全文下载排行

一年内发表文章 | 两年内 | 三年内 | 全部 | 最近1个月下载排行 | 最近1年下载排行

当前位置: 全部
Please wait a minute...
1. 僵尸网络探测技术:回顾、发展趋势及存在的问题
Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar
Front. Inform. Technol. Electron. Eng.    2014, 15 (11): 943-983.   DOI: 10.1631/jzus.C1300242
摘要  
近年来,互联网使得人们可以在分布式计算环境中获取广泛的远程服务。然而,一系列安全问题影响着分布式计算平台数据传输完整性。例如,\"僵尸网络\"(包含恶意代码)就是互联网安全的一种显著威胁。多种犯罪活动依附于僵尸网络,包括分布式拒绝服务(DDoS)攻击、点击欺诈、网络钓鱼、恶意软件分发、垃圾邮件、建立用于非法信息交换的机器,等等。因此,有必要设计并构建一种稳健的机制以提升僵尸网络的探测、分析和移除过程。目前,已有较多工作从不同角度针对僵尸网络的探测技术进行综述,但是,这些工作视角有限,缺乏对最新技术的探讨。本文全面评述僵尸网络最新探测技术,指出该技术的发展趋势;对僵尸网络探测技术作了分类,并通过定性分析凸显了这些技术的潜在影响和关键方面。基于此全面综述,指出涵盖整个僵尸网络探测领域多个方案的改进方向,并指明此领域长期存在的显著挑战。
被引次数: WebOfScience(1)
2. Design of a novel low power 8-transistor 1-bit full adder cell
Yi Wei, Ji-zhong Shen
Front. Inform. Technol. Electron. Eng.    2011, 12 (7): 604-607.   DOI: 10.1631/jzus.C1000372
摘要   PDF(pc) (124KB)(5321)   
An addition is a fundamental arithmetic operation which is used extensively in many very large-scale integration (VLSI) systems such as application-specific digital signal processing (DSP) and microprocessors. An adder determines the overall performance of the circuits in most of those systems. In this paper we propose a novel 1-bit full adder cell which uses only eight transistors. In this design, three multiplexers and one inverter are applied to minimize the transistor count and reduce power consumption. The power dissipation, propagation delay, and power-delay produced using the new design are analyzed and compared with those of other designs using HSPICE simulations. The results show that the proposed adder has both lower power consumption and a lower power-delay product (PDP) value. The low power and low transistor count make the novel 8T full adder cell a candidate for power-efficient applications.
被引次数: WebOfScience(2)
3. A low drift curvature-compensated bandgap reference with trimming resistive circuit
Zhi-hua Ning, Le-nian He
Front. Inform. Technol. Electron. Eng.    2011, 12 (8): 698-706.   DOI: 10.1631/jzus.C1000440
摘要   PDF(pc) (439KB)(5214)   
A low temperature drift curvature-compensated complementary metal oxide semiconductor (CMOS) bandgap reference is proposed. A dual-differential-pair amplifier was employed to add compensation with a high-order term of TlnT (T is the thermodynamic temperature) to the traditional 1st-order compensated bandgap. To reduce the offset of the amplifier and noise of the bandgap reference, input differential metal oxide semiconductor field-effect transistors (MOSFETs) of large size were used in the amplifier and to keep a low quiescent current, these MOSFETs all work in weak inversion. The voltage reference’s temperature curvature has been further corrected by trimming a switched resistor network. The circuit delivers an output voltage of 3 V with a low dropout regulator (LDO). The chip was fabricated in Taiwan Semiconductor Manufacturing Company (TSMC)’s 0.35-μm CMOS process, and the temperature coefficient (TC) was measured to be only 2.1×10?6/°C over the temperature range of ?40–125 °C after trimming. The power supply rejection (PSR) was ?100 dB @ DC and the noise was 42 μV (rms) from 0.1 to 10 Hz.
被引次数: WebOfScience(1)
4. Congestion avoidance, detection and alleviation in wireless sensor networks
Wei-wei FANG, Ji-ming CHEN, Lei SHU, Tian-shu CHU, De-pei QIAN
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 63-73.   DOI: 10.1631/jzus.C0910204
摘要   PDF(pc) (638KB)(4295)   
Congestion in wireless sensor networks (WSNs) not only causes severe information loss but also leads to excessive energy consumption. To address this problem, a novel scheme for congestion avoidance, detection and alleviation (CADA) in WSNs is proposed in this paper. By exploiting data characteristics, a small number of representative nodes are chosen from those in the event area as data sources, so that the source traffic can be suppressed proactively to avoid potential congestion. Once congestion occurs inevitably due to traffic mergence, it will be detected in a timely way by the hotspot node based on a combination of buffer occupancy and channel utilization. Congestion is then alleviated reactively by either dynamic traffic multiplexing or source rate regulation in accordance with the specific hotspot scenarios. Extensive simulation results under typical congestion scenarios are presented to illuminate the distinguished performance of the proposed scheme.
被引次数: WebOfScience(13)
5. Image compression based on spatial redundancy removal and image inpainting
Vahid BASTANI, Mohammad Sadegh HELFROUSH, Keyvan KASIRI
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 92-100.   DOI: 10.1631/jzus.C0910182
摘要   PDF(pc) (606KB)(4250)   
We present an algorithm for image compression based on an image inpainting method. First the image regions that can be accurately recovered are located. Then, to reduce the data, information of such regions is removed. The remaining data besides essential details for recovering the removed regions are encoded to produce output data. At the decoder, an inpainting method is applied to retrieve removed regions using information extracted at the encoder. The image inpainting technique utilizes partial differential equations (PDEs) for recovering information. It is designed to achieve high performance in terms of image compression criteria. This algorithm was examined for various images. A high compression ratio of 1:40 was achieved at an acceptable quality. Experimental results showed attainable visible quality improvement at a high compression ratio compared with JPEG.
被引次数: WebOfScience(3)
6. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren
Frontiers of Information Technology & Electronic Engineering    2013, 14 (2): 85-97.   DOI: 10.1631/jzus.C1200240
摘要  
It is secure for customers to store and share their sensitive data in the cryptographic cloud storage. However, the revocation operation is a sure performance killer in the cryptographic access control system. To optimize the revocation procedure, we present a new efficient revocation scheme which is efficient, secure, and unassisted. In this scheme, the original data are first divided into a number of slices, and then published to the cloud storage. When a revocation occurs, the data owner needs only to retrieve one slice, and re-encrypt and re-publish it. Thus, the revocation process is accelerated by affecting only one slice instead of the whole data. We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption (CP-ABE) based cryptographic cloud storage. The security analysis shows that our scheme is computationally secure. The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner’s workload if the revocation occurs frequently.
被引次数: WebOfScience(7)
7. Short text classification based on strong feature thesaurus
Bing-kun Wang, Yong-feng Huang, Wan-xia Yang, Xing Li
Front. Inform. Technol. Electron. Eng.    2012, 13 (9): 649-659.   DOI: 10.1631/jzus.C1100373
摘要  
Data sparseness, the evident characteristic of short text, has always been regarded as the main cause of the low accuracy in the classification of short texts using statistical methods. Intensive research has been conducted in this area during the past decade. However, most researchers failed to notice that ignoring the semantic importance of certain feature terms might also contribute to low classification accuracy. In this paper we present a new method to tackle the problem by building a strong feature thesaurus (SFT) based on latent Dirichlet allocation (LDA) and information gain (IG) models. By giving larger weights to feature terms in SFT, the classification accuracy can be improved. Specifically, our method appeared to be more effective with more detailed classification. Experiments in two short text datasets demonstrate that our approach achieved improvement compared with the state-of-the-art methods including support vector machine (SVM) and Na?ve Bayes Multinomial.
被引次数: WebOfScience(6)
8. Numerical solution of potential flow equations with a predictor-corrector finite difference method
Zhi-qiang Luo
Front. Inform. Technol. Electron. Eng.    2012, 13 (5): 393-402.   DOI: 10.1631/jzus.C1100313
摘要  
We develop a numerical solution algorithm of the nonlinear potential flow equations with the nonlinear free surface boundary condition. A finite difference method with a predictor-corrector method is applied to solve the nonlinear potential flow equations in a two-dimensional (2D) tank. The irregular tank is mapped onto a fixed square domain with rectangular cells through a proper mapping function. A staggered mesh system is adopted in a 2D tank to capture the wave elevation of the transient fluid. The finite difference method with a predictor-corrector scheme is applied to discretize the nonlinear dynamic boundary condition and nonlinear kinematic boundary condition. We present the numerical results of wave elevations from small to large amplitude waves with free oscillation motion, and the numerical solutions of wave elevation with horizontal excited motion. The beating period and the nonlinear phenomenon are very clear. The numerical solutions agree well with the analytical solutions and previously published results.
被引次数: WebOfScience(3)
9. Underwater glider design based on dynamic model analysis and prototype developmentv
Shuang-shuang Fan, Can-jun Yang, Shi-lin Peng, Kai-hu Li, Yu Xie, Shao-yong Zhang
Front. Inform. Technol. Electron. Eng.    2013, 14 (8): 583-599.   DOI: 10.1631/jzus.C1300001
摘要  
Underwater gliders are efficient mobile sensor platforms that can be deployed for months at a time, traveling thousands of kilometers. Here, we describe our development of a coastal 200 m deep underwater glider, which can serve as an ocean observatory platform operating in the East China Sea. Our glider is developed based on dynamic model analysis: steady flight equilibrium analysis gives the varied range of moving mass location for pitch control and the varied vehicle volume for buoyancy control; a stability analysis is made to discuss the relationship between the stability of glider motion and the location of glider wings and rudder by root locus investigation of glider longitudinal- and lateral-directional dynamics, respectively. There is a tradeoff between glider motion stability and control authority according to the specific glider mission requirements. The theoretical analysis provides guidelines for vehicle design, based on which we present the development progress of the Zhejiang University (ZJU) glider. The mechanical, electrical, and software design of the glider is discussed in detail. The performances of glider key functional modules are validated by pressure tests individually; preliminary pool trials of the ZJU glider are also introduced, indicating that our glider functions well in water and can serve as a sensor platform for ocean sampling.
被引次数: WebOfScience(2)
10. Computer vision based eyewear selector
Oscar DÉNIZ, Modesto CASTRILLÓN, Javier LORENZO, Luis ANTÓN, Mario HERNANDEZ, Gloria BUENO
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 79-91.   DOI: 10.1631/jzus.C0910377
摘要   PDF(pc) (1850KB)(3427)   
The widespread availability of portable computing power and inexpensive digital cameras are opening up new possibilities for retailers in some markets. One example is in optical shops, where a number of systems exist that facilitate eyeglasses selection. These systems are now more necessary as the market is saturated with an increasingly complex array of lenses, frames, coatings, tints, photochromic and polarizing treatments, etc. Research challenges encompass Computer Vision, Multimedia and Human-Computer Interaction. Cost factors are also of importance for widespread product acceptance. This paper describes a low-cost system that allows the user to visualize different glasses models in live video. The user can also move the glasses to adjust its position on the face. The system, which runs at 9.5 frames/s on general-purpose hardware, has a homeostatic module that keeps image parameters controlled. This is achieved by using a camera with motorized zoom, iris, white balance, etc. This feature can be specially useful in environments with changing illumination and shadows, like in an optical shop. The system also includes a face and eye detection module and a glasses management module.
被引次数: WebOfScience(3)
11. Optimized design of LED freeform lens for uniform circular illumination
Peng Liu, Reng-mao Wu, Zhen-rong Zheng, Hai-feng Li, Xu Liu
Front. Inform. Technol. Electron. Eng.    2012, 13 (12): 929-936.   DOI: 10.1631/jzus.C12a0116
摘要  
An optimization method is proposed for designing an LED freeform lens which produces a uniform circular pattern with high energy efficiency. This method is composed of three main aspects: design of the initial guess, parameterization of the freeform surface, and construction of the merit function. The initial guess is created by solving an ordinary differential equation numerically. An approach of selecting optimization points is introduced for parameterization of the freeform surface. The merit function is constructed by use of the irradiance uniformity and the efficiency of the lens. Design examples are given, and the results show that the irradiance distribution is well controlled with a maximum uniformity (the relative standard deviation of irradiance, RSD) of 0.0122 and a maximum efficiency of 93.88%. This optimization method can be generalized to design freeform lenses with different lighting patterns or without rotational symmetry.
被引次数: WebOfScience(7)
12. Brain tissue segmentation based on spatial information fusion by Dempster-Shafer theory
Jamal Ghasemi, Mohammad Reza Karami Mollaei, Reza Ghaderi, Ali Hojjatoleslami
Front. Inform. Technol. Electron. Eng.    2012, 13 (7): 520-533.   DOI: 10.1631/jzus.C1100288
摘要  
As a result of noise and intensity non-uniformity, automatic segmentation of brain tissue in magnetic resonance imaging (MRI) is a challenging task. In this study a novel brain MRI segmentation approach is presented which employs Dempster-Shafer theory (DST) to perform information fusion. In the proposed method, fuzzy c-mean (FCM) is applied to separate features and then the outputs of FCM are interpreted as basic belief structures. The salient aspect of this paper is the interpretation of each FCM output as a belief structure with particular focal elements. The results of the proposed method are evaluated using Dice similarity and Accuracy indices. Qualitative and quantitative comparisons show that our method performs better and is more robust than the existing method.
被引次数: WebOfScience(3)
13. Accelerating geospatial analysis on GPUs using CUDA
Ying-jie Xia, Li Kuang, Xiu-mei Li
Front. Inform. Technol. Electron. Eng.    2011, 12 (12): 990-999.   DOI: 10.1631/jzus.C1100051
摘要   PDF(pc) (582KB)(3226)   
Inverse distance weighting (IDW) interpolation and viewshed are two popular algorithms for geospatial analysis. IDW interpolation assigns geographical values to unknown spatial points using values from a usually scattered set of known points, and viewshed identifies the cells in a spatial raster that can be seen by observers. Although the implementations of both algorithms are available for different scales of input data, the computation for a large-scale domain requires a mass amount of cycles, which limits their usage. Due to the growing popularity of the graphics processing unit (GPU) for general purpose applications, we aim to accelerate geospatial analysis via a GPU based parallel computing approach. In this paper, we propose a generic methodological framework for geospatial analysis based on GPU and its programming model Compute Unified Device Architecture (CUDA), and explore how to map the inherent parallelism degrees of IDW interpolation and viewshed to the framework, which gives rise to a high computational throughput. The CUDA-based implementations of IDW interpolation and viewshed indicate that the architecture of GPU is suitable for parallelizing the algorithms of geospatial analysis. Experimental results show that the CUDA-based implementations running on GPU can lead to dataset dependent speedups in the range of 13–33-fold for IDW interpolation and 28–925-fold for viewshed analysis. Their computation time can be reduced by an order of magnitude compared to classical sequential versions, without losing the accuracy of interpolation and visibility judgment.
被引次数: WebOfScience(19)
14. 用于三维CAD模型分类的深度学习方法
Fei-wei Qin, Lu-ye Li, Shu-ming Gao, Xiao-ling Yang, Xiang Chen
Front. Inform. Technol. Electron. Eng.    2014, 15 (2): 91-106.   DOI: 10.1631/jzus.C1300185
摘要  
研究目的:模型分类对于工程领域中三维CAD模型的有效管理和重用非常关键。由于三维CAD模型分类固有的复杂性,难以通过设计一定的规则实现模型自动分类。因此,一些学者采用机器学习技术解决三维CAD模型的自动分类问题。受传统机器学习技术的制约,已有方法效果并不理想,无法应用于实际工业生产。近年来,深度学习取得了突破性进展,在图像分类、自然语言处理、语音识别等领域获得了不错效果。本文探索利用机器学习领域的最新研究成果——深度学习技术,对工程领域中常见的三维CAD模型进行自动分类。
创新要点:利用深度学习技术,模拟工程师人工识别三维零件的三个主要环节,构建了CAD模型的自动分类器;采用多种行之有效的训练策略,得到具有较好泛化性能的分类器。
研究方法:基于深度学习的三维CAD模型分类方法的主要步骤为:从制造企业获取足够的样本数据,构建三维CAD模型数据集;分析CAD领域的特点,选取合适的三维模型描述符进行特征提取,并处理为输入向量;利用深度学习技术模拟工程师人工识别工程零件的过程,设计分类器的拓扑结构并选择相应的组成元素,构建深层神经网络分类器;采用多种实用的训练技巧,使训练得到的分类器的自由参数取值尽可能逼近全局最优解,避免过拟合。
重要结论:实验数据表明,将深度学习技术与CAD领域知识结合,能够取得满意效果。深层神经网络分类器在测试集上的分类误差率低,足以满足工业生产的需求。
被引次数: WebOfScience(1)
15. Removal of baseline wander from ECG signal based on a statistical weighted moving average filter
Xiao Hu, Zhong Xiao, Ni Zhang
Front. Inform. Technol. Electron. Eng.    2011, 12 (5): 397-403.   DOI: 10.1631/jzus.C1010311
摘要   PDF(pc) (276KB)(3030)   
Baseline wander is a common noise in electrocardiogram (ECG) results. To effectively correct the baseline and to preserve more underlying components of an ECG signal, we propose a simple and novel filtering method based on a statistical weighted moving average filter. Supposed a and b are the minimum and maximum of all sample values within a moving window, respectively. First, the whole region [a, b] is divided into M equal sub-regions without overlap. Second, three sub-regions with the largest sample distribution probabilities are chosen (except M<3) and incorporated into one region, denoted as [a0, b0] for simplicity. Third, for every sample point in the moving window, its weight is set to 1 if its value falls in [a0, b0]; otherwise, its weight is 0. Last, all sample points with weight 1 are averaged to estimate the baseline. The algorithm was tested by simulated ECG signal and real ECG signal from www.physionet.org. The results showed that the proposed filter could more effectively extract baseline wander from ECG signal and affect the morphological feature of ECG signal considerably less than both the traditional moving average filter and wavelet package translation did.
被引次数: WebOfScience(5)
16. Advances in the control of mechatronic suspension systems
Wajdi S. Aboud, Sallehuddin Mohamed Haris, Yuzita Yaacob
Front. Inform. Technol. Electron. Eng.    2014, 15 (10): 848-860.   DOI: 10.1631/jzus.C14a0027
摘要  
The suspension system is a key element in motor vehicles. Advancements in electronics and microprocessor technology have led to the realization of mechatronic suspensions. Since its introduction in some production motorcars in the 1980s, it has remained an area which sees active research and development, and this will likely continue for many years to come. With the aim of identifying current trends and future focus areas, this paper presents a review on the state-of-the-art of mechatronic suspensions. First, some commonly used classifications of mechatronic suspensions are presented. This is followed by a discussion on some of the actuating mechanisms used to provide control action. A survey is then reported on the many types of control approaches, including look-ahead preview, predictive, fuzzy logic, proportional–integral–derivative (PID), optimal, robust, adaptive, robust adaptive, and switching control. In conclusion, hydraulic actuators are most commonly used, but they impose high power requirements, limiting practical realizations of active suspensions. Electromagnetic actuators are seen to hold the promise of lower power requirements, and rigorous research and development should be conducted to make them commercially usable. Current focus on control methods that are robust to suspension parameter variations also seems to produce limited performance improvements, and future control approaches should be adaptive to the changeable driving conditions.
被引次数: WebOfScience(1)
17. A cross-layer fault tolerance management module for wireless sensor networks
Ozlem Karaca, Radosveta Sokullu
Front. Inform. Technol. Electron. Eng.    2012, 13 (9): 660-673.   DOI: 10.1631/jzus.C1200029
摘要  
It is a well-established fact that wireless sensor networks (WSNs) are very power constraint networks, but besides this, they are inherently more fault-prone than any other type of wireless network and their protocol design is very application specific. Major reasons for the faults are the unpredictable wireless communication channel, battery depletion, as well as fragility and mobility of the nodes. Furthermore, as traditional protocol design methods have proved inadequate, the cross-layer design (CLD) approach, which allows for interactions between different layers, providing more flexible and energy-efficient functionality, has emerged as a viable solution for WSNs. In this study we define a fault tolerance management module suitable to the requirements, limitations, and specifics of WSNs, encompassing methods for fault detection, fault prevention, fault management, and recovery. The suggested solution is in line with the CLD approach, which is an important factor in increasing the network performance. Through simulations the functionality of the network is evaluated, based on packet loss, delay, and energy consumption, and is compared with a similar solution not including fault management. The results achieved support the idea that the introduction of a unified approach to fault management improves the network performance as a whole.
被引次数: WebOfScience(2)
18. Mobility assisted spectrum aware routing protocol for cognitive radio ad hoc networks
Omid Abedi, Reza Berangi
Front. Inform. Technol. Electron. Eng.    2013, 14 (11): 873-886.   DOI: 10.1631/jzus.C1200334
摘要  
We propose a mobility assisted spectrum aware routing (MASAR) protocol for cognitive radio ad hoc networks (CRAHNs), providing robustness to primary user activity and node mobility. This protocol allows nodes to collect spectrum information during a spectrum management interval followed by a transmission period. Cognitive users discover next hops based on the collected spectrum and mobility information. Using a beaconless mechanism, nodes obtain the mobility information and spectrum status of their neighbors. A geographical routing scheme is adopted to avoid performance degradation specially due to the mobility of the nodes and the activity of the primary users. Our scheme uses two approaches to find either short or stable routes. Since mobility metrics have a significant role in the selection of the next hop, both approaches use a reactive mobility update process assisted by mobility prediction to avoid location errors. MASAR protocol performance is investigated through simulations of different scenarios and compared with that of the most similar protocol, CAODV. The results indicate that MASAR can achieve significant reduction in control overhead as well as improved packet delivery in highly mobile networks.
被引次数: WebOfScience(1)
19. Review of the current and future technologies for video compression
Lu YU, Jian-peng WANG
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 1-13.   DOI: 10.1631/jzus.C0910684
摘要   PDF(pc) (339KB)(2809)   
Many important developments in video compression technologies have occurred during the past two decades. The block-based discrete cosine transform with motion compensation hybrid coding scheme has been widely employed by most available video coding standards, notably the ITU-T H.26xand ISO/IEC MPEG-xfamilies and video part of China audio video coding standard (AVS). The objective of this paper is to provide a review of the developments of the four basic building blocks of hybrid coding scheme, namely predictive coding, transform coding, quantization and entropy coding, and give theoretical analyses and summaries of the technological advancements. We further analyze the development trends and perspectives of video compression, highlighting problems and research directions.
被引次数: WebOfScience(3)
20. Optimization of the resonant frequency servo loop technique in the resonator micro optic gyro
Yang Ren, Zhong-he Jin, Yan Chen, Hui-lian Ma
Front. Inform. Technol. Electron. Eng.    2011, 12 (11): 942-950.   DOI: 10.1631/jzus.C1000441
摘要   PDF(pc) (634KB)(2806)   
Proportional integrator (PI) is always adopted in the resonant frequency servo loop in a resonator micro optic gyro (RMOG). The oscillation phenomenon is observed when adjusting the loop gain surpassing a threshold. This phenomenon limits system performance on step response speed and residual error. Based on the experiment system, a simulation model was set up. Further analysis shows that the threshold gain is related to the system loop filter setting and the loop delay. The traditional PI frequency servo loop technique in the RMOG system cannot keep up with the environment’s disturbance quickly enough, which leads to a large residual error. A compensating method is proposed to optimize the tracking performance, solve the oscillation problem, and speed up the system response. Simulation and experiment results show that the compensated system is superior in performance. It has less residual error in the stable state and is 10 times quicker than the uncompensated system on the step response.
被引次数: WebOfScience(9)
21. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Rong FAN, Dao-jing HE, Xue-zeng PAN, Ling-di PING
Front. Inform. Technol. Electron. Eng.    2011, 12 (7): 550-560.   DOI: 10.1631/jzus.C1000377
摘要   PDF(pc) (307KB)(2797)   
Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints. Considering that most large-scale WSNs follow a two-tiered architecture, we propose an efficient and denial-of-service (DoS)-resistant user authentication scheme for two-tiered WSNs. The proposed approach reduces the computational load, since it performs only simple operations, such as exclusive-OR and a one-way hash function. This feature is more suitable for the resource-limited sensor nodes and mobile devices. And it is unnecessary for master nodes to forward login request messages to the base station, or maintain a long user list. In addition, pseudonym identity is introduced to preserve user anonymity. Through clever design, our proposed scheme can prevent smart card breaches. Finally, security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme.
被引次数: WebOfScience(6)
22. A hybrid brain-computer interface control strategy in a virtual environment
Yu Su, Yu Qi, Jian-xun Luo, Bian Wu, Fan Yang, Yi Li, Yue-ting Zhuang, Xiao-xiang Zheng, Wei-dong Chen
Front. Inform. Technol. Electron. Eng.    2011, 12 (5): 351-361.   DOI: 10.1631/jzus.C1000208
摘要   PDF(pc) (994KB)(2776)   
This paper presents a hybrid brain-computer interface (BCI) control strategy, the goal of which is to expand control functions of a conventional motor imagery or a P300 potential based BCI in a virtual environment. The hybrid control strategy utilizes P300 potential to control virtual devices and motor imagery related sensorimotor rhythms to navigate in the virtual world. The two electroencephalography (EEG) patterns serve as source signals for different control functions in their corresponding system states, and state switch is achieved in a sequential manner. In the current system, imagination of left/right hand movement was translated into turning left/right in the virtual apartment continuously, while P300 potentials were mapped to discrete virtual device control commands using a five-oddball paradigm. The combination of motor imagery and P300 patterns in one BCI system for virtual environment control was tested and the results were compared with those of a single motor imagery or P300-based BCI. Subjects obtained similar performances in the hybrid and single control tasks, which indicates the hybrid control strategy works well in the virtual environment.
被引次数: WebOfScience(5)
23. 基于Kinect的实时面部情感识别
Qi-rong Mao, Xin-yu Pan, Yong-zhao Zhan, Xiang-jun Shen
Front. Inform. Technol. Electron. Eng.    2015, 16 (4): 272-282.   DOI: 10.1631/FITEE.1400209
摘要  
目的:基于Kinect提取面部表情特征,实现对视频中面部情感实时识别。
创新点:基于Kinect提出一种新颖的面部情感识别方法,充分发挥出Kinect高速易用的优势,可实时对视频序列最新连续帧中表现出的情感进行综合判定。识别方法涉及两种不同形式的表情特征,对此我们也针对性地提出基于最大置信的融合算法。
方法:首先,运用Kinect中Face Tracking SDK从实时视频数据中追踪人脸、提取面部运动单元信息和特征点坐标(图3、4)。然后,将这两类特征信息并行处理,在它们各自特征通道中,特征数据经7元1-vs-1分类器组进行预识别,将得到的预识别结果存入缓存用于情感置信统计,置信度最高的即为此通道中的情感识别结果(图2)。最后,融合这两个特征通道的结果即可得到最终情感识别结果(图1)。
结论:基于Kinect提取到的两种面部表情特征(面部运动单元信息和特征点坐标),提出一种新颖高效的面部情感识别方法,实现对视频中面部情感实时识别。
24. A novel frequency-selective metamaterial to improve helix antenna
Iraj Arghand Lafmajani, Pejman Rezaei
Front. Inform. Technol. Electron. Eng.    2012, 13 (5): 365-375.   DOI: 10.1631/jzus.C1100239
摘要  
A novel frequency-selective metamaterial with negative permittivity and permeability for improving directivity and gain of a helix antenna is presented in this paper. The proposed metamaterial is composed of two Z-shape resonators printed on opposite sides of a dielectric substrate. Two forms of multilayered cells are found to be suitable for antennas and waveguides applications. In addition, a new method of designing a metamaterial-based helix antenna is presented with high directivity and gain. A comparison on radiation properties is given between the conventional and the new metamaterial-based helix antennas. Two comparisons on radiation properties are performed: (1) the effect of proposed Z-structure on monopole, dipole, and helix antennas; (2) the effect of OE3, split-ring resonator (SRR), and proposed Z-structure unit cells on the performance of helix antennas. The results show improvement of parameters such as directivity, gain, and radiation power of the new metamaterial-based helix antenna. Therefore, the combination of Z-structure with the helix antenna shows the best performance.
25. Miniaturized fractal-shaped branch-line coupler for dual-band applications based on composite right/left handed transmission lines
He-xiu Xu, Guang-ming Wang, Pei-lin Chen, Tian-peng Li
Front. Inform. Technol. Electron. Eng.    2011, 12 (9): 766-773.   DOI: 10.1631/jzus.C1000343
摘要   PDF(pc) (606KB)(2722)   
In this paper, novel dual-band (DB) branch-line couplers (BLCs) employing a composite right/left handed transmission line (CRLH TL) and fractal geometry are presented for the first time. The CRLH TL, with specified characteristic impedance and phase shift, consists of lumped elements for the left handed (LH) part and fractal-shaped microstrip lines (MLs) for the right handed (RH) part, which can be designed separately. Two designed BLCs are involved in size reduction, one using a 3/2 fractal curve of first iteration, the other constructed based on a hybrid shape of fractal and meandered lines. A miniaturized principle for CRLH TL realization is derived and an exact design method for fractal implementation is developed. For verification, an example coupler was fabricated and measured. Consistent numerical and experimental results confirmed the design concept, showing that the BLCs obtain DB behavior centered at 0.9 GHz and 1.8 GHz respectively with good in-band performance, except for slightly larger coupled insertion loss for the hybrid-shaped BLC case. In addition, the proposed fractal- and hybrid-shaped BLCs obtained a 49.7% and 64.1% size reduction respectively relative to their conventional counterparts working in the lower band. The most important contributions of this article are the demonstration of compatibility between the fractal and CRLH TL techniques and the provision of an alternative approach and a new concept for designing devices.
被引次数: WebOfScience(4)
26. Robust lossless data hiding scheme
Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 101-110.   DOI: 10.1631/jzus.C0910177
摘要   PDF(pc) (549KB)(2719)   
This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-1-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the algorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved.
被引次数: WebOfScience(1)
27. Effective operation and performance improvement methods for OMTP BONDI-based mobile Web widget resources
Jiwoong Bang, Daewon Kim
Front. Inform. Technol. Electron. Eng.    2011, 12 (10): 787-799.   DOI: 10.1631/jzus.C1000379
摘要   PDF(pc) (1159KB)(2646)   
The Open Mobile Terminal Platform (OMTP) is a global forum made by telecommunications providers to promote user-oriented mobile services and data businesses. Devised by OMTP, BONDI is a browser-based application or a mobile Web run-time platform to help widgets make good use of the functions of mobile devices in a secure way. BONDI enables applications programmed with Web standard technologies such as HTML, JavaScript, CSS, and AJAX to reach the internal functions of mobile devices. Since BONDI, which is not just a simple network application, can reach the internal resources of devices in standard ways, it enables the application and widgets to be developed regardless of the operating system (OS) or platform. Web browser-based widgets are vulnerable to the network environment, and their execution speed can be slowed as the operations of the widgets or applications become heavy. Compared with the native widgets inside the device, however, those Web widgets will be continuously used thanks to the user-friendly simple interface and the faster speed in using Web resources. This study deals with a method to effectively operate and manage the resources of OMTP BONDI Web widget and provides improved results based on running performance evaluation experiments. The experiments were carried out to improve the entire operating time by enhancing the module-loading speed. In this regard, only indispensable modules were allowed to be loaded while the BONDI widget was underway. For this purpose, the widget resource list, which can make the operating speed of the BONDI widget faster, was redefined while a widget cache was employed. In addition, the widget box, a management tool for removed widgets, was devised to store temporarily idle widgets.
28. A 20 μW 95 dB dynamic range 4th-order Delta-Sigma modulator with novel power efficient operational transconductance amplifier and resonator
Jian Xu, Xiao-bo Wu, Meng-lian Zhao, Jun-yi Shen
Front. Inform. Technol. Electron. Eng.    2011, 12 (6): 486-498.   DOI: 10.1631/jzus.C1000239
摘要   PDF(pc) (893KB)(2619)   
A low power high performance Delta-Sigma modulator for portable measurement applications is presented. To reduce power consumption while maintaining high performance, a fully feedforward architecture with a comprehensive system-level design is implemented. As a key building block, a novel power efficient current mirror operational transconductance amplifier (OTA) with a fast-settling less-error switched-capacitor common-mode feedback (SC CMFB) circuit is introduced, and the effects of both gain nonlinearity and 1/f noise of OTA are discussed. A new method to determine the voltage gain of an OTA is also proposed. The bottom terminal parasitic effect of poly-insulator-poly (PIP) capacitors is considered. About an extra 20% of capacitance is added to the total capacitance load. A power and area efficient resonator is adopted to realize a coefficient of 1/90 for 50% power and 75% area reduction compared with conventional designs. The chip is implemented in a low cost 0.35 μm complementary metal oxide semiconductor (CMOS) process. The total power consumption is 20 μW with a 1.5 V supply, and the measured dynamic range (DR) is 95 dB over a 1 kHz bandwidth. Experimental results show that a high figure-of-merit (FOM) is achieved for the designed modulator in comparison with those from the literature.
被引次数: WebOfScience(2)
29. Automatic pectoral muscle boundary detection in mammograms based on Markov chain and active contour model
Lei WANG, Miao-liang ZHU, Li-ping DENG, Xin YUAN
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 111-118.   DOI: 10.1631/jzus.C0910025
摘要   PDF(pc) (609KB)(2619)   
Automatic pectoral muscle removal on medio-lateral oblique (MLO) view of mammogram is an essential step for many mammographic processing algorithms. However, it is still a very difficult task since the sizes, the shapes and the intensity contrasts of pectoral muscles change greatly from one MLO view to another. In this paper, we propose a novel method based on a discrete time Markov chain (DTMC) and an active contour model to automatically detect the pectoral muscle boundary. DTMC is used to model two important characteristics of the pectoral muscle edge, i.e., continuity and uncertainty. After obtaining a rough boundary, an active contour model is applied to refine the detection results. The experimental results on images from the Digital Database for Screening Mammography (DDSM) showed that our method can overcome many limitations of existing algorithms. The false positive (FP) and false negative (FN) pixel percentages are less than 5% in 77.5% mammograms. The detection precision of 91% meets the clinical requirement.
被引次数: WebOfScience(9)
30. Efficient implementation of a cubic-convolution based image scaling engine
Xiang Wang, Yong Ding, Ming-yu Liu, Xiao-lang Yan
Front. Inform. Technol. Electron. Eng.    2011, 12 (9): 743-753.   DOI: 10.1631/jzus.C1100040
摘要   PDF(pc) (844KB)(2579)   
In video applications, real-time image scaling techniques are often required. In this paper, an efficient implementation of a scaling engine based on 4×4 cubic convolution is proposed. The cubic convolution has a better performance than other traditional interpolation kernels and can also be realized on hardware. The engine is designed to perform arbitrary scaling ratios with an image resolution smaller than 2560×1920 pixels and can scale up or down, in horizontal or vertical direction. It is composed of four functional units and five line buffers, which makes it more competitive than conventional architectures. A strict fixed-point strategy is applied to minimize the quantization errors of hardware realization. Experimental results show that the engine provides a better image quality and a comparatively lower hardware cost than reference implementations.
被引次数: WebOfScience(1)

编辑部公告More

友情链接