全文下载排行

一年内发表文章 | 两年内 | 三年内 | 全部 | 最近1个月下载排行 | 最近1年下载排行

当前位置: 最近1个月下载排行
Please wait a minute...
1. Efficient dynamic pruning on largest scores first (LSF) retrieval
Kun JIANG, Yue-xiang YANG
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 1-14.   DOI: 10.1631/FITEE.1500190
摘要   HTML PDF(pc) (451KB)(669)   

Inverted index traversal techniques have been studied in addressing the query processing performance challenges of web search engines, but still leave much room for improvement. In this paper, we focus on the inverted index traversal on document-sorted indexes and the optimization technique called dynamic pruning, which can efficiently reduce the hardware computational resources required. We propose another novel exhaustive index traversal scheme called largest scores first (LSF) retrieval, in which the candidates are first selected in the posting list of important query terms with the largest upper bound scores and then fully scored with the contribution of the remaining query terms. The scheme can effectively reduce the memory consumption of existing term-at-a-time (TAAT) and the candidate selection cost of existing document-at-a-time (DAAT) retrieval at the expense of revisiting the posting lists of the remaining query terms. Preliminary analysis and implementation show comparable performance between LSF and the two well-known baselines. To further reduce the number of postings that need to be revisited, we present efficient rank safe dynamic pruning techniques based on LSF, including two important optimizations called list omitting (LSF_LO) and partial scoring (LSF_PS) that make full use of query term importance. Finally, experimental results with the TREC GOV2 collection show that our new index traversal approaches reduce the query latency by almost 27% over the WAND baseline and produce slightly better results compared with the MaxScore baseline, while returning the same results as exhaustive evaluation.

2. Measured boundary parameterization based on Poisson’s equation
Jun-jie CAO, Zhi-xun SU, Xiu-ping LIU, Hai-chuan BI
Front. Inform. Technol. Electron. Eng.    2010, 11 (3): 187-198.   DOI: 10.1631/jzus.C0910460
摘要   PDF(pc) (628KB)(1498)   
One major goal of mesh parameterization is to minimize the conformal distortion. Measured boundary parameterizations focus on lowering the distortion by setting the boundary free with the help of distance from a center vertex to all the boundary vertices. Hence these parameterizations strongly depend on the determination of the center vertex. In this paper, we introduce two methods to determine the center vertex automatically. Both of them can be used as necessary supplements to the existing measured boundary methods to minimize the common artifacts as a result of the obscure choice of the center vertex. In addition, we propose a simple and fast measured boundary parameterization method based on the Poisson’s equation. Our new approach generates less conformal distortion than the fixed boundary methods. It also generates more regular domain boundaries than other measured boundary methods. Moreover, it offers a good tradeoff between computation costs and conformal distortion compared with the fast and robust angle based flattening (ABF++).
3. Review of the current and future technologies for video compression
Lu YU, Jian-peng WANG
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 1-13.   DOI: 10.1631/jzus.C0910684
摘要   PDF(pc) (339KB)(2928)   
Many important developments in video compression technologies have occurred during the past two decades. The block-based discrete cosine transform with motion compensation hybrid coding scheme has been widely employed by most available video coding standards, notably the ITU-T H.26xand ISO/IEC MPEG-xfamilies and video part of China audio video coding standard (AVS). The objective of this paper is to provide a review of the developments of the four basic building blocks of hybrid coding scheme, namely predictive coding, transform coding, quantization and entropy coding, and give theoretical analyses and summaries of the technological advancements. We further analyze the development trends and perspectives of video compression, highlighting problems and research directions.
被引次数: WebOfScience(3)
4. Multi-instance learning for software quality estimation in object-oriented systems: a case study
Peng HUANG, Jie ZHU
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 130-138.   DOI: 10.1631/jzus.C0910084
摘要   PDF(pc) (160KB)(2308)   
We investigate a problem of object-oriented (OO) software quality estimation from a multi-instance (MI) perspective. In detail, each set of classes that have an inheritance relation, named ‘class hierarchy’, is regarded as a bag, while each class in the set is regarded as an instance. The learning task in this study is to estimate the label of unseen bags, i.e., the fault-proneness of untested class hierarchies. A fault-prone class hierarchy contains at least one fault-prone (negative) class, while a non-fault-prone (positive) one has no negative class. Based on the modification records (MRs) of the previous project releases and OO software metrics, the fault-proneness of an untested class hierarchy can be predicted. Several selected MI learning algorithms were evaluated on five datasets collected from an industrial software project. Among the MI learning algorithms investigated in the experiments, the kernel method using a dedicated MI-kernel was better than the others in accurately and correctly predicting the fault-proneness of the class hierarchies. In addition, when compared to a supervised support vector machine (SVM) algorithm, the MI-kernel method still had a competitive performance with much less cost.
被引次数: WebOfScience(2)
5. Robust lossless data hiding scheme
Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 101-110.   DOI: 10.1631/jzus.C0910177
摘要   PDF(pc) (549KB)(2799)   
This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-1-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the algorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved.
被引次数: WebOfScience(1)
6. Blind carrier frequency offset estimation for constant modulus signaling based OFDM systems: algorithm, identifiability, and performance analysis
Wei-yang XU, Bo LU, Xing-bo HU, Zhi-liang HONG
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 14-26.   DOI: 10.1631/jzus.C0910150
摘要   PDF(pc) (445KB)(2415)   
Carrier frequency offset (CFO) estimation is critical for orthogonal frequency-division multiplexing (OFDM) based transmissions. In this paper, we present a low-complexity, blind CFO estimator for OFDM systems with constant modulus (CM) signaling. Both single-input single-output (SISO) and multiple-input multiple-output (MIMO) systems are considered. Based on the assumption that the channel keeps constant during estimation, we prove that the CFO can be estimated uniquely and exactly through minimizing the power difference of received data on the same subcarriers between two consecutive OFDM symbols; thus, the identifiability problem is assured. Inspired by the sinusoid-like cost function, curve fitting is utilized to simplify our algorithm. Performance analysis reveals that the proposed estimator is asymptotically unbiased and the mean square error (MSE) exhibits no error floor. We show that this blind scheme can also be applied to a MIMO system. Numerical simulations show that the proposed estimator provides excellent performance compared with existing blind methods.
被引次数: WebOfScience(2)
7. Automatic pectoral muscle boundary detection in mammograms based on Markov chain and active contour model
Lei WANG, Miao-liang ZHU, Li-ping DENG, Xin YUAN
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 111-118.   DOI: 10.1631/jzus.C0910025
摘要   PDF(pc) (609KB)(2683)   
Automatic pectoral muscle removal on medio-lateral oblique (MLO) view of mammogram is an essential step for many mammographic processing algorithms. However, it is still a very difficult task since the sizes, the shapes and the intensity contrasts of pectoral muscles change greatly from one MLO view to another. In this paper, we propose a novel method based on a discrete time Markov chain (DTMC) and an active contour model to automatically detect the pectoral muscle boundary. DTMC is used to model two important characteristics of the pectoral muscle edge, i.e., continuity and uncertainty. After obtaining a rough boundary, an active contour model is applied to refine the detection results. The experimental results on images from the Digital Database for Screening Mammography (DDSM) showed that our method can overcome many limitations of existing algorithms. The false positive (FP) and false negative (FN) pixel percentages are less than 5% in 77.5% mammograms. The detection precision of 91% meets the clinical requirement.
被引次数: WebOfScience(9)
8. Online detection of bursty events and their evolution in news streams
Wei Chen, Chun Chen, Li-jun Zhang, Can Wang, Jia-jun Bu
Front. Inform. Technol. Electron. Eng.    2010, 11 (5): 340-355.   DOI: 10.1631/jzus.C0910245
摘要   PDF(pc) (250KB)(1348)   
Online monitoring of temporally-sequenced news streams for interesting patterns and trends has gained popularity in the last decade. In this paper, we study a particular news stream monitoring task: timely detection of bursty events which have happened recently and discovery of their evolutionary patterns along the timeline. Here, a news stream is represented as feature streams of tens of thousands of features (i.e., keyword. Each news story consists of a set of keywords.). A bursty event therefore is composed of a group of bursty features, which show bursty rises in frequency as the related event emerges. In this paper, we give a formal definition to the above problem and present a solution with the following steps: (1) applying an online multi-resolution burst detection method to identify bursty features with different bursty durations within a recent time period; (2) clustering bursty features to form bursty events and associating each event with a power value which reflects its bursty level; (3) applying an information retrieval method based on cosine similarity to discover the event’s evolution (i.e., highly related bursty events in history) along the timeline. We extensively evaluate the proposed methods on the Reuters Corpus Volume 1. Experimental results show that our methods can detect bursty events in a timely way and effectively discover their evolution. The power values used in our model not only measure event’s bursty level or relative importance well at a certain time point but also show relative strengths of events along the same evolution.
被引次数: WebOfScience(5)
9. A new protocol of wide use for e-mail with perfect forward secrecy
Tzung-her CHEN, Yan-ting WU
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 74-78.   DOI: 10.1631/jzus.A0910126
摘要   PDF(pc) (219KB)(1933)   
Recently, Sun et al. (2005) highlighted the essential property of perfect forward secrecy (PFS) for e-mail protocols when a higher security level is desirable. Furthermore, Sun et al. (2005)’s protocols take only a single e-mail server into account. Actually, it is much more common that the sender and the recipient register at different e-mail servers. Compared to existing protocols, the protocol proposed in this paper takes into account the scenario that the sender and the recipient register at different servers. The proposed protocol is skillfully designed to achieve PFS and end-to-end security as well as to satisfy the requirements of confidentiality, origin, integrity and easy key management. The comparison in terms of functionality and computational efficiency demonstrates the superiority of the present scheme.
被引次数: WebOfScience(1)
10. Image meshing via hierarchical optimization
Hao XIE,Ruo-feng TONG
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 32-40.   DOI: 10.1631/FITEE.1500171
摘要   HTML PDF(pc) (1027KB)(613)   

Vector graphic , as a kind of geometric representation of raster images, has many advantages, e.g., definition independence and editing facility. A popular way to convert raster images into vector graphics is {image meshing}, the aim of which is to find a mesh to represent an image as faithfully as possible. For traditional meshing algorithms, the crux of the problem resides mainly in the high non-linearity and non-smoothness of the objective, which makes it difficult to find a desirable optimal solution. To ameliorate this situation, we present a hierarchical optimization algorithm solving the problem from coarser levels to finer ones, providing initialization for each level with its coarser ascent. To further simplify the problem, the original non-convex problem is converted to a linear least squares one, and thus becomes convex, which makes the problem much easier to solve. A dictionary learning framework is used to combine geometry and topology elegantly. Then an alternating scheme is employed to solve both parts. Experiments show that our algorithm runs fast and achieves better results than existing ones for most images.

11. Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 119-129.   DOI: 10.1631/jzus.C0910488
摘要   PDF(pc) (423KB)(2527)   
It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon engender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model, in this paper, we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors: (1) network topology, (2) countermeasures taken by Internet service providers (ISPs) and users, (3) configuration diversity of nodes in the P2P network, and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways: improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation.
被引次数: WebOfScience(8)
12. Joint bandwidth allocation and power control with interference constraints in multi-hop cognitive radio networks
Guang-xi ZHU, Xue-bing PEI, Dai-ming QU, Jian LIU, Qing-ping WANG, Gang SU
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 139-150.   DOI: 10.1631/jzus.C0910070
摘要   PDF(pc) (470KB)(2197)   
We investigate the bandwidth allocation and power control schemes in orthogonal frequency division multiplexing (OFDM) based multi-hop cognitive radio networks, and the color-sensitive graph coloring (CSGC) model is viewed as an efficient solution to the spectrum assignment problem. We extend the model by taking into account the power control strategy to avoid interference among secondary users and adapt dynamic topology. We formulate the optimization problem encompassing the channel allocation, power control with the interference constrained below a tolerable limit. The optimization objective with two different optimization strategies focuses on the routes rather than the links as in traditional approaches. A heuristic solution to this nondeterministic polynomial (NP)-hard problem is presented, which performs iterative channel allocation according to the lowest transmission power that guarantees the link connection and makes channel reuse as much as possible, and then the transmission power of each link is maximized to improve the channel capacity by gradually adding power level from the lowest transmission power until all co-channel links cannot satisfy the interference constraints. Numerical results show that our proposed strategies outperform the existing spectrum assignment algorithms in the performance of both the total network bandwidth and minimum route bandwidth of all routes, meanwhile, saving the transmission power.
13. An efficient hardware design for HDTV H.264/AVC encoder
Liang Wei, Dan-dan Ding, Juan Du, Bin-bin Yu, Lu Yu
Front. Inform. Technol. Electron. Eng.    2011, 12 (6): 499-506.   DOI: 10.1631/jzus.C1000201
摘要   PDF(pc) (187KB)(2532)   
This paper presents a hardware efficient high definition television (HDTV) encoder for H.264/AVC. We use a two-level mode decision (MD) mechanism to reduce the complexity and maintain the performance, and design a sharable architecture for normal mode fractional motion estimation (NFME), special mode fractional motion estimation (SFME), and luma motion compensation (LMC), to decrease the hardware cost. Based on these technologies, we adopt a four-stage macro-block pipeline scheme using an efficient memory management strategy for the system, which greatly reduces on-chip memory and bandwidth requirements. The proposed encoder uses about 1126k gates with an average Bjontegaard-Delta peak signal-to-noise ratio (BD-PSNR) decrease of 0.5 dB, compared with JM15.0. It can fully satisfy the real-time video encoding for 1080p@30 frames/s of H.264/AVC high profile.
被引次数: WebOfScience(2)
14. Artificial muscles for wearable assistance and rehabilitation
Tian-yun DONG, Xiang-liang ZHANG, Tao LIU
Front. Inform. Technol. Electron. Eng.    2018, 19 (11): 1303-1315.  
摘要  
Traditional exoskeletons have made considerable contributions to people in terms of providing wearable assistance and
rehabilitation. However, exoskeletons still have some disadvantages, such as being heavy, bulky, stiff, noisy, and having a fixed
center of rotation that can be a burden on elders and patients with weakened muscles. Conversely, artificial muscles based on soft,
smart materials possess the attributes of being lightweight, compact, highly flexible, and have mute actuation, for which they are
considered to be the most similar to natural muscles. Among these materials, dielectric elastomer (DE) and polyvinyl chloride
(PVC) gel exhibit considerable actuation strain, high actuation stress, high response speed, and long life span, which give them
great potential for application in wearable assistance and rehabilitation. Unfortunately, there is very little research on the appli-
cation of these two materials in these fields. In this review, we first introduce the working principles of the DE and PVC gel
separately. Next, we summarize the DE materials and the preparation of PVC gel. Then, we review the electrodes and self-sensing
systems of the two materials. Lastly, we present the initial applications of these two materials for wearable assistance and
rehabilitation.
15. Dr. Hadoop: an infinite scalable metadata management for Hadoop—How the baby elephant becomes immortal
Dipayan DEV,Ripon PATGIRI
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 15-31.   DOI: 10.1631/FITEE.1500015
摘要   HTML PDF(pc) (1278KB)(1226)   

In this Exa byte scale era, data increases at an exponential rate. This is in turn generating a massive amount of metadata in the file system. Hadoop is the most widely used framework to deal with big data. Due to this growth of huge amount of metadata, however, the efficiency of Hadoop is questioned numerous times by many researchers. Therefore, it is essential to create an efficient and scalable metadata management for Hadoop. Hash-based mapping and subtree partitioning are suitable in distributed metadata management schemes. Subtree partitioning does not uniformly distribute workload among the metadata servers, and metadata needs to be migrated to keep the load roughly balanced. Hash-based mapping suffers from a constraint on the locality of metadata, though it uniformly distributes the load among NameNodes, which are the metadata servers of Hadoop. In this paper, we present a circular metadata management mechanism named dynamic circular metadata splitting (DCMS). DCMS preserves metadata locality using consistent hashing and locality-preserving hashing, keeps replicated metadata for excellent reliability, and dynamically distributes metadata among the NameNodes to keep load balancing. NameNode is a centralized heart of the Hadoop. Keeping the directory tree of all files, failure of which causes the single point of failure (SPOF). DCMS removes Hadoop’s SPOF and provides an efficient and scalable metadata management. The new framework is named ‘Dr. Hadoop’ after the name of the authors.

16. Clustering-based hyperspectral band selection using sparse nonnegative matrix factorization
Ji-ming Li, Yun-tao Qian
Front. Inform. Technol. Electron. Eng.    2011, 12 (7): 542-549.   DOI: 10.1631/jzus.C1000304
摘要   PDF(pc) (401KB)(2214)   
Hyperspectral imagery generally contains a very large amount of data due to hundreds of spectral bands. Band selection is often applied firstly to reduce computational cost and facilitate subsequent tasks such as land-cover classification and higher level image analysis. In this paper, we propose a new band selection algorithm using sparse nonnegative matrix factorization (sparse NMF). Though acting as a clustering method for band selection, sparse NMF need not consider the distance metric between different spectral bands, which is often the key step for most common clustering-based band selection methods. By imposing sparsity on the coefficient matrix, the bands’ clustering assignments can be easily indicated through the largest entry in each column of the matrix. Experimental results showed that sparse NMF provides considerable insight into the clustering-based band selection problem and the selected bands are good for land-cover classification.
被引次数: WebOfScience(3)
17. A sparse matrix model-based optical proximity correction algorithm with model-based mapping between segments and control sites
Bin Lin, Xiao-lang Yan, Zheng Shi, Yi-wei Yang
Front. Inform. Technol. Electron. Eng.    2011, 12 (5): 436-442.   DOI: 10.1631/jzus.C1000219
摘要   PDF(pc) (469KB)(2117)   
Optical proximity correction (OPC) is a key step in modern integrated circuit (IC) manufacturing. The quality of model-based OPC (MB-OPC) is directly determined by segment offsets after OPC processing. However, in conventional MB-OPC, the intensity of a control site is adjusted only by the movement of its corresponding segment; this scheme is no longer accurate enough as the lithography process advances. On the other hand, matrix MB-OPC is too time-consuming to become practical. In this paper, we propose a new sparse matrix MB-OPC algorithm with model-based mapping between segments and control sites. We put forward the concept of ‘sensitive area’. When the Jacobian matrix used in the matrix MB-OPC is evaluated, only the elements that correspond to the segments in the sensitive area of every control site need to be calculated, while the others can be set to 0. The new algorithm can effectively improve the sparsity of the Jacobian matrix, and hence reduce the computations. Both theoretical analysis and experiments show that the sparse matrix MB-OPC with model-based mapping is more accurate than conventional MB-OPC, and much faster than matrix MB-OPC while maintaining high accuracy.
被引次数: WebOfScience(4)
18. Image compression based on spatial redundancy removal and image inpainting
Vahid BASTANI, Mohammad Sadegh HELFROUSH, Keyvan KASIRI
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 92-100.   DOI: 10.1631/jzus.C0910182
摘要   PDF(pc) (606KB)(4305)   
We present an algorithm for image compression based on an image inpainting method. First the image regions that can be accurately recovered are located. Then, to reduce the data, information of such regions is removed. The remaining data besides essential details for recovering the removed regions are encoded to produce output data. At the decoder, an inpainting method is applied to retrieve removed regions using information extracted at the encoder. The image inpainting technique utilizes partial differential equations (PDEs) for recovering information. It is designed to achieve high performance in terms of image compression criteria. This algorithm was examined for various images. A high compression ratio of 1:40 was achieved at an acceptable quality. Experimental results showed attainable visible quality improvement at a high compression ratio compared with JPEG.
被引次数: WebOfScience(3)

编辑部公告More

友情链接