaobo Peng
Show abstract
This paper use BP neural network techniques to realize hydrocarbon reservoir predication easier and faster in tarim basin in oil wells. A grey – cascade neural network model is proposed and it is faster convergence speed and low error rate. The new method overcomes the shortcomings of traditional BP neural network convergence slow, easy to achieve extreme minimum value. This study had 220 sets of measured logging data to the sample data training mode. By changing the neuron number and types of the transfer function of hidden layers, the best work prediction model is analyzed. The conclusion is the model which can produce good prediction results in general, and can be used for hydrocarbon reservoir prediction.
Application research on improved BP neural network for water quality comprehensive evaluation
Lian Zhang,
Wen-juan Li,
Wei Lai
Show abstract
An Back Propagation (BP) neural network model for water quality evaluation was established to overcome the shortcomings of the traditional methods. Levenberg-Marquardt (LM) optimization algorithm was used to make the BP neural network converging quickly, and golden section theory was used to get the reasonable number of the network's hidden nodes. The optimal BP network model was used to evaluate the water quality degree of Xindu area of Chengdu, which results were compared with the evaluation results of traditional methods: comprehensive pollution evaluation method and single factor method, it was proved that the results of the set BP network model are more objective and steady, and it makes it possible to compare the water quality of two rivers which belong to different function grades.
A universal data access and protocol integration mechanism for smart home
Pengfei Shao,
Qi Yang,
Xuan Zhang
Show abstract
With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.
Research and implementation of fingerprint image preprocessing
Junfeng Zhang,
Bing Xue
Show abstract
Through the in-depth research of the existing fingerprint identification systems and the related technologies, this
paper puts forward an implementation program of fingerprint preprocessing to optimize the fingerprint image
segmentation, binarization, thinning and other treatment details in the existing fingerprint preprocessing. And the
optimized fingerprint preprocessing program can meet the performance requirements, is simple to achieve, easy to
operate, thus has high practical value.
A study on intrusion detection model based on hybrid classifier
Show abstract
In order to improve the accuracy of classification problem in intrusion detection, a hybrid classifier which was composed by KPCA, BPNN and QGA, has been proposed in this paper. In the hybrid classifier, KPCA was used to reduce dimensions, and then QGA was used to search the best parameters for BPNN. BPNN which has been got the best weights matrix and thresholds by QGA, was used to train classification model. The main core factors of original dataset can be preserved by KPCA, and greatly reduced the computations. The weakness of BPNN, which was usually easy to get stuck in local minimum, can be solved by QGA. Finally, the effectiveness of hybrid classifier was proved by experiments. Compared with traditional methods, the hybrid classifier has better performance in reducing the classify errors.
Web information retrieval based on ontology
Jian Zhang
Show abstract
The purpose of the Information Retrieval (IR) is to find a set of documents that are relevant for a specific information need of a user. Traditional Information Retrieval model commonly used in commercial search engine is based on keyword indexing system and Boolean logic queries. One big drawback of traditional information retrieval is that they typically retrieve information without an explicitly defined domain of interest to the users so that a lot of no relevance information returns to users, which burden the user to pick up useful answer from these no relevance results. In order to tackle this issue, many semantic web information retrieval models have been proposed recently. The main advantage of Semantic Web is to enhance search mechanisms with the use of Ontology’s mechanisms. In this paper, we present our approach to personalize web search engine based on ontology. In addition, key techniques are also discussed in our paper. Compared to previous research, our works concentrate on the semantic similarity and the whole process including query submission and information annotation.
A weight based genetic algorithm for selecting views
Show abstract
Data warehouse is a technology designed for supporting decision making. Data warehouse is made by extracting large amount of data from different operational systems; transforming it to a consistent form and loading it to the central repository. The type of queries in data warehouse environment differs from those in operational systems. In contrast to operational systems, the analytical queries that are issued in data warehouses involve summarization of large volume of data and therefore in normal circumstance take a long time to be answered. On the other hand, the result of these queries must be answered in a short time to enable managers to make decisions as short time as possible. As a result, an essential need in this environment is in improving the performances of queries. One of the most popular methods to do this task is utilizing pre-computed result of queries. In this method, whenever a new query is submitted by the user instead of calculating the query on the fly through a large underlying database, the pre-computed result or views are used to answer the queries. Although, the ideal option would be pre-computing and saving all possible views, but, in practice due to disk space constraint and overhead due to view updates it is not considered as a feasible choice. Therefore, we need to select a subset of possible views to save on disk. The problem of selecting the right subset of views is considered as an important challenge in data warehousing. In this paper we suggest a Weighted Based Genetic Algorithm (WBGA) for solving the view selection problem with two objectives.
Study of application of virtual object projection based on augmented reality technology
Show abstract
Augmented reality technology is a hot research topic in recent years. Augmented reality is a technology of
synthesizing virtual objects generated by the computer or other information to the real world felt by the user. It is a
supplement to the real world, rather than the completely replacement of the real world. Displaying technology and
tracking registration technology is key technologies in the augmented reality system, and is the focus of the study. This
article briefly describes the displaying technology, and the tracking registration technology.
Video copy protection and detection framework (VPD) for e-learning systems
Show abstract
This Article reviews and compares the copyright issues related to the digital video files, which can be categorized as contended based and Digital watermarking copy Detection. Then we describe how to protect a digital video by using a special Video data hiding method and algorithm. We also discuss how to detect the copy right of the file, Based on expounding Direction of the technology of the video copy detection, and Combining with the own research results, brings forward a new video protection and copy detection approach in terms of plagiarism and e-learning systems using the video data hiding technology. Finally we introduce a framework for Video protection and detection in e-learning systems (VPD Framework).
Capacity anti-interference for simulation and research communication system on diversity technique
Show abstract
Frequency-hopping communication is an effective technique for anti-interference, which has significant application value and vast development in such fields as military communication, mobile communication, wireless local area network and wireless personal communication. This article demonstrates the influence of several common man-made interferences on frequency-hopping system capacity and stresses the research on anti-interference capacity against some frequency bands. Based on simulation experiment, this article comes up with the improvement for frequency-hopping system in light of frequency diversity technique. The experiment shows that the improved frequency-hopping system’s anti-interference capacity against some frequency bands has increased greatly.
Simulation and measurement for the effects of a steel installation base on the microstrip patch antenna
Show abstract
The effects of a steel installation base on the proposed microstrip patch antenna are investigated. The models of the antenna with different surroundings are established in Ansoft HFSS software. The variations in antenna performances are compared in simulation and measurement, respectively. And Good agreements are achieved between the measured and simulated results. It is found that the resonant frequency is shifted upward by about 60MHz with the introduction of the steel base, while the matching level is decreased. Meanwhile, the VSWR 2:1 bandwidth is reduced by about 80MHz. The results indicate that the steel base has great influences on the antenna characteristics, and the simulation work provides powerful guidance for the antenna design.
Ontology-based topic clustering for online discussion data
Show abstract
With the rapid development of online communities, mining and extracting quality knowledge from online discussions becomes very important for the industrial and marketing sector, as well as for e-commerce applications and government. Most of the existing techniques model a discussion as a social network of users represented by a user-based graph without considering the content of the discussion. In this paper we propose a new multilayered mode to analysis online discussions. The user-based and message-based representation is combined in this model. A novel frequent concept sets based clustering method is used to cluster the original online discussion network into topic space. Domain ontology is used to improve the clustering accuracy. Parallel methods are also used to make the algorithms scalable to very large data sets. Our experimental study shows that the model and algorithms are effective when analyzing large scale online discussion data.
The development of augmented video system on postcards
Show abstract
This study focuses on development of augmented video system on traditional picture postcards. The system will provide users to print out the augmented reality marker on the sticker to stick on the picture postcard, and it also allows users to record their real time image and video to augment on that stick marker. According dynamic image, users can share travel moods, greeting, and travel experience to their friends. Without changing in the traditional picture postcards, we develop augmented video system on them by augmented reality (AR) technology. It not only keeps the functions of traditional picture postcards, but also enhances user’s experience to keep the user’s memories and emotional expression by augmented digital media information on them.
Single-chip computer and serial communication of GPRS modem
Show abstract
Communication between PC and Modem is common, while communication between single-chip computer and Modem is rare. This article will elaborate serial communication between single-chip computer and GPRS modem. The wide use of serial communication will enable various transmission units to connect as one organically and exchange data and information in safe and reliable manner. However, since signal of each transmission channel is different, the serial port in use should be various. Therefore, in order to realize communication among units, it is necessary to involve serial port conversion among each unit.
Research on the net amount of air traffic network
Show abstract
As accurate prediction of traffic flow states could reduce the congestion possibility, the theoretical study of air traffic was how to determinate the next time the state with fluid mechanics based on random condition. Then, a novel depicting method of air traffic flow is proposed, which calculated the change of net amount in flow conservation equation with discrete time loss queuing, further, it could determine the relationship between flow and density. Compared to the existing general algorithm, the threshold of net amount was presented in the method, and it had good adaptability.
A constraint optimization based virtual network mapping method
Xiaoling Li,
Changguo Guo,
Huaimin Wang,
et al.
Show abstract
Virtual network mapping problem, maps different virtual networks onto the substrate network is an extremely challenging work. This paper proposes a constraint optimization based mapping method for solving virtual network mapping problem. This method divides the problem into two phases, node mapping phase and link mapping phase, which are all NP-hard problems. Node mapping algorithm and link mapping algorithm are proposed for solving node mapping phase and link mapping phase, respectively. Node mapping algorithm adopts the thinking of greedy algorithm, mainly considers two factors, available resources which are supplied by the nodes and distance between the nodes. Link mapping algorithm is based on the result of node mapping phase, adopts the thinking of distributed constraint optimization method, which can guarantee to obtain the optimal mapping with the minimum network cost. Finally, simulation experiments are used to validate the method, and results show that the method performs very well.
Texture classification of lung computed tomography images
Show abstract
Current development of algorithms in computer-aided diagnosis (CAD) scheme is growing rapidly to assist the radiologist in medical image interpretation. Texture analysis of computed tomography (CT) scans is one of important preliminary stage in the computerized detection system and classification for lung cancer. Among different types of images features analysis, Haralick texture with variety of statistical measures has been used widely in image texture description. The extraction of texture feature values is essential to be used by a CAD especially in classification of the normal and abnormal tissue on the cross sectional CT images. This paper aims to compare experimental results using texture extraction and different machine leaning methods in the classification normal and abnormal tissues through lung CT images. The machine learning methods involve in this assessment are Artificial Immune Recognition System (AIRS), Naive Bayes, Decision Tree (J48) and Backpropagation Neural Network. AIRS is found to provide high accuracy (99.2%) and sensitivity (98.0%) in the assessment. For experiments and testing purpose, publicly available datasets in the Reference Image Database to Evaluate Therapy Response (RIDER) are used as study cases.
City motor vehicle management system based on RFID
Show abstract
Aiming at the shortcomings of the traditional vehicle management, a new motor vehicle management solutions is
provided. The system manage the vehicles using the radio frequency long-range identification based on RFID
technology.The system can identify the vehicles in 12 meters with a maximum speed of 100km/h and provides a new
solution for the city motor vehicle management.
A scheme of improving the quality of speech mixing in multi-media conference system
Show abstract
The factors which influence the voice quality in multi-media conference on IP network, such as delay and the accumulation of delay is analyzed. A scheme which adopts mixing buffer and method of uniform mixing period to increase the quality of mixed speech is proposed. The prototype of multi-media conference system which using this scheme proves that the quality issue of speech mixing can be solved well, and the speech quality is good in the local area network.
A new algorithmic approach for fingers detection and identification
Arslan Mubashar Khan,
Waqas Umar,
Taimoor Choudhary,
et al.
Show abstract
Gesture recognition is concerned with the goal of interpreting human gestures through mathematical algorithms. Gestures can originate from any bodily motion or state but commonly originate from the face or hand. Hand gesture detection in a real time environment, where the time and memory are important issues, is a critical operation. Hand gesture recognition largely depends on the accurate detection of the fingers. This paper presents a new algorithmic approach to detect and identify fingers of human hand. The proposed algorithm does not depend upon the prior knowledge of the scene. It detects the active fingers and Metacarpophalangeal (MCP) of the inactive fingers from an already detected hand. Dynamic thresholding technique and connected component labeling scheme are employed for background elimination and hand detection respectively. Algorithm proposed a new approach for finger identification in real time environment keeping the memory and time constraint as low as possible.
Kannada character recognition system using neural network
Show abstract
Handwriting recognition has been one of the active and challenging research areas in the field of pattern recognition. It has numerous applications which include, reading aid for blind, bank cheques and conversion of any hand written document into structural text form. As there is no sufficient number of works on Indian language character recognition especially Kannada script among 15 major scripts in India. In this paper an attempt is made to recognize handwritten Kannada characters using Feed Forward neural networks. A handwritten Kannada character is resized into 20x30 Pixel. The resized character is used for training the neural network. Once the training process is completed the same character is given as input to the neural network with different set of neurons in hidden layer and their recognition accuracy rate for different Kannada characters has been calculated and compared. The results show that the proposed system yields good recognition accuracy rates comparable to that of other handwritten character recognition systems.
Learning a piecewise linear transform coding scheme for images
Aäron van den Oord,
Sander Dieleman,
Benjamin Schrauwen
Show abstract
Gaussian mixture models are among the most widely accepted methods for clustering and probability density estimation. Recently it has been shown that these statistical methods are perfectly suited for learning patch-based image priors for various image restoration problems. In this paper we investigate the use of GMM's for image compression. A piecewise linear transform coding scheme based on Vector Quantization is proposed. In this scheme two different learning algorithms for GMM's are considered and compared. Experimental results demonstrate that the proposed techniques outperform JPEG, with results comparable to JPEG2000 for a broad class of images.
Stroke prognosis by applying double thresholds on CT-perfusion-brain images
Show abstract
The CT-perfusion image shows information of brain abnormalities such as its size and location. Generally, neurologist diagnoses stroke disease using CT-perfusion images such as Cerebral blood flow (CBF), cerebral blood volume (CBV). In our previous report, we applied threshold technique to divide amount of CBV and CBF into low and high level. Then, their levels are applied to identify normal tissue areas, dead tissue areas (infract core) and blood-cot tissue areas (infract penumbra). However, it’s not totally correct, if the same threshold is applied to the whole area (it must depend on size of blood vessel in that area. In this report, we propose double thresholds to divided CBV and CBF into 3 levels: very low, medium and very high levels. Very low and very high levels are definitely implied to bad areas and good areas, respectively. The proposed double thresholds makes stroke prognosis more accurate. The simulation results confirm that our proposed results closed to results defined from neurologist comparing to the conventional results.
An efficient 2D-WTMM and PNN approach to remove spurious radar echoes
Mohamed Khider,
Boualem Haddad
Show abstract
The proposed method aims to reduce the spurious echoes in weather radar images collected at Melbourne radar site, using parameters from 2D-WTMM method based on the continuous wavelet transform, and including the PNN probabilistic neural network for the classification of pixels into two types of echoes : precipitation or parasite. Indeed, we propose the introduction of parameters related to wavelet transform skeletons, these parameters are proportional to the image texture roughness, anisotropy and the distance of separation between non-zero radar echoes cells and give good separation between rain and non-rain echoes. Radar image is first segmented with Voronoi’s cells according to the spatial distribution of Holder exponents. By comparing with a direct method of classification which takes into account only one parameter at a time by using a threshold, it was found that the combination of these three parameters with PNN approach improves the final results in terms of preserving precipitation echoes and elimination of weather radar clutter. Initial results show approximately the removal of 98% of clutter and preservation of 97% of precipitation echoes.
A novel approach for segmentation of touching characters on the license plate
Show abstract
In this paper, a novel algorithm is proposed for segmentation of touching characters on the license plate. In our method, rough and precise segmentation of characters proceeds in sequence. At first, characters on the license plate are roughly classified as segmented and touching characters by vertical projection on the edge map. Next, segmentation points of touching characters are evaluated using fixed ratio relations of width, interval and height of characters. Finally, the touching characters are segmented by a path created by A* pathfinding algorithm. The proposed method is tested on 238 license plate images and the successful segmentation rate of 97.06% is achieved with only 62ms. And the experiment result demonstrates the effectiveness and efficient of our suggestion.
Apply 3D model on the customized product color combination for the interior decoration
Show abstract
The customized product color interface for the interior decoration is designed to simulate the display of various color combination sofas in the interior of the room. There are 144 color combinations of the spatial image resulted from four the interior rooms and 36 popular color sofas. The image compositing technique is adopted to appear the 144 color combinations of the spatial image on computer screen. This study tests the experience of using the interface by the questionnaire for User Interface Satisfaction (QUIS). The results show that the high grade of evaluation items including wonderful, easy, satisfying, stimulating and flexible for the experience of users. Therefore, the entrepreneur who wants to display the color primarily commodity could using the customized color combination interface with 3D models for consumers to take opportunity to find the appropriate products to meet with the interior room, so as to shorten communication time between entrepreneurs and consumers.
Embedded software memory optimization based on the DSL and topological sort
Show abstract
Nowadays, the powerful development of embedded software, the optimizing embedded software play an important role. The evaluation and optimization in the design phase of embedded software brings many benefits. In this paper, we propose a new method to optimize the occupied memory of embedded software in the design phase based on DSL, T4 and Topological sort. A program is a chain of Tasks and the relationship between each Task. The program is specified by the dependence graph that is a directed graph. Each node in directed graph describes a Task, each Task consists of specification information such as name, input, output. Each edge describes the relationship between two Tasks. The programs working by order of Task in the different Topo chain does not change the result but the occupied memory and performances are difference. From the dependence graph, we can find many Topo chains, and each of them will have amount of occupied memory in difference. From the Topo chains on the directed graph, we built the memory evaluation function to find the best Topo chain which has the smallest amount of occupied memory.
Determination and stochasticity of hierarchical systems in lingual synergy and their application in evaluation of the writing and speaking styles of professionals
Bikesh Ospanova,
Saule Kazhikenova,
Mukhtar Sadykov,
et al.
Show abstract
The article is devoted to lingual synergy based on the conceptions of complicated self-organizing systems development. Paper analyses entropic-and-information language characteristics built on the principles of determination and stochasticity. As a practical implementation of the study, professionals writing and speaking styles evaluation system is proposed.
Research and design of web application framework based on ajax
Show abstract
AJAX is an emerging presentation layer technology of Web, which allows dynamic, fast, and flexible Web
application procedures to be built. AJAX can eliminate the dependence on the form in the tradition HTTP
communication mode, which can achieve a fast and lightweight asynchronous communication. This paper firstly
introduces the work principle of the AJAX technology, and combines the AJAX technology with the Web services
technology to design a new Web application framework based on AJAX, to achieve an asynchronous communication of
the browser directly with the back-end services.
Miniaturization design and implementation of magnetic field coupled RFID antenna
Show abstract
The development of internet of things has brought new opportunities and challenges to the application of RFID tags. Moreover, the Miniaturization application trend of tags at present has become the mainstream of development. In this paper, the double-layer design is to reduce the size of HF antenna, and the magnetic null point of magnetic reconnection region between the RLC resonant circuit and the reader provides sufficient energy to the miniaturization of antenna. The calculated and experimental results show that the miniaturization of HF antennas can meet the reading and writing requirement of the international standard ISO/IEC14443 standard. The results of this paper may make a positive contribution to the applications of RFID technology.
A bimodal biometric identification system
Show abstract
Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Physicals are related to the shape of the body. Behavioral are related to the behavior of a person. However, biometric authentication systems suffer from imprecision and difficulty in person recognition due to a number of reasons and no single biometrics is expected to effectively satisfy the requirements of all verification and/or identification applications. Bimodal biometric systems are expected to be more reliable due to the presence of two pieces of evidence and also be able to meet the severe performance requirements imposed by various applications. This paper presents a neural network based bimodal biometric identification system by using human face and handwritten signature features.
Securing smart grid technology
Show abstract
In the developing countries electrical energy is very important for its all-round improvement by saving thousands of
dollars and investing them in other sector for development. For Growing needs of power existing hierarchical, centrally
controlled grid of the 20th Century is not sufficient. To produce and utilize effective power supply for industries or
people we should have Smarter Electrical grids that address the challenges of the existing power grid. The Smart grid can
be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated
control, high-power converters, modern communications infrastructure along with modern IT services, sensing and
metering technologies, and modern energy management techniques based on the optimization of demand, energy and
network availability and so on. The main objective of this paper is to provide a contemporary look at the current state of
the art in smart grid communications as well as critical issues on smart grid technologies primarily in terms of
information and communication technology (ICT) issues like security, efficiency to communications layer field. In this
paper we propose new model for security in Smart Grid Technology that contains Security Module(SM) along with
DEM which will enhance security in Grid. It is expected that this paper will provide a better understanding of the
technologies, potential advantages and research challenges of the smart grid and provoke interest among the research
community to further explore this promising research area.
Mobile-based biology edutainment application for secondary schools
Show abstract
The high increase of mobile technology is leading to mobilized learning environment, thus making traditional learning to diminish slowly and become inactive and unproductive. Learners worldwide are being attracted to mobile environment more so that it promotes anytime, anywhere learning. Biology as a secondary school subject will be applicable for mobile learning for such a time and generation as this. This paper is therefore an attempt to mobile based biology edutainment system for the students who normally range from the ages of thirteen to sixteen.
Image-processing with augmented reality (AR)
Hossein Reza Babaei,
Pagiel L. Mohurutshe,
Arash Habibi Lashkari
Show abstract
In this project, the aim is to discuss and articulate the intent to create an image-based Android Application. The basis of this study is on real-time image detection and processing. It's a new convenient measure that allows users to gain information on imagery right on the spot. Past studies have revealed attempts to create image based applications but have only gone up to crating image finders that only work with images that are already stored within some form of database. Android platform is rapidly spreading around the world and provides by far the most interactive and technical platform for smart-phones. This is why it was important to base the study and research on it. Augmented Reality is this allows the user to maipulate the data and can add enhanced features (video, GPS tags) to the image taken.
Multi-views storage model and access methods of conversation history in converged IP messaging system
Show abstract
Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.
Combining engineered cell-sensors with multi-agent systems to realize smart environment
Show abstract
The connection of everything in a sensory and an intelligent way is a pursuit in smart environment. This paper introduces the engineered cell-sensors into the multi-agent systems to realize the smart environment. The seamless interface with the natural environment and strong information-processing ability of cell with the achievements of synthetic biology make the construction of engineered cell-sensors possible. However, the engineered cell-sensors are only simple-functional and unreliable computational entities. Therefore how to combine engineered cell-sensors with digital device is a key problem in order to realize the smart environment. We give the abstract structure and interaction modes of the engineered cell-sensors in order to introduce engineered cell-sensors into multi-agent systems. We believe that the introduction of engineered cell-sensors will push forward the development of the smart environment.
The multi-queue model applied to random access protocol
Show abstract
The connection of everything in a sensory and an intelligent way is a pursuit in smart environment. This paper introduces the engineered cell-sensors into the multi-agent systems to realize the smart environment. The seamless interface with the natural environment and strong information-processing ability of cell with the achievements of synthetic biology make the construction of engineered cell-sensors possible. However, the engineered cell-sensors are only simple-functional and unreliable computational entities. Therefore how to combine engineered cell-sensors with digital device is a key problem in order to realize the smart environment. We give the abstract structure and interaction modes of the engineered cell-sensors in order to introduce engineered cell-sensors into multi-agent systems. We believe that the introduction of engineered cell-sensors will push forward the development of the smart environment.
An improved service-aware multipath algorithm for wireless multimedia sensor networks
Show abstract
Study the multipath transmission problems of the different services in Wireless Multimedia Sensor Networks
(WMSN). To further effectively utilize networks resources, the multipath mechanism and service-aware is used to
improve performance of OLSR(Optimized Link State Routing). A SM-OLSR(Service-aware Multipath OLSR)
algorithm is proposed. An efficiency model is introduced, then multipath is built according to the routing ID and
energy efficiency. Compared with other routing algorithms, simulation results show that the algorithm can provide
service support for different data.
Development of protected endorsement for online banking using mobile phones
Show abstract
Securing Online Banking transactions for customer is the primary goal of financial institutions that provides Internet banking facility. Mobile phones play an important role in our society as more and more functions having been integrated within mobile phones, such as Internet browsing, mobile banking, and shopping. Mobiles phones can be used to secure ATM card pins by sending to the customer directly rather than in emails or by other means which has a possibility of hacking. In this paper we have proposed method of generating a Private Key Security Token by bank authentication servers which uses IMSI registers and IMEI number of client’s mobile registered. The key is generated by implementing RIPE MD160 and Hex Encode Algorithm. Token received is valid only for that client mobile only and can be generated upon request by customer dynamically. The client is given a PIN and a Master Key when registered to the Online Banking Services. If in case a client’s mobile is lost, authentication is done using Unique Master Key, else the Private Key Token is used there by making transactions secured and simple without the need of carrying any USB Tokens. The additional functionality provides the client more security on their transactions. Due to this Phishing attacks by the hackers is avoided.
Hand gesture recognition based on motion history images for a simple human-computer interaction system
Ivanna K Timotius,
Iwan Setyawan
Show abstract
A human-computer interaction can be developed using several kind of tools. One choice is using images captured using a camera. This paper proposed a simple human-computer interaction system based on hand movement captured by a web camera. The system aims to classify the captured movement into one of three classes. The first two classes contain hand movements to the left and right, respectively. The third class contains non-hand movements or hand movements to other directions. The method used in this paper is based on Motion History Images (MHIs) and nearest neighbor classifier. The resulting MHIs are processed in two manners, namely by summing the pixel values along the vertical axis and reshaping into vectors. We also use two distance criteria in this paper, respectively the Euclidian distance and cross correlation. This paper compared the performance of the combinations of different MHI data processing and distance criteria using 10 runs of 2-fold cross validation. Our experiments show that reshaping the MHI data into vectors combined with a Euclidean distance criterion gives the highest average accuracy, namely 55.67%.
Specifying of requirements for spatio-temporal data in map by eye-tracking and space-time-cube
Show abstract
One of the most objective methods of map use evaluation (in terms of reading, analysis and interpretation. is an analysis of eye movements of map reader, known as eye-tracking method. GazePlots and HeatMaps as the most commonly used visualization methods of eye-tracking data cannot effectively express the change of time. The authors introduce a Space-Time-Cube for spatio-temporal visualization. It displays the map at the base of the cube (axes X and Y) while Z axis is used to represent time. Spatial and temporal components of a map are shown together, and relationship between space and time can be revealed. During the authors’ research, the user interaction over the map legend of agriculture of the Czech Republic school maps was tested. Space-Time-Cube displayed both components (spatial and temporal) together and allowed easy visual analysis of four respondents’ (map readers’) work with a map. Using Space- Time-Cube for visual analysis provides satisfactory results, although this form of visualization is not widespread and for someone it may seem complex and confusing.
A research of security architecture in grid
Show abstract
Grid architecture is the frame of the grid environment, and the grid security architecture is the indemnity of the grid architecture. The reasonable grid architecture is the core of the establishment of good grid. Only could they establish the reasonable grid architecture, they can design and build the good grid system. In this paper we put the security architecture into the small grid environment which is set up in a school’s lab. This experiment provides the useful experience for us to put the security architecture into the actual grid environment and make the big contribution for the further study of grid.
Signature scheme based on bilinear pairs
Show abstract
An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user’s identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user’s private key.
Active defense scheme against DDoS based on mobile agent and network control in network confrontation
Show abstract
In order to effective defend DDoS attacks in network confrontation, an active defense scheme against DDoS is built based on Mobile Agent and network control. A distributed collaborative active defense model is constructed by using mobile agent technology and encapsulating a variety of DDoS defense techniques. Meanwhile the network control theory is applied to establish a network confrontation’s control model for DDoS to control the active defense process. It provides a new idea to solve the DDoS problem.
Quality of Service in Wireless Sensor Networks (QOS in WSN)
Show abstract
In this paper, we discuss about concept of Quality of Service (QoS) in Wireless Sensor Networks (WSN) and different methods to improve data security network. The most useful methods for network traffic control are Differentiated Services (DS), Integrated Services, Multi-Protocol Labeled Switching (MPLS), Resource Reservation Protocol (RSVP) and Traffic Engineering. Quality of Service is responsible for data transfer between different parts of the network and it guarantees some series of transport properties on the network [14].
Performance improvement techniques for optical wireless link in presence of atmospheric turbulence
Show abstract
Atmospheric turbulence can cause significant performance degradation in free space optical (FSO) communication system. Major effects on the beam such as beam wander and beam scintillation degrades the performance at the receiver. We investigate the impact of diversity technique and aperture averaging technique on the performance of FSO system. Performance evaluation is made in terms of average bit error rate and scintillation index.
The research of positioning methods based on internet of things
Show abstract
With the advent of Internet of Things time, more and more applications require location-based services. This article
describes the concept and basic principles of several of Internet of things positioning technology such as GPS positioning,
Base Station positioning, ZigBee positioning. And then the advantages and disadvantages of these types of positioning
technologies are compared.
Modeling non-monotonic properties under propositional argumentation
Geng Wang,
Zuoquan Lin
Show abstract
In the field of knowledge representation, argumentation is usually considered as an abstract framework for nonclassical logic. In this paper, however, we'd like to present a propositional argumentation framework, which can be used to closer simulate a real-world argumentation. We thereby argue that under a dialectical argumentation game, we can allow non-monotonic reasoning even under classical logic. We introduce two methods together for gaining nonmonotonicity, one by giving plausibility for arguments, the other by adding “exceptions” which is similar to defaults. Furthermore, we will give out an alternative definition for propositional argumentation using argumentative models, which is highly related to the previous reasoning method, but with a simple algorithm for calculation.
Use of genetic-algorithm-optimized back propagation neural network and ordinary kriging for predicting the spatial distribution of groundwater quality parameter
Jian Li,
Zheng Zhang,
Yu Feng,
et al.
Show abstract
This study focuses on applying the model of Genetic Algorithm optimized Back Propagation Neural Networks (GABPNN) to formulate the forecast methodology of groundwater quality parameter with spatial data as parameters. Back Propagation neural network (BPNN) is the basic arithmetic of this method. Genetic Algorithm (GA) was used to optimize the weights and biases of BPNN. The GABPNN was firstly introduced into spatial prediction of groundwater quality parameter in Langfang city (China) and it was compared with ordinary Kriging(OK). The groundwater quality parameter such as chloride was selected for the study, the performance of the models was found to be very good. The results of the GABPNN model application were that the regional prediction map of the optimal GABPNN model could describe the spatial distribution situation of groundwater quality parameter and that the predictive validity of the GABPNN model was better than that of ordinary Kriging. The result shows that the GABPNN model is a reasonable and feasible method for spatial distribution of groundwater quality parameter in Langfang city (China).
Controlled replication: reduce the capacity occupied by redundant replicas in tiled chip multiprocessors
Hao Li,
Lunguo Xie
Show abstract
The design of cache system for Chip Multiprocessor (CMP) face many challenges because future CMPs will have more cores and greater on-chip cache capacity. There are two base design schemes about L2 cache: private scheme in which each L2 slice is treated as a private L2 cache and shared scheme in which all L2 slices are treated as a large L2 cache shared by all cores. Private caches provide the lowest hit latency but reduce the total effective cache capacity. A shared L2 cache increases the effective cache capacity but has long hit latencies when data is on a remote tile. This paper present a new Controlled Replication (CR) policy to reduce the capacities occupied by redundant shared replicas. the new CR policy increases the effective capacity than victim replication scheme and has lower hit latency than shared scheme. We evaluate the various schemes using full-system simulation of parallel applications. Results show that CR reduces the average memory access latency of shared scheme by an average of 13%, providing better overall performance than victim replication and shared schemes.
Xpath query optimization based on tree automata
Lanye Wang,
Xiaoguang Hong
Show abstract
How to efficiently process XML query is a fundamental problem in XML data management. In this paper, a method based on tree automata is proposed to improve XPath query efficiency. The method has the following features: tree automata is employing to express XPath query; interval encoding is employing to mark XML document tree; when XPath query is running , by matching XPath tree automata and XML document tree, the process of nodes and sub-trees that do not match the XPath query can be skipped. Related algorithms are introduced. Experimental results demonstrate that the method proposed can effectively support XPath query and outperform the former work in efficiency.
Segmentation of fingerprint images based on variance and gradient factor
Show abstract
The task of fingerprint segmentation is to isolate the fingerprint area from the image background. In this paper, a new algorithm of fingerprint segmentation based on block variance and gradient factor is proposed. A new composite feature for each block is used in this method. At first, the fingerprint image is partitioned into blocks, and then the product of variance and gradient factor is calculated as the new feature. Then the thresholds are computed adaptively. After segmentation, the isolated image blocks are wiped to get the final segmentation result. The experimental results show that this algorithm is effective and programmed easily.
A best on-line algorithm for single machine scheduling the equal length jobs with the special chain precedence and delivery time
Cunchang Gu,
Yundong Mu
Show abstract
In this paper, we consider a single machine on-line scheduling problem with the special chains precedence and delivery time. All jobs arrive over time. The chains chainsi arrive at time ri , it is known that the processing and delivery time of each job on the chain satisfy one special condition CD a forehand: if the job J(i)j is the predecessor of the job J(i)k on the chain chaini, then they satisfy p(i)j = p(i)k = p ≥ qj ≥ qk , i = 1,2, ---,n , where pj and qj denote the processing time and the delivery time of the job Jj respectively. Obviously, if the arrival jobs have no chains precedence, it shows that the length of the corresponding chain is 1. The objective is to minimize the time by which all jobs have been delivered. We provide an on-line algorithm with a competitive ratio of √2 , and the result is the best possible.
Analysis and implementation of document flow model based on Petri and JBPM
Show abstract
Workflow management system JBPM which is open-source and based on J2EE architecture and its workflow model is introduced by combining practical experience in workflow and J2EE. An efficient, rapid and stable model of document flow system is designed with process design tools JPDL, and on the basis of this model definition and in the premise of operating structure equivalent, conversion rules are raised to convert JBPM model to WF_logic. And then smooth of the WF_logic is validated by reduction rules of Petri net. Finally, the model is achieved successfully.
Three list scheduling temporal partitioning agorithm of time space characteristic analysis and compare for dynamic reconfigurable computing
Show abstract
Level Based Partitioning (LBP) algorithm, Cluster Based Partitioning (CBP) algorithm and Enhance Static List (ESL) temporal partitioning algorithm based on adjacent matrix and adjacent table are designed and implemented in this paper. Also partitioning time and memory occupation based on three algorithms are compared. Experiment results show LBP partitioning algorithm possesses the least partitioning time and better parallel character, as far as memory occupation and partitioning time are concerned, algorithms based on adjacent table have less partitioning time and less space memory occupation.
Design and implementation of green intelligent lights based on the zigbee
Show abstract
By analysis of the low degree of intelligence of the traditional lighting control methods, the paper uses the singlechip
microcomputer for the control core, and uses a pyroelectric infrared technology to detect the existence of the human
body, light sensors to sense the light intensity; the interface uses infrared sensor module, photosensitive sensor module,
relay module to transmit the signal, which based on ZigBee wireless network. The main function of the design is to
realize that the lighting can intelligently adjust the brightness according to the indoor light intensity when people in door,
and it can turn off the light when people left. The circuit and program design of this system is flexible, and the system
achieves the effect of intelligent energy saving control.
The research on edge detection algorithm based on hybrid intelligence for color image
Show abstract
Based on the approach of minimization of the cost function, this paper brings forward a kind of hybrid intelligent algorithm for image edge detection, which is based on the particle swarm and quanta evolution algorithm. The implementation of the hybrid intelligent algorithm is also discussed to do the edge detection. The simulation results show that the new algorithm has obtained the satisfied detection effect.
The research to select test data of black-box component using contract
Ying Jiang,
Lin Jin,
Yu-Ping Liu
Show abstract
During the process of component based software development, components must be tested before reused successfully.
Test-data generation is an important topic in black-box component testing. The large number of test data will spend
plenty of execution time and increase the testing cost. Based on the contracts of black-box component, this paper
presents a test data selection method after generated a great deal of initial test cases. First, the contract grammar of blackbox
components is defined. Then the method and process of test data selection is presented based on contract. Finally,
some experiments are carried out. The results have shown that the number of test data is reduced while shortening the
time and keeping the efficiency after twice selection.
Forward-secure group signature based on conic curve over ring ZN
Show abstract
In this paper we present a forward-secure group signature scheme based on conic curve over ring Zn. Our scheme
with forward security has effectively mitigated the damage caused by key exposure, and we use the dynamic
accumulators on the conic curve to remove members. The security of the scheme is based on the difficulty of integer
factorization and calculating the discrete logarithm on conic curve over the ring Zn. The scheme on conic curve has
some advantages as follow: Plaintext embedding is convenient, and the speed of computing inverse element is fast, and
element order calculation and the point operation on curve are more easily, etc. Therefore it is easier to accomplish.
Hidden conditional random fields for face recognition
Show abstract
This paper proposes a hidden conditional random field(HCRF) model for face recognition .Face images are separated
as a series of block and 2D-DCT feature vectors is extracted in each block. The recognition results are compared with
other face recognition approaches. The method introduced in this paper achieves a higher recognition rate.
Formal detection method for hardware vulnerabilities and trojan of embedded devices
Show abstract
As become more widely used, embedded systems security has increasingly gained attention. From the hardware point
of view, this paper describes the background of approach to the vulnerabilities and hardware Trojan detection of
embedded system, basic ideas and objectives; established the model- ESM (Embedded Systems Model) used to describe
embedded systems, provides the encoding method of the ESM system state. Based on this model, this article describes
how to use model checking methods to detect vulnerabilities and Trojan existence of an embedded system.
Research for the design of visual fatigue based on the computer visual communication
Show abstract
With the era of rapid development of computer networks. The role of network communication in the social,
economic, political, become more and more important and suggested their special role. The computer network
communicat ion through the modern media and byway of the visual communication effect the public of the emotional,
spiritual, career and other aspects of the life. While its rapid growth also brought some problems, It is that their message
across to the public, its design did not pass a relat ively perfect manifestation to express the informat ion. So this not only
leads to convey the error message, but also to cause the physical and psychological fatigue for the audiences. It is said
that the visual fatigue. In order to reduce the fatigue when people obtain the useful information in using computer. Let
the audience in a short time to obtain the most useful informat ion, this article gave a detailed account of its causes, and
propose effective solutions and, through the specific examples to explain it, also in the future computer design visual
communicat ion applications development prospect.
The application of PID parameter self-tuning fuzzy controller in the constant-power speed control system of heading machine
Show abstract
This article describes the control system of PID parameter self-tuning fuzzy controller. For cutting the coal of
different hardness, adopt fuzzy techniques, automatically adjust the feed speed of operating mechanism, and maintain the
control of operating mechanism of heading machine with constant power.
Study on the measuring method of aluminum foil for ultrasonic cleaning machine
Show abstract
To the question that it was hard to measure and verify the design rationality of the performance parameters for the
ultrasonic cleaning machine, the measuring technology was presented by aluminum foil, and it analyzed feasibility and
an area assessment method for the measurement method by aluminum foil. The corrosion degree of the aluminum foil
was also put forward. It was demonstrated by the experimental study that this measurement method by aluminum foil
could realize the study on the time characteristics of the ultrasonic cleaning machine, selection of the frequency mode of
action and study on the temperature characteristics, which provided an effective data support and experimental
verification for the performance parameters design of the ultrasonic cleaning machine.
Research on security vulnerability of chip
Show abstract
The 21st century is the information era. IC (Integrated Circuit) is the basis of the modern information industry. The
security vulnerability or back door of IC is directly related to the entire information system security. From the
perspective of information security, security vulnerability of chip is led out through the practical examples and then the
importance of security vulnerability of chip is emphasized. By comparing the security vulnerability of chip with the
software virus, the characteristics of the chip vulnerabilities are summed up. Moreover, this paper describes the security
vulnerability models of different control logic chips, combinational and sequential logic chips models. Finally it puts
forward two kinds of detecting methods of security vulnerability of chip against the two models.
The research of memory management in embedded system
Show abstract
Embedded system is more and more popular in recent times, but the resources of embedded systems are few
relatively, the merit and shortcoming of memory management impact greatly on the overall performance of embedded
systems. On this account, this paper describes the memory management mechanism of embedded system, and researches
the unitary requirement and particular requirement of memory management module of embedded system. We put
forward some improved technology solutions of memory management aspect based on memory allocation mechanism,
which strengthens the real-time running of system, and reduces the response time.
The software simulated model based on DMAM: BJX-SIM
Show abstract
This paper designs a new type simulation system named BJX_SIM, which proposes a communication strategy for
multi-task messaging—the dynamic message aggregation mechanism (DMAM). The communication between the host
and target depends on the mechanism[1], which uses the circular queues in order to form a series of message fluctuation
chain, and then matches the cache through the analysis of the timestamp. The experimental results show that, BJX_SIM
system can effectively improve the simulated performance of the multi-task program.
An improved algorithm of color-based image retrieval
Show abstract
With the improvement of information technology and the rapid expansion of the visual information. Urgently need
for the effective management and retrieval of visual information resources, which made the content based image retrieval
become a hot. The traditional color histogram is one of content-based image retrieval. This paper put forward a kind of
color histogram of partitioned technology. Every piece of picture gives different weight number, according to this
method, achieving image retrieval. Finally, through the experiment results have proved this method in precision have
significantly improved than the traditional color histogram.
A distributed framework for inter-domain virtual network embedding
Show abstract
Network virtualization has been a promising technology for overcoming the Internet impasse. A main challenge in
network virtualization is the efficient assignment of virtual resources. Existing work focused on intra-domain solutions
whereas inter-domain situation is more practical in realistic setting. In this paper, we present a distributed inter-domain
framework for mapping virtual networks to physical networks which can ameliorate the performance of the virtual
network embedding. The distributed framework is based on a Multi-agent approach. A set of messages for information
exchange is defined. We design different operations and IPTV use scenarios to validate the advantages of our framework.
Use cases shows that our framework can solve the inter-domain problem efficiently.
Development method of the motor winding’s ultrasonic cleaning equipment
Yingzhan Jiang ,
Caiyuan Wang,
Chenyang Ao,
et al.
Show abstract
The complicate question’s solution of motor winding cleaning need new technologies such as ultrasonic cleaning.
The mechanism of problems that the insulation level of the motor winding would be degraded with time and the motor
winding would resumed tide soon after processing were analyzed. The ultrasonic cleaning method was studies and one
ultrasonic cleaning device was designed. Its safety was verified by the destructive experiment. The test show that this
device can clear away the depositional dirt in the winding thoroughly, which provides a new idea and method to ensure
its insulation level and realize its safe and reliable operation.
Moving-target imaging based on space-time-frequency signal processing for SAR system
Show abstract
A method for moving-target imaging in dual-channel SAR system based on space-time-frequency signal processing
is studied. In space-time domain, adaptive sliding-window processing method is applied to get high output signal to
noise ratio by dual-channel clutter suppression. In time-frequency domain, modified discrete Chirp-Fourier
transformation is applied to get Doppler modulation frequency parameters. Range migration is solved by Keystone
transformation. Azimuth velocity accuracy is improved by phase compensation. Parameter decoupling is solved by
channel phase deviation. A lot of simulation experiments verify the validity of the proposed method.
The visualization of DHSI based on the relationship model of cl and SA
Show abstract
The source and cause of cognitive load (CL) and situation awareness (SA) in digital human-system interface (DHSI)
is explained. Based on the analysis of cognitive procedure and the relation of CL and SA, The relationship model of CL
and SA in DHSI is put forward. Using the association target and the relationship model of CL and SA, the method and
strategy of information visualization of DHSI is presented which is based on the cognitive psychology. Selecting the
Boeing 757 autopilot as the case, the comparison of design is shown.
The research of network database security technology based on web service
Show abstract
Database technology is one of the most widely applied computer technologies, its security is becoming more and
more important. This paper introduced the database security, network database security level, studies the security
technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the
campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is
widely used as reference in many fields, particularly in management information system security and e-commerce.
Improved security monitoring method for network bordary
Show abstract
This paper proposes a network bordary security monitoring system based on PKI. The design uses multiple safe
technologies, analysis deeply the association between network data flow and system log, it can detect the intrusion
activities and position invasion source accurately in time. The experiment result shows that it can reduce the rate of false
alarm or missing alarm of the security incident effectively.
The study of broadband flextensional transducer
Show abstract
The Class IV flextensional transducer is a typical low frequency, high-power and small size transducer. The
bandwidth of the Class IV flextensional transducer is narrow for its high mechanical quality factor. For improving its
bandwidth capability, a configuration of broadband flextensional transducer was proposed according to the theory of
multiple-mode-coupling. The transducer driven by piezoelectric ceramic PZT-4 was designed and analyzed using finite
element software ANSYS. The transmitting voltage response of the transducer reached to 131.5dB with ripple 11dB
from 1 kHz to 6.5 kHz based on the simulated results. The purpose of extending the bandwidth of the flextensional
transducer could achieve.
The comparison of several classification algorithms and case analysis
Show abstract
This paper presents a comparison of several classification algorithms. They are statistical classification、decision
tree classification and neural networks classification. For each algorithm, we illustrate the basic procedures and its
characteristics which lead that it is used in different fields with other classification algorithms. At last, a practical case is
used to indicate the differences among these algorithms.
Implementation of object-oriented GIS data model with topological relations between spatial objects
Show abstract
Traditional GIS (Geographical Information System) data models are focused on the description of the data
organizational structure and constraints from single aspect, which are the absence or little relevance of the hierarchy and
connotation of data objects. These data models do not match the natural concept of humans about geographical spatial
data and also failed to fully consider the spatial relationships and arithmetic operations with the relationship between
geographic objects. Object-oriented technology mimics the human way of thinking as much as possible, it appears to
overcome the shortcomings of traditional software design methods and improve the stability and reusability of the
software systems. Based on the existing GIS data model, this paper introduces the basic idea of object-oriented GIS data
model combined the object-oriented methods and the vectorial expression of spatial entities, and describes the definition
and implementation of the object-oriented GIS data model. Furthermore, the topological operations between spatial
objects have been defined in the paper for the importance of topological relationships among spatial relationships. The
topological operations are directly defined in geometry classes by means of methods, and they include Touch, Disjoint,
Cross, Contains, Overlaps, and Intersects and so on.
Process improvement exploration: mapping multimedia production process to CMMI-DEV
ChienWin Lim,
Noraida Kamaruddin,
Nor Izyani Daud,
et al.
Show abstract
Multimedia takes improvement of multiple computing technologies to incorporate data from a wide variety of
resources, without involving users to know how and where the data is encoded and stored. By reason of Multimedia
applications interact with users with numerous diverse techniques and incorporate into strong applications that greatly
extend the range and strength of applications, the production process are often complicated and complex. Production of
such applications requires both process- and product-based quality assurance. Apparently, there are no universally
accepted technical production standards. Consequently, Multimedia applications have sometimes diminished the quality
of the end product, increased costs, delayed completion and failure. The focus is on the mapping between the current
practices of multimedia production process and one of universal process improvement framework, Capability Maturity
Model Integration for Development (CMMI-DEV). It shows that how current practices of multimedia production process
address the Engineering Process Areas of CMMI-DEV. For each of the relevant process areas, it then explores how
current practices can contribute to achieve the specific goals of that process area. This is practical for organizations that
have their plan-driven process based on the CMMI-DEV model and are planning to improve the current practices of
multimedia production process or to assist organization to define an innovative multimedia production process cycle
based on CMMI-DEV practices.
Finite element analysis of flextensional transducer with slotted shell
Show abstract
The study of low frequency, small size transducer was an important aspect for the development of the underwater
acoustic transducer. The Class IV flextensional transducer was a typical low frequency, high-power and small size
transducer. For decreasing its resonant frequency in the case of small size, a flextensional transducer with slotted shell
was analyzed using finite element software ANSYS. A comparison between the flextensioanl transducer with slotted
shell and the Class IV flextensional transducer was made. The maximum size of the shell is 200mm. The transmitting
voltage response of the transducer reaches to 131dB with resonant frequency 600Hz in water. The transducer could
radiate at low frequency with small size of the shell.
Research and development of HVDC remote control interface
Zi-biao Zhang,
Guo-ling Liu,
Zhan-xiao Geng
Show abstract
This paper introduces The development status quo of HVDC (high voltage direct current) power transmission
project, analyzes the overall structure of RCI (remote control interface), puts forward the function design and the
software realization. the communication message was accorded with the message defined in DL/T 634.5101-2002 /
DL/T 634.5104-2002, the RCI could meet the requirement of the HVDC power transmission project ,which was
approved, and there is guiding significance on the research of RCI of HVDC power transmission project..
The ontology model of frontCRM framework
Eko K. Budiardjo,
Wira Perdana,
Felicia Franshisca
Show abstract
Adoption and implementation of Customer Relationship Management (CRM) is not merely a technological
installation, but the emphasis is more on the application of customer-centric philosophy and culture as a whole. CRM
must begin at the level of business strategy, the only level that thorough organizational changes are possible to be done.
Changes agenda can be directed to each departmental plans, and supported by information technology. Work processes
related to CRM concept include marketing, sales, and services. FrontCRM is developed as framework to guide in
identifying business processes related to CRM in which based on the concept of strategic planning approach. This leads
to processes and practices identification in every process area related to marketing, sales, and services. The Ontology
model presented on this paper by means serves as tools to avoid framework misunderstanding, to define practices
systematically within process area and to find CRM software features related to those practices.
Agent routing algorithm in wireless sensor networks
Show abstract
Wireless sensor networks are a new technology of information acquisition and processing, so they are widely used in all kinds of fields. In the paper we introduce Agent technology into the wireless sensor network, conduct a in-depth research on the four routing schemes, and propose a new improved routing scheme, which considers the energy consumption of both nodes and path. Furthermore, The scheme we proposed has efficient routing function, can balance the energy consumption of nodes and extends the lifetime of the network in a more efficient way.
A dynamic access control method based on QoS requirement
Show abstract
A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.
Implement of time division multiplexing high speed programmable viterbi decoder IP core
Show abstract
The programmable Time Division multiplexing high Viterbi decoder IP core is studied in this paper. According to
the characteristics of multiple communication system, the method of programmable time-division multiplexing is puts
forward, the high-performance and less resource occupy IP core is designed. Based on SMIC 0.18um CMOS technology,
the ASIC of IP core is test. The test results show that the IP core areas, power and frequency could satisfy demand of
real-time communication.
Bloom filter based frequent patterns mining over data streams
JunShan Tan,
Zhufang Kuang,
Guogui Yang
Show abstract
A data streams synopses structure FPCBF, which is based on bloom filter, is proposed in this paper. Each unit of
vector BF[e] in FPCBF is a two-tuples. The transactions insert operation (InsertTran) and 1-frequent patterns pregeneration
operation (PreGenFP) is defined. Then, A data streams frequent patterns mining algorithm BFFPM which is
based on FPCBF is proposed in this paper. The BFFPM algorithm contains two parts: 1-frequent patterns generation and
r-frequent patterns generation. The problem of computing the 1-frequent patterns generation is transformed into the
problem of computing the longest common sub-sequence
α i LCS of k setting identifier sequence in BF[e] in FPCBF. In
the same way, the problem of computing the r-frequent patterns generation is transformed into the problem of computing
the longest common sub-sequence LCS r , which is the longest common sequence of the identifier sequence
α i LCS ,…,
i r LCS α +
of r items. The IBM synthesizes data generation which output customers shopping a data are adopted as
experiment data. The FPCBF algorithm not only has high precision for mining frequent patterns, but also has low
memory requirement
Fpga realization of a fatigue detection system based on the eeg analysis
Show abstract
A fatigue detection system based on EEG and it’s realization on FPGA were described in this paper, the basic
components and the related principles of each module were introduced. The difficulties and innovations in realization on
FPGA were given in details as well as some simulation results. This system can be applied to the real-time detecting of
drivers' fatigue which can provide forewarning in time. EEG is a kind of weak bioelectricity which is easily interfered by
strong noise. The acquired signal passed through a three-stage amplifier before AD converter, then the digital signal
entered FPGA. There EEG was decomposed using DWT, some coefficients were deposed as random noise, and the
signal was reconstructed to the de-noised one. Then according to the relationship between EEG and tiredness, FPGA
calculated the fatigue criterion and gave out forewarning when the value was too large.
Research and implement on separation of subchip multipath components for rssi-based location application
Show abstract
The RSSI-based location is easy to be affected by multipath interference in wireless sensor networks. The traditional
RSSI-based location methods usually increase the number of samples to resist multipath interference while few works
done on physical layer. In this paper, we study to separate subchip multipath components for RSSI-based location
application, the direct path can be separated among multipath by despreaded using the first sample of each chip, after
calculating the direct path’s power we can get the anti-multipath interference’s RSSI value. The theoretical analysis of
the performance of separating subchip multipath, signal-to-noise(SNR) losses are presented. Finally, the simulation and
experiment show the variance of RSSI value calculated by the traditional method and the proposal in this paper, the
proposed method achieves better performance than the traditional method under multipath channel environment.
The research of transplant and application of embedded operating system μc/os-ii on c51 kernel
Liangguang Li,
Cong Wang,
Shenliang Wang,
et al.
Show abstract
The paper is based on C8051F-120 hardware platforms. We analyze the real-time kernel of the embedded operating
system μC/OS-II, research the transplanted process of μC/OS-II on C51 kernel and discuss problems of transplantation.
The transplanted SCM system is applied to DC Electric Load and then we compared the transplanted SCM system with
no-transplanted SCM system. Through the test, the stability and the real-time property of the system have been improved
greatly.
A fast first-order continuation total variation algorithm for image denoising
Show abstract
This paper describes a new denoising algorithm which named Continuation total-variation denoising (CTVD)
algorithm. The algorithm is based on the novel Nesterov’s first-order method, most notably Nesterov’s smoothing
technique, tailored to the image processing application. The algorithm also introduces a fixed point continuation
technique to increase the convergence rate, and in particular when to deal with high dynamic range signals and largescale
problems.
Research on the detection technique of Bootkit
Yu Zhu,
Sheng Liu Liu,
Honghu Lu,
et al.
Show abstract
As the information security is concerned more and more, various defendable and detection tools appear abundantly
which effectively protects system from malicious software. But some new malicious software which is more stealthy and
devastating comes forth. Bootkit is a typical representation, famous for that it is underlying and injected into the bottom
of system. There are few detection methods for Bootkit. New techniques are necessary and imperative to be researched
to detect Bootkit. This paper analyzes the current situation of Bootkit and its detection technique, discusses probable
location injected by Bootkit. A detection System for Bootkit Starting up before operating system is designed. Then its
implement details are described and the effect of the detection system is validated.
Semantic-preload video model based on VOP coding
Show abstract
In recent years, in order to reduce semantic gap which exists between high-level semantics and low-level features of
video when the human understanding image or video, people mostly try the method of video annotation where in signal’s
downstream, namely further (again) attach labels to the content in video-database. Few people focus on the idea that: Use
limited interaction and the means of comprehensive segmentation (including optical technologies) from the front-end of
collection of video information (i.e. video camera), with video semantics analysis technology and corresponding
concepts sets (i.e. ontology) which belong in a certain domain, as well as story shooting script and the task description of
scene shooting etc; Apply different-level semantic descriptions to enrich the attributes of video object and the attributes
of image region, then forms a new video model which is based on Video Object Plan (VOP) Coding. This model has
potential intellectualized features, and carries a large amount of metadata, and embedded intermediate-level semantic
concept into every object. This paper focuses on the latter, and presents a framework of a new video model. At present,
this new video model is temporarily named “Video Model of Semantic-Preloaded or Semantic-Preload Video Model
(simplified into VMoSP or SPVM)”. This model mainly researches how to add labeling to video objects and image
regions in real time, here video object and image region are usually used intermediate semantic labeling, and this work is
placed on signal’s upstream (i.e. video capture production stage). Because of the research needs, this paper also tries to
analyses the hierarchic structure of video, and divides the hierarchic structure into nine hierarchy semantic levels, of
course, this nine hierarchy only involved in video production process. In addition, the paper also point out that here
semantic level tagging work (i.e. semantic preloading) only refers to the four middle-level semantic. All in all, this
research was unfolded is based on analyzed the characteristic of the existing video mode, and with reference to MPEG
series standard.
An effective method on pornographic images realtime recognition
Show abstract
In this paper, skin detection, texture filtering and face detection are used to extract feature on an image library, training
them with the decision tree arithmetic to create some rules as a decision tree classifier to distinguish an unknown image.
Experiment based on more than twenty thousand images, the precision rate can get 76.21% when testing on 13025
pornographic images and elapsed time is less than 0.2s. This experiment shows it has a good popularity. Among the steps
mentioned above, proposing a new skin detection model which called irregular polygon region skin detection model based
on YCbCr color space. This skin detection model can lower the false detection rate on skin detection. A new method called
sequence region labeling on binary connected area can calculate features on connected area, it is faster and needs less
memory than other recursive methods.
The study of a heuristic way buffer strategy under nitrogen migration peer-to-peer network
Show abstract
This paper proposed one kind of heuristic way buffer strategy, causes it to suit with isomerism migration peer-to-peer
network environment. It is one kind of strong node first adaptation nitrogen migration computation environment way
buffer strategy. Through the use way buffer helps the node to seek which has the request data node, may reduce the data
gain the time. This article to its concrete theory and method has conducted detailed research, and finally using the
concrete simulation experiment to carry on the confirmation analysis.
Directivity calculation for acoustic transducer arrays with considering mutual radiation impedance
Show abstract
A modified method is proposed for acoustic array directivity calculation. In this method, a series of solution for
mutual radiation impedance between array elements has been obtained, the radiation sound field of the array is modified
considering mutual radiation impedance, and a new formulation for array directivity calculation is derived from that
modification. Simulation examples show that there are notable differences between cases of considering and ignoring the
mutual radiation impedance in array directivity calculation. The consideration of mutual impedance effects is necessary
in acoustic array directivity calculation.
A low complexity halo reduction method for motion compensated frame interpolation
Show abstract
This paper proposed a low complexity halo reduction method for motion compensated frame interpolation which
bases on only two successive frames. An improved forward and backward jointing motion estimation method that
features a faster convergence speed is utilized to produce the motion vector fields of the original frames. These motion
vector fields are retimed to the to-be-interpolated frame to calculate the motion vector field for interpolation and to get
the coarse location of the new exposed areas. Through analyzing the relationship of the adjacent motion vectors, two
general equations are generated for the covered and uncovered blocks, and occlusion areas are further refined. Finally,
unidirectional interpolation and bi-directional interpolation are combined to avoid the halos and block artifacts.
Experimental results show that the proposed algorithm achieves much better image quality than that without halo
reduction processing.
Face recognition with support vector machine
Jian Zhang
Show abstract
Face detection and recognition have received much interest over pass ten years due to the many applications range
from access control to driver’s licenses. In general, face recognition systems can be classified as: geometric featurebased
approaches, template matching and neural approaches. One main drawback of geometric feature-based
approaches is not easy to extract and measure the feature. Compared to geometric feature-based approaches, a templatebased
approach recognizes faces as a whole. The main idea of these methods is to transform the face image into a low
dimensional space. Although the approach of template matching and neural are very efficient, the computation is more
complex compared to other algorithms. Support Vector Machines recently have been regarded as an effective statistical
learning method for pattern recognition. In this paper, we introduce a support vector machine for face recognition. Next,
we have shown the experiment result using the polynomial kernel.
An algorithm of moving object detection based on texture and color model
Show abstract
In this paper, we propose an algorithm for Moving Object Detecting which can remove influence of shadow and
illumination change. The algorithm is based on background subtraction using color and texture information, we establish
a texture model based on LBP (local binary pattern) for each pixel, and adopt a newly developed photometric invariant
color measurement to description color information, Use a similarly pixel-based models update algorithm that proposed
by Stauffer et al, but the difference is that we use a novel ‘hysteresis’ scheme for update of the weight. We use two layer
process in foreground detecting, at the pixel layer, through the texture and color model we mentioned above to divide the
each pixel to background or foreground, at the another layer, calculate the LBP texture information for the foreground
regions boundaries which come out by color model subtraction, through comparing them to texture information come out
by texture model for the foreground regions boundaries to remove fault detect of foreground.
Temporal correlation based data aggregation scheme in wireless sensor networks
Show abstract
In many environmental monitoring applications, since the data periodically sensed by wireless sensor nodes usually
are of high temporal redundancy, prediction based data aggregation is an important approach for reducing data
communication and saving sensor nodes’ energy. We proposed a temporal correlation based data aggregation scheme in
this paper which utilizes time series model to predict the data of next several periods at both ordinary sensors and
aggregators based on the same amount of recent sensed values. We show through experiments that our proposed scheme
can provide considerable aggregation ratio while maintaining a low prediction error rate.
Research on remote stress test system of lifting machinery metal structure
Show abstract
This paper introduces a new remote wireless stress testing system, wireless sensor network node principle and key
technology are discussed in this system, combining with WSN (wireless sensor networks) technology and GPRS
network data transmission technology, realizing the remote testing of lifting machinery metal structure. to MDEL900B
handling machine for the testing object, on the base of finite element analysis, test the metal structure stress of key parts
on the MDEL900B handling machine in working condition, by comparition between the results of test and finite element
analysis , the reliability of the testing system is shown .
Abel description and implementation of cyber net system
Show abstract
Cyber net system is a subclass of Petri Nets. It has more powerful description capability and more complex
properties compared with P/T system. Due to its nonlinear relation, it can’t use analysis techniques of other net systems
directly. This influences the research on cyber net system. In this paper, the author uses hardware description language to
describe cyber net system. Simulation analysis is carried out through EDA software tools to disclose properties of the
system. This method is introduced in detail through cyber net system model of computing Fibonacci series. ABEL
source codes and simulation wave are also presented. The source codes are compiled, optimized, fit design and
downloaded to the Programmable Logic Device. Thus ASIC of computing Fibonacci series is obtained. It will break a
new path for the analysis and application study of cyber net system.
Web page classification based on a binary hierarchical classifier for multi-class support vector machines
Show abstract
Web page classification is one of the essential techniques for Web mining. This paper proposes a binary hierarchical
classifier for multi-class support vector machines for web page classification. This method applies truncated singular
value decomposition on the training data that reduces its dimension and the noise data. After the truncated singular value
decomposition on the training data, it uses the improved k-means algorithm design the binary hierarchical structure, the
improved k-means algorithm makes the separability of one macro-class is the smallest, makes the separability of two
macro-classes is the largest. The result of experiment performed on the training datasets shows that this algorithm can
enhance precision of web page classification.
Improved image retrieval based on fuzzy colour feature vector
Show abstract
One of Image indexing techniques is the Content-Based Image Retrieval which is an efficient way for retrieving images from the image database automatically based on their visual contents such as colour, texture, and shape. In this paper will be discuss how using content-based image retrieval (CBIR) method by colour feature extraction and similarity checking. By dividing the query image and all images in the database into pieces and extract the features of each part separately and comparing the corresponding portions in order to increase the accuracy in the retrieval. The proposed approach is based on the use of fuzzy sets, to overcome the problem of curse of dimensionality. The contribution of colour of each pixel is associated to all the bins in the histogram using fuzzy-set membership functions.
As a result, the Fuzzy Colour Histogram (FCH), outperformed the Conventional Colour Histogram (CCH) in image retrieving, due to its speedy results, where were images represented as signatures that took less size of memory, depending on the number of divisions. The results also showed that FCH is less sensitive and more robust to brightness changes than the CCH with better retrieval recall values.
A tool for learning the programming style of java
Masayuki Arai
Show abstract
We developed a tool for learning the programming style of Java. The tool has the following functions: (1) recommends the use of CamelCase and English words for the names of classes, methods, and variables; (2) recommends setting the correct scope level of variables and the appropriate length of variable names; (3) recommends writing comments in source programs; (4) shows sample source programs according to the programming style of Java.
A new metric method-improved structural holes researches on software networks
Bo Li,
Hai Zhao,
Wei Cai,
et al.
Show abstract
The scale software systems quickly increase with the rapid development of software technologies. Hence, how to understand, measure, manage and control software structure is a great challenge for software engineering. there are also many researches on software networks metrics: C&K, MOOD, McCabe and etc, the aim of this paper is to propose a new and better method to metric software networks. The metric method structural holes are firstly introduced to in this paper, which can not directly be applied as a result of modular characteristics on software network. Hence, structural holes is redefined in this paper and improved, calculation process and results are described in detail. The results shows that the new method can better reflect bridge role of vertexes on software network and there is a significant correlation between degree and improved structural holes. At last, a hydropower simulation system is taken as an example to show validity of the new metric method.
B-tree search reinforcement learning for model based intelligent agent
Show abstract
Agents trained by learning techniques provide a powerful approximation of active solutions for naive approaches. In this study using B – Trees implying reinforced learning the data search for information retrieval is moderated to achieve accuracy with minimum search time. The impact of variables and tactics applied in training are determined using reinforcement learning. Agents based on these techniques perform satisfactory baseline and act as finite agents based on the predetermined model against competitors from the course.
Macromolecular extraction based on contour evolution
Show abstract
Detecting the region of interest plays an important role in the field of image processing and analysis. For the
microscopic image of plant embryo slice, region of interest usually indicates various cells or macromolecules.
Combining contour evolution theory and pulse coupled neural network, we propose a new method of macromolecular
detection and extraction for biological microscopic image. Some existing methods are compared with the proposed
method. Experimental results show the proposed method has the better performance than existing methods.
A multiphase clock generation based on dll for source synchronous receiver in 65nm CMOS technology
Show abstract
This paper presents a multiphase clock generation circuit (MPCG) using delay locked loop (DLL). In order to
achieve process independence, fixed bandwidth to operating frequency ratio, broad tuning range, and low jitter, the DLL
design is based on self-biased technique augmented with jitter attenuation technique, which can achieve precise delay
equal to the input reference clock period. Simulated in 65nm CMOS technology, the MPCG achieves an operating
frequency range of 1.8GHz to 4GHz. And the MPCG will generate eight clocks evenly spaced by 45 degrees. At
2.5GHz, its peak to peak jitter with quiescent supply is 10ps, and its power consumption is 11mW.
The research on the train control system based on wireless communications
Show abstract
With an analysis of the working principle, the basic characteristics and the key technologies of the
Communications-Based Train Control (CBTC) system, this paper gives a CBTC system model. This model can cut down
the control sections and enhance the transport capacity significantly.
A biometric signcryption scheme without bilinear pairing
Show abstract
How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the
management of keys is a hot research area. Utilizing Dodis’s fuzzy extractor method and Liu’s original signcryption
scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient
than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation
and modular exponentiation computation which is time consuming largely. The analysis results show that under the
CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability
simultaneously.
PLC based automatic control of pasteurize mix in ice cream production
Show abstract
This paper describes the automatic control device of pasteurized mix in the ice cream production process.We design
a scheme of control system using FBD program language and develop the programmer in the STEP 7-Micro/WIN
software, check for any bugs before downloading into PLC .These developed devices will able to provide flexibility and
accuracy to control the step of pasteurized mix. The operator just Input the duration and temperature of pasteurized mix
through control panel. All the steps will finish automatically without any intervention in a preprogrammed sequence
stored in programmable logic controller (PLC). With the help of this equipment we not only can control the quality of ice
cream for various conditions, but also can simplify the production process. This control system is inexpensive and can be
widely used in ice cream production industry.
A face recognition algorithm based on ASM and gabor features of key points
Show abstract
In this paper, an algorithm of face recognition based on the active shape model (ASM) and Gabor features of key
points was proposed. Firstly AdaBoost algorithm was used to detect the face region in an image. Then the ASM was
used to localize the key feature points in the detected facial region. The Gabor features of these points were extracted.
Finally the features were classified using support vector machines (SVM). Preliminary experiments on ORL database
show promising results of the proposed algorithm. This algorithm can reduce the computational cost efficiently and
obtain the features that contribute to classification of faces.
The study on normalization algorithm applied to the character recognition system
Show abstract
In this paper, it’s research hard on the normalization algorithm of image preprocessing. It proposes that
normalize the size of a single character at first, and then thin this character, make an amendment to the framework
image at last. Experimental results indicate that this method is validate and lays a solid foundation for consequence
processing of the Chinese character recognition.
Security model for vm in cloud
Venkataramana Kanaparti,
Naveen Kumar R.,
Rajani S.,
et al.
Show abstract
Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to
reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and
applications to be stored away from own corporate server, it brings more issues in security such as virtualization
security, distributed computing, application security, identity management, access control and authentication. Even
though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security
threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC)
in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is
designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP
systems, Image processing which requires huge resources in cloud deployed on one or more VM’s.
Research for binarization of uneven illumination text image
Show abstract
For the binarization of text image captured under uneven illumination,the article propose a new methods which
combines gray value statistics with global threshold to remove uneven illumination effects.The method uses the gray
value statistics method to extract the background image, so that the original subtract the background. Finally to get
binary image by using improved simple statistical global threshold method. The experimental results show that this
method not only retains the advantages of global threshold such as simpleness and efficient, but also has the advantages
of the local threshold which retains the details of the character strokes well and avoids the disconnection and
shade.Thereby the method improves the recognition efficiency of the binary text.
State of art and key problems of OOP for FE programming in engineering analysis
Show abstract
Object-oriented programming (OOP) has been the most important development method, especially for huge and
complicated program systems, since OOP can overcome structural complexity of code, strong coupling among modules
and poor maintenance shortcomings in traditional structural programming. Since B.W.R.Forde applied OOP to Finite
Element (FE) firstly in 1990, the research in this field has not been stopped. Scholars have taken many positive and
useful attempts on study of OOP in FE programming from different aspects. The state of the art of OOP in FE and
current development has been reviewed, and the key problems in the OOP FEM fields thus are pointed out, thus
prospects of OOP in FE code design are put forward.
Performance evaluation of 2-hop multicast coded relay network
Show abstract
In this paper, the joint network-channel coding performance of dual hop two-way multicast relay network is
compared with one-way coded multicast relay scheme. Multicast Relay transmission scheme is a type of transmission
scheme in which two fixed relay nodes contribute in the second hop of end-to-end transmission between BTS and a pair
of Mobile stations. It is assumed that there is no direct link transmission between BTS and mobile stations due to high
shadowing caused by obstacles or long distance between them. It is worth notifying that the end-to-end throughput
achieved by one-way coded multicast scheme with diversity combining is better than two-way multicast scheme at low
SNR values.
The output amplitude prediction of crystal oscillator
Yan Wang,
Xianhe Huang
Show abstract
Crystal oscillator is an important component of the microwave and RF devices. One of the most important
characteristics of crystal oscillators is phase noise spectrum. Phase noise within the half-bandwidth of the loop is closely
related to the loaded quality factor QL. According to our research about Pierce oscillator circuit, we can derive that phase
noise improves with increasing QL and an appropriate increase in the value of collector-to-ground capacitance C1 can
improve QL. However, to change the value of C1 also affects the output amplitude of oscillation circuit. In the paper, the
method of predicting output amplitude is presented and a prototype 50 MHz AT-cut 3rd overtone Pierce low phase noise
crystal oscillator is designed. The output amplitude variation versus the value of C1 can be obtained with MATLAB. On
the premise of specific value of C1, the values of other circuit parameters are changed to make sure that output amplitude
is maintained in the required value range. A design of the prototype 50MHz Pierce crystal oscillator is presented and the
experiments are carried out. The measurement phase noise results are -126 dBc/Hz@100Hz and -151 dBc/Hz@1KHz.
Experimental result shows it is necessary to predict the output amplitude of crystal oscillators.
Simulation and analysis of video stream transmission based on decodable frame ratio model in wireless network
Shuru Liu,
Fangmei Liu,
Zengyu Cai
Show abstract
This paper mainly studied the video streaming transimission in 802.11b/e wireless network and proposed two
methods of quality assessment: one is objective quality assessment method based on PSNR and the other is the method
based on the decodable frame ratio model. In order to analyze the effect of transmission, this paper building simulation
model in ns2 and verify the performance of video streaming transimission in wireless networks. The method of the
simulation analysis provides the beneficial reference for the wireless network of more effectively in multimedia data
transmission.
Modulational instability of nonlinear optical lattice based on the soliton solution
Show abstract
Based on the exact periodic and soliton solution, the modulation instability (MI) of nonlinear optical lattice with an
elliptic function potential has been investigated. The general perturbation coupled equations based on the solutions were
obtained, and then were solved by numerical method. It can be found that the perturbation can be affected by the
parameters of the optical lattice because the soliton solution depends sensitively on the optical lattice. The modulation
depth V affects the amplitude of gain spectrum, while modulation periodic κ affects both the amplitude and fastest
growth frequency of gain spectrum.
A new intrusion prevention model using planning knowledge graph
Zengyu Cai,
Yuan Feng,
Shuru Liu,
et al.
Show abstract
Intelligent plan is a very important research in artificial intelligence, which has applied in network security. This
paper proposes a new intrusion prevention model base on planning knowledge graph and discuses the system
architecture and characteristics of this model. The Intrusion Prevention based on plan knowledge graph is completed by
plan recognition based on planning knowledge graph, and the Intrusion response strategies and actions are completed by
the hierarchical task network (HTN) planner in this paper. Intrusion prevention system has the advantages of intelligent
planning, which has the advantage of the knowledge-sharing, the response focused, learning autonomy and protective
ability.
Acoustic source localization using time-difference of arrival and neural-network analysis
Nan Jiang,
Jiancheng Dong,
Ren Dong Ying
Show abstract
The developing embedded technology requires revolutions in human-machine interaction. In this paper, we propose a
novel method using localization of the taping sound on the table to replace the keyboard as manual input device. The
method is applicable with a quad-channel-array collection of acoustic signals, from which the time-of-arrival differences
and the position information could be estimated. In practice, as our table is in a limited size and the material properties
are complex, the traditional localization algorithm based on time-of-arrival differences contains a sizable margin for error.
Furthermore, we use neural-network analysis to improve recognition accuracy. Then experiments and simulations are
carried out to verify this signal processing algorithm.
A design of 12-bit full differential successive approximation ADC
Wei Gao,
Lei Zhang,
Xinghua Wang,
et al.
Show abstract
A 12-bit full differential successive approximation anolog-to-digital convertor (SAR ADC) with low power
dissipation is proposed in this paper. The comparator is a crucial part in SAR ADC, and its accuracy, speed and offset
have an effect on the performance of ADC. In this paper, a multi-stage comparator is designed, which is composed of
three stage amplifiers and a latch,and the offset calibration technique is applied, too. The DAC consists of 64 unit
capacitors. The circuit is designed under TSMC CMOS 0.18μmrf process. The simulation results show that under a 3.3V
power supply, the performance of SNDR reaches nearly 71.25dB and the SFDR reaches nearly 80.97dB with the
condition that the sampling frequency is 0.67MHz. The power consumption of SAR is about 4.5mW.
A method of optical ultra-wideband doublet pulse generation based on SOA-XGM and SOA-SGS
Xin Chen,
Yalin Guan,
Xinqiao Chen,
et al.
Show abstract
Photonic generation of ultra-wideband (UWB) pulse technology is the key technology of UWB-over-fiber system.
The effect of nonlinearity in semiconductor optical amplifier (SOA) is widely applied in the area of all-optical signal
processing. A method is proposed to generate UWB doublet pulse using cross-gain modulation (XGM) of SOA and self
gain-saturation (SGS) effect of SOA. In this method, the UWB monocycle pulse is generated by SOA-XGM, and the
UWB doublet pulse is generated by utilizing the generated UWB monocycle pulse and gain saturation effect of another
SOA. According to the proposed method, we obtained the UWB doublet pulse by utilizing photonic simulation software.
The center frequency is 4.85GHz and the fraction bandwidth is 122%, it meets the criterion of FCC.
Research on evaluation techniques for immersive multimedia
Show abstract
Nowadays Immersive Multimedia covers most usage in tremendous ways, such as healthcare/surgery, military,
architecture, art, entertainment, education, business, media, sport, rehabilitation/treatment and training areas. Moreover,
the significant of Immersive Multimedia to directly meet the end-users, clients and customers needs for a diversity of
feature and purpose is the assembly of multiple elements that drive effective Immersive Multimedia system design, so
evaluation techniques is crucial for Immersive Multimedia environments. A brief general idea of virtual environment
(VE) context and ‘realism’ concept that formulate the Immersive Multimedia environments is then provided. This is
followed by a concise summary of the elements of VE assessment technique that is applied in Immersive Multimedia
system design, which outlines the classification space for Immersive Multimedia environments evaluation techniques
and gives an overview of the types of results reported. A particular focus is placed on the implications of the Immersive
Multimedia environments evaluation techniques in relation to the elements of VE assessment technique, which is the
primary purpose of producing this research. The paper will then conclude with an extensive overview of the
recommendations emanating from the research.
Analysis of electromagnetic interference between MTL based on FDTD
Lianqing Zhao,
Xiaomeng Duan,
Yuanxun Chen
Show abstract
According to the Maxwell equations and multiconductor transmission line (MTL) theory, create a model of wires
under the electric dipole excitation, and analyze their transient electromagnetic response, then study the property of MTL
on the basis of this model, discuss the interference of two parallel wires by using the time domain finite difference
method(FDTD).Implement the one-dimensional FDTD iterative algorithm based on MATLAB, and study the problem of
electromagnetic interference(EMI) between two parallel wires under different excitation source.
Class diagram based evaluation of software performance
Show abstract
The evaluation of software performance in the early stages of the software life cycle is important and it has been
widely studied. In the software model specification, class diagram is the important object-oriented software
specification model. The measures based on a class diagram have been widely studied to evaluate quality of
software such as complexity, maintainability, reuse capability, etc. However the software performance evaluation
based on Class model has not been widely studied, especially for object-oriented design of embedded software.
Therefore, in this paper we propose a new approach to directly evaluate the software performance based on class
diagrams. From a class diagram, we determine the parameters which are used to evaluate and build formula of the
measures such as Size of Class Variables, Size of Class Methods, Size of Instance Variables, Size of Instance
Methods, etc. Then, we do analysis of the dependence of performance on these measures and build the performance
evaluation function from class diagram. Thereby we can choose the best class diagram based on this evaluation
function.
A modified adaptive algorithm of dealing with the high chirp when chirped pulses propagating in optical fiber
Show abstract
In this paper, we propose a modified adaptive algorithm (MAA) of dealing with the high chirp to efficiently simulate
the propagation of chirped pulses along an optical fiber for the propagation distance shorter than the “temporal focal
length”. The basis of the MAA is that the chirp term of initial pulse is treated as the rapidly varying part by means of the
idea of the slowly varying envelope approximation (SVEA). Numerical simulations show that the performance of the
MAA is validated, and that the proposed method can decrease the number of sampling points by orders of magnitude. In
addition, the computational efficiency of the MAA compared with the time-domain beam propagation method (BPM)
can be enhanced with the increase of the chirp of initial pulse.
Research on invulnerability of equipment support information network
Xiao Sun,
Bin Liu,
Qigen Zhong,
et al.
Show abstract
In this paper, the entity composition of equipment support information network is studied, and the network abstract
model is built. The influence factors of the invulnerability of equipment support information network are analyzed, and
the invulnerability capabilities under random attack are analyzed. According to the centrality theory, the materiality
evaluation centralities of the nodes are given, and the invulnerability capabilities under selective attack are analyzed.
Finally, the reasons that restrict the invulnerability of equipment support information network are summarized, and the
modified principles and methods are given.
MR images denoising using DCT-based unbiased nonlocal means filter
Show abstract
The non-local means (NLM) filter has been proven to be an efficient feature-preserved denoising method and can be
applied to remove noise in the magnetic resonance (MR) images. To suppress noise more efficiently, we present a novel NLM
filter by using a low-pass filtered and low dimensional version of neighborhood for calculating the similarity weights. The
discrete cosine transform (DCT) is used as a smoothing kernel, allowing both improvements in similarity estimation and
computational speed-up. Experimental results show that the proposed filter achieves better denoising performance in MR
Images compared to others filters, such as recently proposed NLM filter and unbiased NLM (UNLM) filter.
Localization of buildings in airborne forward-looking infrared image using template matching method
Show abstract
This paper proposes a new approach to localize buildings from forward looking infrared (FLIR) images. The proposed approach can localize not only large buildings, but also small buildings. Furthermore, the proposed approach is also robust with those FLIR images degraded by clouds. This breakthrough is due to the following improvements: (1) the Histogram of Oriented Gradients approach is improved to match FLIR images with our templates; (2) a new kind of feature image is presented to reduce the difference between template and target; (3) we project 3D building models into images, with different colors on different sides, distinguishing those sides apart; (4) we generate templates which contain all buildings in the visual field. As a result, the FLIR images can be matched with the big templates at a high correct rate, and then target buildings can be localized. The experimental results show the superior performance of the proposed approach.
An empirical evaluation of exemplar based image inpainting algorithms for natural scene image completion
Show abstract
Image inpainting is the process of filling in of missing region so as to preserve its overall continuity. Image inpainting is manipulation and modification of an image in a form that is not easily detected. Digital image inpainting is relatively new area of research, but numerous and different approaches to tackle the inpainting problem have been proposed since the concept was first introduced. This paper analyzes and compares two recent exemplar based inpainting algorithms by Zhaolin Lu et al and Hao Guo et al. A number of examples on real images are demonstrated to evaluate the results of algorithms using Peak Signal to Noise Ratio (PSNR).
A method for synthesizing pattern with broad null
Zhuanwu Zeng,
Liqiang Zhang,
Longyang Huang,
et al.
Show abstract
Based on the Gram-Schmidt orthogonalization method utilized for pattern synthesis of linear array without
constraints, side lobe levels constraints in certain angular region is proposed to implement pattern synthesis with broad
nulls. The advantage of the simplified computation resulted from steering vector orthogonalization in unconstrained
orthogonal approach is maintained, and the uniform or non-uniform linear array pattern synthesis can be realized by this
method. The computational complexity of this method is smaller than iterative algorithm method’s. The experimental
results show that the side lobe levels constrained orthogonal approach can fulfill linear array broad null pattern synthesis
with less computational efforts.
Improved temporal error concealment algorithm for h.264
Show abstract
The compressed video stream transmission is a challenging task due to loss-prone, time-varying and limitation
bandwidth characteristics. In this paper, improved temporal error concealment based on boundary matching algorithm is
presented, we use an optimized mode selection for the lost macroblock based on candidate motion vector set, and adopt
an improved BMA to estimate lost macroblock motion vectors for H.264 coded video. Experimental results show that
improved temporal error concealment algorithm gets better video quality over a large set of operating conditions.
Probabilistic teleportation of the three-particle w entangled state via nonmaximally entangled cluster state
Show abstract
A scheme of teleportation of the three-particle W entangled state via nonmaximally entangled Cluster state is
proposed in the paper. Firstly, an auxiliary particle is introduced, and two particles in quantum channel carry out CNOT
operation on it; secondly, distorted state caused by nonmaximally entangled quantum channel can be recovered by
constructing unitary transform matrix; finally, the teleportation of entangled W state can be achieved with probability.
The Bell measurement can be reduced and the resource of quantum channels can be saved for using one entangled
Cluster state as quantum channel.
Design of sewage treatment system by applying fuzzy adaptive PID controller"
Show abstract
In the sewage treatment system, the dissolved oxygen concentration control, due to its nonlinear, time-varying, large
time delay and uncertainty, is difficult to establish the exact mathematical model. While the conventional PID controller
only works with good linear not far from its operating point, it is difficult to realize the system control when the
operating point far off. In order to solve the above problems, the paper proposed a method which combine fuzzy control
with PID methods and designed a fuzzy adaptive PID controller based on S7-300 PLC .It employs fuzzy inference
method to achieve the online tuning for PID parameters. The control algorithm by simulation and practical application
show that the system has stronger robustness and better adaptability.
An integrated l-band transceiver in 0.35um sige for radar applications
Show abstract
An integrated high linear L-band transceiver with an on-chip fault detector is demonstrated. The
transmitter and receiver exhibit an output 1dB compression point (OP1dB) of 12dBm and 15dBm
respectively under 3.3V operation voltage. The transceiver has high linearity and low power
consumption. The transceiver works at a time division mode by adopting an on-chip switch for radar
applications. The measurement result shows an isolation of 64dBc between the transmitter and
receiver. The transceiver is fabricated in a standard 0.35 um SiGe technology with a chip area of 2.5
mm × 3.3 mm, including contact pads.
Simulation research on three-dimensional immune GA used to solve TP
Show abstract
Timetabling Problem (TP) in colleges and universities has become more important and complicated with the further
reform in teaching and growing expansion of recruitment scale. In this paper, an optimized mathematical model of TP
was established .The framework structure to solve TP was found. According to characteristics of TP, GA was introduced,
a variety of improved schemes were designed, include: three-dimensional coding scheme, fitness function design scheme,
immunization strategy. Simulation results show that the proposed GA can satisfy multiple constraint conditions and
resolve TP more effectively.
Teleportation of a three-particle entangled GHZ state via a two-particle entangled quantum channel
Show abstract
A scheme of teleportation of a three-particle entangled GHZ state through a two-paticle entangled quantum channels
is proposed. the two-particle nonmaximally entangled state is taken as quantum channels, We find that by implementing
H transformation and von Neumann measurement,introducing an ancilly qubit, constructing an unitary transformation
properly, teleportation of three-paticle entangled GHZ state can be implemented with certain probability. This scheme
saves the quantum entanglement channel resources comparing with other shemes.
A review on “A novel technique for image steganography based on block-DCT and Huffman encoding”
Show abstract
This paper reviews the embedding and extraction algorithm proposed by “A. Nag, S. Biswas, D. Sarkar and P. P.
Sarkar” on “A Novel Technique for Image Steganography based on Block-DCT and Huffman Encoding” in
“International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010” [3] and
shows that the Extraction of Secret Image is Not Possible for the algorithm proposed in [3]. 8 bit Cover Image of size
is divided into non joint blocks and a two dimensional Discrete Cosine Transformation (2-D DCT) is
performed on each of the blocks. Huffman Encoding is performed on an 8 bit Secret Image of size and
each bit of the Huffman Encoded Bit Stream is embedded in the frequency domain by altering the LSB of the DCT
coefficients of Cover Image blocks. The Huffman Encoded Bit Stream and Huffman Table
Face recognition with directional ternary pattern (DTP)
Show abstract
This paper presents an effective and robust facial feature descriptor based on the directional ternary pattern (DTP) for
face recognition. The DTP operator encodes the texture information of a local region by labeling the edge response
values in all eight directions around a pixel with three different levels. The coding scheme exploits a threshold in order to
differentiate between smooth and high-textured face regions while forming the ternary code. The location and occurrence
information of the DTP micro-patterns within the facial image is then used as the feature descriptor. The effectiveness of
the proposed method is evaluated with the FERET face image database using template matching (TM). Extensive
experiments show the superiority of the DTP feature descriptor against some well-known local pattern-based feature
representation methods.
Kinect based body posture detection and recognition system
Show abstract
A multi-class human posture detection and recognition algorithm using Kinect based geometric features is
presented. The three dimensional skeletal data from the Kinect is converted to a set of angular features. The postures are
classified using a support vector machines classifier with polynomial kernel. Detection of posture is done by
thresholding the posture probability. The algorithm provided a recognition accuracy of 95.78% when tested using a 10
class dataset containing 6000 posture samples. The precision and recall rates of the detection system are 100% and
98.54% respectively.
Progressive diversity allocation for progressive transmission of spiht packets in erasure channels
Show abstract
The SPIHT (set partitioning in hierarchical trees) algorithm, which works with the aid of the discrete wavelet
transform (DWT), is one of the most renowned techniques for image compression. One problem with SPIHT image
coding, especially when image transmission is involved, is that even just as few as one error in the embedded code
sequence can render the decoded image completely unrecognizable. In this paper, we propose a scheme in which an
SPIHT code sequence is packetized into two types: CP (critical packet) and RP (refinement packet). Then, we address
the transmission of those SPIHT packets over erasure channels. The basic idea is to provide unequal error protection
(UEP) to those packets by diversity (i.e., repeated transmissions) so that, at the receiver, the decoded image quality
(measured in the expected SNR, signal-to-noise-ratio) is as good as possible. A diversity allocation (DA) algorithm,
referred to as progressive diversity allocation (PDA), is proposed. It works in a fashion and is naturally compatible with
the progressive transmission of SPIHT-encoded images. Experiments show that the PDA scheme produces good results,
nearly as good as achieved by the method of full search.
Rectification-adapted snake for complex-boundary segmentation in noisy images
Din-Yuen Chan,
Roy Chaoming Hsu,
Pang-Hao Wu,
et al.
Show abstract
In this paper, a contour-fitness improved adaptive snake, namely, edge-conducted rectification-adapted snake
(ECRA-snake) is proposed for segmenting complex-boundary objects in the noisy image. The ECRA-snake includes a
main ingredient called edge-conducted evolution (ECE), where the adaptations of model coefficients can accommodate
ECE itself to the characteristics of salient edges for better curve fitting in tracking. Following ECE, a direction-induced
rectification evolution (DIRE) will correct boundary-unmatched snake fragments by handling the initial direction and the
tensile-force weighting of unqualified snaxels in this snake re-evolution. Simulation results demonstrate that the
proposed ECRA-snake can obtain better object-boundary coincidence than the Gradient Vector Flow (GVF) model in
segmenting the complex-boundary object from noisy images.
Application of wireless sensor network based on zigbee technology in photo-bioreactors system
Show abstract
A photo-bioreactor is a bioreactor that incorporates some types of light source to provide photonic energy input into
the reactor[1][2]. In the situation of Large-scale industrialization production of micro-algae, hundreds of
photo-bioreactors will be deployed in a factory, thus the design of entire system is based on the distribution theory and
the remote monitoring must be deployed. So the communication in the entire photo-bioreactors system is very important.
However, the recent solution of communication is based on RS-485 data bus, and the twisted-pair cable is used as the
communication medium, so the flexibility and scalability of entire system reduce. In this paper, the wireless sensor
network (WSN) based on ZigBee technology is applied to this photo-bioreactors system, and the related key problems
include the architecture of entire system and the design of wireless sensor network nodes[3]~[6]. The application of this
technology will also reduce the cost and effectively raise the intelligence level of the large-scale industrialization
photo-bioreactors system.
Co-brand strategy of evaluation of visual images in furniture design: Jimmy S.P.A. and Strauss as examples
Tien-Li Chen,
Fang-Ming Pan,
Jen-Hui Tsai
Show abstract
This study aimed to investigate the correlation of the image associated by the design Co-Brand (Jimmy S.P.A. and STRAUSS) and the impression perceived by subject of viewers. Visual images were used to examine the merit of the evaluation. The best result is provided using an object as an appropriate evaluation method. There are a lot of factors which influence to evaluation of a design. This study is limited to distinguish the appearance from Jimmy’s picture books transform furniture and so on. Co-Brand of Jimmy S.P.A. and STRAUSS is not easy because there are not from the same cultural, and industry background and applying different marketing strategy, it is a way to combine the two brands by designing, used questionnaire of SD (Semantic differential evaluation) evaluation method to test out the perception of viewers, the objective of this study is to investigate and appraised the Co-Brands use by of the image in furniture from patrons. SD evaluation result showed, if design cannot understand the perception image of Jimmy S.P.A and STRAUSS with viewers mind, furniture design also can’t transmit feeling with design.
Distributed graph visualization on tiled displays
Show abstract
In this paper, we propose a distributed force-directed layout algorithm in order to handle large graph data on tiled
display that consists of multiple computing machines and multiple displays connected to each computing machine
through Ethernet. The distributed tiled display makes one big screen using multiple displays in order to discern data
obviously. Besides, multiple computing devices on tiled displays share the parts of an entire dataset. Therefore, it can
dramatically reduce the processing time to visualize data on screen compared with the processing time on a single
machine.
An improved Canny edge detection algorithm combined with steering kernel regression
Show abstract
In this paper, we propose a method which combines Canny edge detection and steering kernel regression[5]. As the
primary features for extraction by low-level processing techniques, edges are the starting points for many computer
vision applications. During the past years, there had been many edge detection algorithms proposed. As an almost
standard framework, canny edge detector is widely used in image processing area and often checked by other algorithms
for their validity as an almost standard framework. But, due to the deficiency of using direct gradient estimation ( usually
the gray-value difference),classical canny method is vulnerable to noise. For overcoming this problem, we combine the
steering kernel estimation with the canny edge detection which taking both the spatial and radiometric information into
count simultaneously. And the experiment results perform better than classical edge detection method on detail reserving
and positioning accuracy under the effect of different kinds of noise.
Research of ftp file traversal method based on breadth-first search
Show abstract
This paper analyzed FTP protocol and traversal arithmetic of graph, compared applicability of depth-first search and
breadth-first search, depiction the method of FTP file traversal based on Breadth First Search, and built the FTP search
engine by this method.
Existence and successive iteration of positive solutions to a third-order three-point boundary value problem
Show abstract
In this paper, several existence results of positive solutions are obtained for a class of third-order three-point
boundary value problems with p-Laplacian. By applying a monotone iterative method, not only we obtain the existence
of positive solutions for the problem, but also establish the corresponding iterative schemes.
Subscription merging in filter-based publish/subscribe systems
Show abstract
Filter-based publish/subscribe systems suffer from high subscription maintenance cost for each broker in the system
stores a large number of subscriptions. Advertisement and covering are not sufficient to conquer such problem. Thus,
subscription merging is proposed. However, current researches lack of an efficient and practical merging mechanism. In
this paper, we propose a novel subscription merging mechanism. The mechanism is both time and space efficient, and
can flexibly control the merging granularity. The merging mechanism has been verified through both theoretical and
simulation-based evaluation.
Control theory of physical simulation on waterflooding in fractured reservoir: the similarity criteria
Show abstract
Similarity criteria are the control theory of physical simulation, which is very important to researches on
waterflooding mechanism of fractured reservoirs. With using equation analysis and taking into account gravity, viscous
force and matrix-fracture imbibition, similarity criteria of physical simulation about waterflooding in fractured reservoirs
are developed according to similarity theory. The similarity criteria include: ratio of fracture permeability in x, y and z
directions, oil-water viscosity ratio, matrix-fracture movable oil ratio, dimensionless half-cycle of imbibition, ratio of
gravitational pressure difference and injection-production pressure difference and ratio of well radius and injector
producer distance. These similarity criteria can be used as theory guidance for quantitative 3D physical simulation of
waterflooding in fractured reservoirs, and can be simplified to the case of 2D easily.
Research and design of laser topographic measurement system
Show abstract
In the measurement system of hydraulic model tests, the water parameter measuring instruments must be used in
dusty, wet air and muddy water. Because of this special test environment, the water parameter measuring instruments
using contact measurement mode have high failure rate in use, heavy workload in maintenance, much difficulties in
installation, so they are not conducive to the volume promotion and applications. To avoid the shortage of contact
measurement technology, this paper uses non-contact measurement mode, develops laser topographic equipment and
makes the instrument with the characteristics of simple installation, reliable and easy to maintain, relaxed requirements
on the environment, and suitable for using in the dusty and humid environments.
A real-time scheduling strategy in on-demand broadcasting
Xiaoqin Ma,
Li Yang
Show abstract
In response to a maximum of queries to meet the requests and the requirement for time limit, a real-time and
multi-item scheduling is proposed. The scheduling strategy is divided into two levels, the first compute all queries’
priorities, which is derived from the number of requests for a data item and deadline miss rate; the second level to
determine the data items’ order of the selected request. The experimental results shows that the proposed strategy
gains better performance over the existing SIN algorithms on reducing the miss rate of deadline limit and the
efficiency of scheduling.
Morphological analysis of infrared images for waterjets
Show abstract
High-speed waterjet has been widely used in industries and been investigated as a model of free shearing turbulence.
This paper presents an investigation involving the flow visualization of high speed water jet, the noise reduction of the
raw thermogram using a high-pass morphological filter and a median filter; the image enhancement using white
top-hat filter; and the image segmentation using the multiple thresholding method. The image processing results by the
designed morphological filters, - top-hat, were proved being ideal for further quantitative and in-depth analysis and
can be used as a new morphological filter bank that may be of general implications for the analogous work
A new multi-period linguistic aggregation operator and its application to financial product selection
Show abstract
In this paper, we propose a new aggregation operator, dynamic 2-tuple linguistic weighted averaging (DTWA)
operator, to aggregate linguistic information given in multiple periods. The properties of the new operator are studied
and a new multiple attribute decision making method based on the new operator is proposed. Finally, financial product
selection problem is provided to illustrate the the proposed method in financial decision making problem.
Performance analysis of optimal power allocation in wireless cooperative communication systems
Show abstract
Cooperative communication has been recently proposed in wireless communication systems for exploring the
inherent spatial diversity in relay channels.The Amplify-and-Forward (AF) cooperation protocols with multiple relays
have not been sufficiently investigated even if it has a low complexity in term of implementation. We consider in this
work a cooperative diversity system in which a source transmits some information to a destination with the help of
multiple relay nodes with AF protocols and investigate the optimality of allocating powers both at the source and the
relays system by optimizing the symbol error rate (SER) performance in an efficient way. Firstly we derive a closedform
SER formulation for MPSK signal using the concept of moment generating function and some statistical
approximations in high signal to noise ratio (SNR) for the system under studied. We then find a tight corresponding
lower bound which converges to the same limit as the theoretical upper bound and develop an optimal power allocation
(OPA) technique with mean channel gains to minimize the SER. Simulation results show that our scheme outperforms
the equal power allocation (EPA) scheme and is tight to the theoretical approximation based on the SER upper bound in
high SNR for different number of relays.
Analysis of aviation logistics volume of new airport based on support vector machine
Show abstract
The Analysis of aviation Logistics volume of new airport is important basis of aviation logistics
infrastructure planning. The analysis for air Logistics volume of new airport is always difficulty. In this paper, the model
of comprehensive analysis of multi-dimensional was established based on the features of services radiation regional of
new airport. And on the basis, combining the features of the new airport, this paper adopts nonlinear regression of
support vector machine to analyses air Logistics volume of the future of new airport. Then empirical analysis was done.
Research on CPFR pattern of the internet of things based on b2c
Show abstract
The CPFR pattern proposed by this article is based on the internet of things platform, using frontier technology of
internet of things to realize real-time monitoring and the feedback in logistics, information stream in B2C mode, and
simultaneously construct an e-business mode which takes the customer guidance as the center to be possible to meet the
customers’ need and realize the service made by customer. This new pattern uses the coordination, plan, prediction and
replenishment of CPFR to realize custom-made stock based on B2C for terminal customer and specialized service for
commodity stock. Moreover, it can bring suppliers real-time monitoring of terminal logistics, storage and users’ notes for
use, and feed back users’ bugs, adjustment of orders and plan of replenishment. Furthermore, based on new pattern, we
can data min users’ interests and undertake a study in increment modeling, process reengineering in enterprise,
optimizing enterprise’s interior resources and conformity industry of supply chain. Above all it provides a new mentality
and the operation pattern for the electronic commerce marketing.
Security clustering algorithm based on reputation in hierarchical peer-to-peer network"
Show abstract
For the security problems of the hierarchical P2P network (HPN), the paper presents a security clustering algorithm
based on reputation (CABR). In the algorithm, we take the reputation mechanism for ensuring the security of transaction
and use cluster for managing the reputation mechanism. In order to improve security, reduce cost of network brought by
management of reputation and enhance stability of cluster, we select reputation, the historical average online time, and
the network bandwidth as the basic factors of the comprehensive performance of node. Simulation results showed that
the proposed algorithm improved the security, reduced the network overhead, and enhanced stability of cluster.
Near and far field beacon localization algorithm for wireless sensor networks
Show abstract
Localization plays an important role in wireless sensor network management. Currently, the approaches mainly fall
into two categories: range-based and range-free. In this paper, the proposed work combines the advantages of the two
types of methods (range-based and range-free) to introduce the near and far field characteristic of RSSI(NFC), which is 1)
in the near field, there is a relatively stable relationship between RSSI and distance. 2) In the far field, a max range of the
signal radiation exists. NFC provides a new method of distance measurement and node positioning. A new localization
technique (NFCB) based on NFC is also proposed. In this algorithm, anchor nodes transmit beacons at different power
levels, which can divide geographical regions into the rings with multiple near and far field combination. From the
information received by each beacon heard, nodes can determine its position, which depends on the property of
intersections of near-fields. NFCB can turn the nodes with high-precisions into anchor nodes. Without increasing the
hardware, it can raise the density of anchor nodes, which greatly improve positioning accuracy. Simulation results
demonstrate that the estimation error is lower than CAB APIT.
Application of self-adjustment PID fuzzy controller in inverter air-conditioning control system
Show abstract
Two-dimensional fuzzy temperature controller was used in the system of inverter air-conditioner to control the room
temperature. Self-adjustment PID fuzzy controller was proposed to realize real-time control function. V / F control mode
was used to compensate with low voltage, the average sampling algorithm was proposed to implement SPWM waveform
modulation. Finally, the feasibility of self-adjustment PID fuzzy controller was verified by simulation, the actual
operation results had proved that self-adjustment PID fuzzy controller had reliable, good output waveform and small
harmonic wave, which could meet operational requirements of inverter air-conditioner.
Performance analysis of spatial multiplexing MIMO system with time reversal technology"
Show abstract
This paper deals with the performance analysis of Spatial Multiplexing(SM) multiple input multiple output (MIMO)
system with time reversal (TR) technology. Focus is given on the spatial multiplexing gain of MIMO than the diversity
gain aspect with the notion that the idea of diversity is inseparably associated with the uncertainty of the channel. If
transmitter knows Channel State Information (CSI) before transmission, potential benefits can be harvested. TR is used
here, to provide Channel State Information (CSI) at the transmitter before transmission. With the features of temporal
and spatial focusing, TR not only can provide immunity against fading for spatially multiplexed data stream but also help
boost its Multi Stream Interference (MSI) limited performance by mitigating it. The performance analysis of SM-MIMOTR
is carried out with the aim of average minimum error probability for quantity of interest data rate. The interest date
rate is 19.07 Mbps, where as the average minimum error probably is set to be that of Single Input Multi Output (SIMO)
maximum ratio combining system (MRC). BER of Single Input Single Output (SISO) system is also simulated for
making comparison tangible. Simulation study shows that Bit Error Rate (BER) performance of the system with the data
rate of interest nearly coincides with that of SIMO system at the range of 10-15db and is better than SISO in all
simulated Eb/No points. Additionally, from the standpoint of tread off curve, between diversity gain and spatial
multiplexing gain, the non linearity nature still holds.
Research on silicon rotor turned gyroscope
Show abstract
This paper introduces a novel thin silicon rotor turned gyroscope (SRTG). With a micro motor driving the rotor and
two pairs of torsion bars and a gimbal ring realizing dynamical tuning, this gyroscope inherits the structure and working
principle of the dynamically tuned gyroscope (DTG). The torsion bars, gimbal ring, rotor, annunciator and torquer are
processed by micro-mechanical technology. The declination of rotor is sensed by differential capacitances. The rotor is
rebalanced by electrostatic forces. In this paper, the details about the structure and working principle of SRTG is
presented, the block diagram of the circuit in SRTG is discussed. Experiments are done on one sensitive direction of
SRTG, and the curve is given, proved the feasibility.