Loading...

Table of Content

    27 April 2015, Volume 0 Issue 4
     Comprehensive Strategy Research for Network Clustering and Node Sleeping
    CHEN Long, LIU Li-ping, ZHAO Ming, CHEN Zhi-gang
    2015, 0(4):  1-5. 
    Asbtract ( 143 )  
    References | Related Articles | Metrics
    To conserve energy, we can use method for approximate data collection. Sensor nodes with the same readings can be clustered such that only the representative
    nodes report their readings. Also, we can use sensor activity scheduling mechanism that consists on turning off redundant sensors while maintaining coverage by the remaining
    active nodes to prolong the life time of WSN. However, the two techniques seem independent and few works consider both of them. In this paper, we propose an efficient protocol
    synthesizing network clustering and sensor activity scheduling. The proposed protocol determine θ-similar_sets of node and only the Rnode need to report their readings. Also,
    the protocol divides the network lifetime into activity rounds. In each round a number of active nodes (Rnode and members) is selected to ensure coverage while others are sleep.
    Compared with some existing protocols, simulation results show that our protocol can have a longer lifetime with a high network coverage.
    A Similarity Algorithm for Chinese Text Based on Semantics
    XIA Zhi-ming1,2, LIU Xin1,2
    2015, 0(4):  6-9. 
    Asbtract ( 202 )  
    References | Related Articles | Metrics
    This paper computes the semantic similarity of words using the HowNet and extracting the text keywords to compute the similarity of the texts. After segmenting
    the text and filtering stop words, it calculates the weights of word to extract the key words of the text by combining the gender, word frequency and paragraph frequency of the
    word. By calculating the similarity of the keywords, the similarity value of the texts is calculated. The analysis of the significant difference of the experimental results
    shows that its accuracy is further improved compared with the traditional semantic algorithm and vector space model algorithm.
     Optimization Model of Remote File Synchronization Based on Rsync Algorithm
    WANG Bin, LIU Zhao-yuan
    2015, 0(4):  10-13. 
    Asbtract ( 131 )  
    References | Related Articles | Metrics
    In order to solve the relatively fine-grained control over the transmission of network data and more efficient use of network bandwidth, we design and implement
    an optimized file synchronization model which moves most calculations out of the cloud and shared part of checksum by local data table and the cloud server distributed cache
    table. And this method is based on Rsync file transfer algorithm and took Hadoop Distributed File System (HDFS) as the research object. Experimental results show that the model
    can effectively improve the cloud storage file synchronization of I/O performance, and reduce synchronization costs.
    Linked Hierarchical Routing Protocol Based on Access Control
    XU Jian-zhen, CAO Huan-huan, SONG Ai-ling
    2015, 0(4):  14-19. 
    Asbtract ( 131 )  
    References | Related Articles | Metrics
    The paper first discusses the characteristic of comparatively limited energy supply of nodes in Wireless Sensor Networks (WSN), and then proposes a Linked
    Hierarchical Routing Protocol based on Access Control (LHRPAC). Took relative adjacent degree and energy into consideration, optimization is made on cluster head election,
    linking and communication, and data fusion detection based on access control is carried out. The simulation results indicate that LHRPAC produces significant reduction of time
    delay when transmitting across the network, and subsequently, prolongs the whole network lifetime.
    Hot Topics Detection Method Based on User Relevance
    LI Hong-li, WANG Jian
    2015, 0(4):  20-25,30. 
    Asbtract ( 157 )  
    References | Related Articles | Metrics
    To improve the accuracy of detecting hot topic from social network text information, a hot topic detection algorithm based on user relevance is raised.
    According to user authority to the user orientation, some noise data of parts of users are filtered out. The authority of users is calculated by micro-blog users authority
    evaluation model based on PageRank algorithm. The heat evaluation of micro-blog topics is made by combining the number of reposts and comments with user authority data together
    , thus the hot topics are found. The result of the experiment shows that the method can effectively identify “zombie” users, and further the average missing rate and false
    detection rate respectively decrease by 19.78% and 4.77%, indicate the topic detection accuracy rate is effectively improved.
    Research on Link Prediction Features on Location-based Social Networks
    WANG Ying, GUO Yu-chun
    2015, 0(4):  26-30. 
    Asbtract ( 180 )  
    References | Related Articles | Metrics
    In addition to friendship information in the traditional social network, LBSN records users’ check-in information, which connects the virtual network and real
    life. Combined with the traditional link prediction methods based on network structure and location similarity, we propose two kinds of link prediction features based on users’
    check-in time and frequency, prove to be effective by the statistical analysis of the Brightkite dataset, and establish a LBSN link prediction framework with several kinds of
    features. The experimental results show that these two types of link prediction features improved the prediction precision.
    Registration Number Recognition of Civil Aviation Aircraft
    YANG Qing-shuai1, YANG Hong-yu1,2, LAN Shi-yong1,2, CHENG Peng2
    2015, 0(4):  31-36. 
    Asbtract ( 280 )  
    References | Related Articles | Metrics
    In order to improve the automation level of airport, a novel algorithm is proposed for civil aviation aircraft registration number recognition. For the color
    image of runway taken by cameras mounted in the aircraft, firstly the image of aircraft is extracted by Canny operation and contours detection, and then the color image is
    converted into gray image for computer processing. Secondly, use the probabilistic Hough transform and Stroke Width Transform to position registration number. Finally, segment
    registration number by the method of threshold and apply hole-based template matching method to recognize the characters of the registration number. Experimental results show
    that the algorithm is feasible, robust and applicable.
    Image Fusion Method Based on Quantum Mechanics and Laplacian Pyramid
    XI Liang1,2
    2015, 0(4):  37-41. 
    Asbtract ( 122 )  
    References | Related Articles | Metrics
    A new image decompostion method based on quantum mechanics is proposed for the digital image fusion, combined with the Laplacian pyramid transform, a new image
    fusion method is proposed. Firstly two gray images are expressed as the form of quantum bit, and then each image is decomposed into four characteristic sub-images. According to
    the different meaning of the decomposed sub-images, different fusion rules are used. It uses Laplacian pyramid transform for one sub-image, and the method of selecting more
    local gradient is used for another sub-images. then the fusion image is obtained by reconstructed. The simulation  results show that the method has better fusion effect, it
    outperforms the conventional image fusion methods in subjective vision perception and objective evaluation index.
     An Improved TLD Visual Target Tracking Method
    JIN Long, SUN Han
    2015, 0(4):  42-46. 
    Asbtract ( 134 )  
    References | Related Articles | Metrics
    Tracking-Learning-Detection (TLD) is a new tracking algorithm proposed by Zdenek Kalal. The most obvious difference between TLD and the traditional tracking
    algorithm is that TLD combines traditional tracking algorithm with traditional detection algorithm to solve problems such as deformation and partial occlusion which may happen
    when target is followed during the tracking procedure. The TLD is improved by this paper, based on Meanshift and Kalman, this paper introduces prediction for the area where
    current frame target is located into testing module of the algorithm, which is supposed to narrow detection range of detector effectively and reduce the computation burden of
    the algorithm; variance classifier in original algorithm is replaced by color feature classifier, which improve performance of target recognition. what’s more, the improvement
    of integrated modular can increase the rate of success for target tracking. After comparison of the improved TLD and original TLD, the result shows that the improved TLD
    algorithm has high accuracy and better precision for tracking.
     A Dynamic Visualization Method for Environmental Information Based on 3D GIS
    LI Guo-rui, CHE Ming, WANG Lin-hui
    2015, 0(4):  47-53,60. 
    Asbtract ( 200 )  
    References | Related Articles | Metrics
    Due to the growing environmental problems, people would pay more attention to their information. But the currently available information display platform is
    relatively simple, not intuitive as well. In view of this situation, this paper proposes a dynamic visualization method for the environmental information based on 3D GIS. The
    research area is determined by sweepline algorithm, according to cross-validation, Kriging interpolation is adopted, and the interpolated data is processed before released as
    KML file, then the data is displayed with Google Earth embedded in a Web page. This paper will take PM2.5 monitoring data in China as an example to demonstrate the visualization
    effect, the experimental results show that this visualization method displayed the data directly and accurately, which help users more convenient to understand the current
    environmental information.
    Research on Crop Disease Recognition Database System Based on Image Content Retrieval
    PU Yong-xian
    2015, 0(4):  54-60. 
    Asbtract ( 133 )  
    References | Related Articles | Metrics
    In view of the shortcomings for crop disease diagnosis expert system, the poper puts forward the way that disease diagnosis diseases based on image retrieval.
    Try to establish image characteristics library database, knowledge base , image library and so on according to the plant disease images. Diagnosis, extract the characteristics
    of the plant disease image, the characteristics and features of library matching query, through the query results for a description of the disease and prevention measures. In
    order to improve the retrieval precision and recall rate, the poper mainly explores the characteristics of library information in the disease image database creation access and
    retrieval algorithm design. Disease spot in tobacco plant disease image, for example, the color disease spot edge detection of based multifeature selection and on support vector
    machine , 25 disease spot feature extracting, using double coding genetic algorithm and support vector machine (SVM) for feature dimension reduction, in order to get effective
    characterization of disease features 17 and the corresponding weights, the characteristics of the normalized processing after establishing a database, and retrieval algorithm is
    designed. Experiments show that the constructed image retrieval system has high precision and recall, the fusion of multiple features of disease spot retrieval precision is
    higher than single feature. Diagnosis of disease in this way that includes higher disease recognition rate and diagnosis of visualization, the way is used for crop disease
    diagnosis expert system that can improve the robustness of the system and achieve the remote online diagnosis of the disease.
     A Method of Light Field Acquisition and Reconstruction Based on Compressive Sensing
    WANG Jing-yi1, GAO Hang1, SHEN Chun-lin2
    2015, 0(4):  61-64,69. 
    Asbtract ( 154 )  
    References | Related Articles | Metrics
    Camera array which can capture multiple views of light filed directly is used as a common light field acquisition equipment, but camera array is difficult to
    maintain and high cost as for each view one camera is needed. This paper proposes a method of light field acquisition and reconstruction based on compressive sensing. Much fewer
    cameras are used to achieve the functions of full-populated camera array. The sparse camera array captures fewer views and reconstructs the original light field by an over-
    complete dictionary. The experiments demonstrated it is feasible to reconstruct the original light field at a high quality level.
    An Improved Method for Image Denoising Based on Wavelet Thresholding
    WANG Qi1, CHENG Bin2, DU Juan1, XU Guo-qing1
    2015, 0(4):  65-69. 
    Asbtract ( 171 )  
    References | Related Articles | Metrics
    Analyzing the characteristics of the wavelet threshold denoising, because that hard threshold denoising makes boundaries fuzzy and soft threshold denoising has
    Gibbs phenomenon, an improved threshold function and threshold estimation method is proposed, the new threshold function is continuous differentiable and has variable deviation,
    a new threshold estimation method has better adaptive. Experimental results show that the improved method can effectively remove the white noise, no matter from the visual
    effect, or the signal-to-noise ratio, the improved method is better than the soft, hard threshold denoising.
     Research on Human Detection in Outdoor Scene Based on Generalized Hough Transform
    ZHANG Xue-song
    2015, 0(4):  70-73,77. 
    Asbtract ( 158 )  
    References | Related Articles | Metrics
     A novel outdoor scene human detection approach based on generalized Hough transform is proposed in this paper. Firstly, we randomly extract fragments of human
    instances from annotated training images and build a fragment dictionary. Then we utilize these extracted fragments to compute feature vectors for each training image. In order
    to rapidly detect human in a static image, Gentleboost algorithm is used to train detectors. In each round of boosting, a regression decision stump is learned as the weak
    classifier which can pick the most distinctive fragment features from the high dimensional fragment feature vector. When running the trained human detector, all the weak
    classifiers voted for the possible positions of human instances in a given test image. Finally, the output positions of all the weak classifiers are accumulated and some low
    score outputs are eliminated using a manually specified threshold to get the final detection outputs. Experiments on LabelMe datasets show that this approach can rapidly detect
    human instances from static image using relative fewer training images and can effectively solve the partial occlusion problem.
    Hand Vein Image Extraction Method #br#  Based on CLAHE and Improved NIBLACK Algorithm
    YU Heng, ZHENG Jun-hui
    2015, 0(4):  74-77. 
    Asbtract ( 167 )  
    References | Related Articles | Metrics
    In order to meet the demand for the feature extraction of hand vein recognition, this paper takes a study on hand vein extraction method. Firstly, before the
    image binaryzation processing, By using CLAHE algorithm the hand vein images is enhanced. Because of the traditional NIBLACK algorithm’s problems such as noises, broken lines
    and edge threshold missing and so on, we propose an improved algorithm which combined local static threshold method with the NIBLACK algorithm to segment the vein image.
    Experimental results show that the methods of CLAHE and improved NIBLACK algorithm can effectively overcome the impact of the intensity on image extraction, and eliminate the
    problems of noise and broken lines. So we can obtain original and clear vein structure, which meets the needs of hand vein recognition.
     Research on Optimal Scale Segmentation Method of Remote Sensing #br#  Images Based on Segmentation Quality
    ZHUANG Zhong-jie, CUI Bin-ge
    2015, 0(4):  78-81. 
    Asbtract ( 121 )  
    References | Related Articles | Metrics
     Optimal scaling segment is the ultimate goal of automatic segment of remote sensing image. In this paper, optimal scaling segment is presented based on the
    region object segment quality. Remote sensing image is segmented in multiple scales to obtain the segment qualities of all region objects in each scale layer. Then, segment
    quality array is constructed for each atomic region object to obtain its optimal segmentation scale. The optimal segment of remote sensing image is implemented based on the
    optimal scale of region objects. By visual judgment and quantitative analysis, the optimal scale segment is superior to the traditional single scale segment.
     Partial-duplicate Image Retrieval via Exploiting Visual Saliency
    CHEN Qiu-ping
    2015, 0(4):  82-85,89. 
    Asbtract ( 124 )  
    References | Related Articles | Metrics
     Bag-of-Word (BoW) model is widely used to represent the visual content of images in state-of-the-art image retrieval systems. Since traditional BoW models
    discard geometric relationships among local features, exploiting geometric constraints as post-processing steps has been demonstrated to significantly improve the performance.
    Each local feature is treated equally in these methods. In practice, the importance of local features for image retrieval is different. For example, the local features in the
    duplicate image regions are more important that ones in the background image regions. Towards this end, a new partial-duplicate image retrieval method is proposed by leveraging
    the importance of local features. First, visual saliency method is introduced to calculate the importance of each pixel, and then the importance is used to weight the similarity
    of matched points. To verify the performance of the proposed method, extensive experiments are conducted on the widely-used datasets and experimental results show the
    outperformance of the propose method.
    Design and Realization of a Fuzzy Controller for Reaction Kettle Temperature
    CHEN Jie1, YANG Jun-feng2, XU Hong-bo1, JIANG Jian-hua1
    2015, 0(4):  86-89. 
    Asbtract ( 175 )  
    References | Related Articles | Metrics
     Reaction kettle is a key equipment in process of chemical production. It is an effective way of improving the quality and quantity of chemical products, and realizing high quality, stability and energy saving production by control temperature in reaction kettle accurately. In this paper, a fuzzy controller of reaction kettle temperature is designed based on fuzzy control theory. The input and output of the controller, fuzzy method of accurate quantity, design of fuzzy control rules, fuzzy judgment of output and method of fuzzy control based on rules modified adaptively are researched. At last, the hardware system of temperature control for reaction kettle based on single-chip microcomputer is realized. It takes single-chip microcomputer STM32F103RB as the core hardware platform and uses the chip DSl8B20 digital thermometer sensor to acquisition multi-point temperature in reaction kettle.
     A Visual Servo System of FMAV Based on OpenCV
    YE Yi-nan, ZHANG Wei-ping
    2015, 0(4):  90-93. 
    Asbtract ( 214 )  
    References | Related Articles | Metrics
    This paper designs a visual servo system of FMAV. First, we introduc the kinematics rules, and make a brief summary of the whole control system, at last we design a new algorithm which is used to detect the movement locus of FMAV. The experiment shows that the new algorithm is more precise in detection of foreground target, comparing with the method of background differencing.
     An Improved Haze Image Restoration Algorithm
    GUO Geng-shan, YE Qing, HU Xin
    2015, 0(4):  94-97,102. 
    Asbtract ( 143 )  
    References | Related Articles | Metrics
    Aiming at the problems of classical algorithm can’t obtain the accurate atmospheric brightness A and the restored image is easy to appear the color distortion
    in the sky region, this paper proposes an improved algorithm which sets three sky thresholds to obtain the pixels in the sky region, then averages the brightness of these pixels
    to eliminate the effect of a white object; Adaptive the threshold which is used to segment the sky region and non-sky region using k-means clustering algorithm. This improved
    algorithm can obtain more accurate atmospheric brightness A, and it can segment the sky region more accurately, so it can rectify the transmittance of the sky region easily,
    these improvements can make a better visual effect of restored image. Simulation results show that the improved algorithm can achieve the anticipated effect.
     Robust Pole Assignment Optimization Based on IGHS Algorithm #br#  for Piecewise Linear Systems
    ZHAI Jun-chang
    2015, 0(4):  98-102. 
    Asbtract ( 124 )  
    References | Related Articles | Metrics
    In this paper, robust pole assignment problem for piecewise linear control systems using an improved global harmony search (IGHS) algorithm has been addressed,
    which restricts the degrees of freedom in the choice of eigenvectors and has a good convergence. The closed-loop system has a maximum allowable perturbation or uncertainty with
    the optimal controller. In contrast to most existing methods, not only the gradient and differentiability information of the nonlinear robust measure objective function is
    unconsidered, but also the character of concave or convex about the optimization problem is unconsidered. Finally, the simulation results demonstrate the effectiveness of the
    proposed method.
     Study of Certificateless Aggregate Signature Scheme Based on Hash Function
    WANG Qi-ming, GAN Quan, SHI He-sheng
    2015, 0(4):  103-106. 
    Asbtract ( 111 )  
    References | Related Articles | Metrics
     Aiming at analysis of program for HZD, points out that this scheme can’t resist forgery attack under Type Ⅱ attacker A2. The paper proposes an improved scheme. Solution add a Hash function in the process of signature and signature in the polymerization in strengthening of the master key and the public key constraints. Security analysis shows that the scheme is existential unforgeable adaptively chose message attack in the random oracle model under the computational Diffie-Hellman assumption. Efficiency analysis shows because the improved scheme verification and the length of the signature is fixed, the improved scheme is more efficient than the existing security schemes.
    A Diagnostic Network Intergration Algorithm Fighter Engine #br# Overheating Fault Mining Model  #br#  Based on Wavelet Transform
    LI Wei-yao, WANG Qi-ming
    2015, 0(4):  107-109. 
    Asbtract ( 158 )  
    References | Related Articles | Metrics
    Traditional engine overheating detection technology is unable to overcome the engine temperature fluctuations caused by changes in the signal run nonlinear distortion, poor fault detection. The paper presents a diagnostic network integration algorithm fighter engine overheating fault mining models, using wavelet transform method, collecting dynamic fighter engine overheating fault signal characteristics, taking signal characteristics to overheating as the basis, through transmitting the data which is the integration of diagnostics in the hidden layer network data mining process to overheating signal, gets overheated temperature information to achieve the depth of digging according fighter engine overheating signal. Experimental results indicate that the use of the proposed model can improve the fighter engine overheating fault mining accuracy, and conducive quick fix faults.
     Research on Semantic-based Oil Production Engineering Domain Data Integration System
    LIU Xin, HU Chang-jun, GE Jing-jun, JIA Li-na
    2015, 0(4):  110-113. 
    Asbtract ( 116 )  
    References | Related Articles | Metrics
     For mass, distributed, heterogeneous data sources of oil production engineering, this paper presents an oil production engineering semantic-based data integration system (OPSDS) based on building global semantic mode. OPSDS builds a global semantic model which is appropriate to the oil production engineering domain by ontology extraction, ontology mapping, ontology merging, ontology evolution and constraint reasoning. This system provides semantic-based data services for users and upper-layer applications.
     An Off-line Electronic Cash Scheme Based on Proxy Partially-blind Signature Scheme
    ZHOU Ming, WANG Jian
    2015, 0(4):  114-118. 
    Asbtract ( 159 )  
    References | Related Articles | Metrics
    By combining the advantages of a blind signature with a proxy signature, a proxy blind signature can be widely applied in the electronic cash. However, in most of electronic cash system based proxy blind signature, electronic cash amount was invisible. And a malicious user forged the tracking information. So these schemes didn’t meet practicability and no double spending. The paper proposes a proxy partially-blind signature based bilinear parings. The signature is unforgeable under the Computational Diffie-Hellman assumption. On the basis of the new proxy partially-blind signature and signature of knowledge, this manuscript proposes an electronic cash scheme. The scheme can prevent a malicious forgery of tracking information and achieved double-spending detection. Analysis shows that the proposed scheme can satisfy no double spending, unforgeability, anonymity and practicality.
     Writing Device Driver Program of Metro Banknote Acceptor Machine Based on State Pattern
    LU Chao, XU Jun-shan
    2015, 0(4):  119-123. 
    Asbtract ( 128 )  
    References | Related Articles | Metrics
    This paper introduces the related technology of subway automatic ticket vending machine software when writing Banknote Acceptor Machine device driver, including state pattern which is one of design patterns and complemented by thread synchronization technology for Windows. Combining, the above two kinds of technology to realize the industrial computer and Banknote Acceptor Machine BU interaction and communication, the methods have a certain reference value for the programming of compliance with RS-232 device driver.
     Research on Audio Signal Testing of Digital HD Equipment Based on PCM Code
    LI Yan-xia, LIU Yu-rong
    2015, 0(4):  124-126. 
    Asbtract ( 169 )  
    References | Related Articles | Metrics
    It has the increasingly high requirements in quality of audio signal of digital high-definition (HD) equipment, along with the widespread and popular digital HD equipment. Currently, the signal analysis of audio transmission quality of digital HD transmission interface is usually only used in the physical layer, can not from the users’ perspective. The nonlinear audio signal to digital HD equipment has been tested from the point of view of system in this paper. The innovation which include the test module framework and the transmission quality algorithm of nonlinear audio signal is proposed in this paper, and is validatedit by testing HD6M48 device of chuangnengda and 29D08HT devices of Shenzhen SKYWORTH. By the results of quantitative analysis, the testing results are in accord with the actual use, and it improves the testing efficiency and simplicity.