全文下载排行

一年内发表文章 | 两年内 | 三年内 | 全部 | 最近1个月下载排行 | 最近1年下载排行

当前位置: 最近1个月下载排行
Please wait a minute...
1. Congestion avoidance, detection and alleviation in wireless sensor networks
Wei-wei FANG, Ji-ming CHEN, Lei SHU, Tian-shu CHU, De-pei QIAN
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 63-73.   DOI: 10.1631/jzus.C0910204
摘要   PDF(pc) (638KB)(4365)   
Congestion in wireless sensor networks (WSNs) not only causes severe information loss but also leads to excessive energy consumption. To address this problem, a novel scheme for congestion avoidance, detection and alleviation (CADA) in WSNs is proposed in this paper. By exploiting data characteristics, a small number of representative nodes are chosen from those in the event area as data sources, so that the source traffic can be suppressed proactively to avoid potential congestion. Once congestion occurs inevitably due to traffic mergence, it will be detected in a timely way by the hotspot node based on a combination of buffer occupancy and channel utilization. Congestion is then alleviated reactively by either dynamic traffic multiplexing or source rate regulation in accordance with the specific hotspot scenarios. Extensive simulation results under typical congestion scenarios are presented to illuminate the distinguished performance of the proposed scheme.
被引次数: WebOfScience(13)
2. Robust lossless data hiding scheme
Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 101-110.   DOI: 10.1631/jzus.C0910177
摘要   PDF(pc) (549KB)(2825)   
This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-1-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the algorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved.
被引次数: WebOfScience(1)
3. Automatic pectoral muscle boundary detection in mammograms based on Markov chain and active contour model
Lei WANG, Miao-liang ZHU, Li-ping DENG, Xin YUAN
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 111-118.   DOI: 10.1631/jzus.C0910025
摘要   PDF(pc) (609KB)(2691)   
Automatic pectoral muscle removal on medio-lateral oblique (MLO) view of mammogram is an essential step for many mammographic processing algorithms. However, it is still a very difficult task since the sizes, the shapes and the intensity contrasts of pectoral muscles change greatly from one MLO view to another. In this paper, we propose a novel method based on a discrete time Markov chain (DTMC) and an active contour model to automatically detect the pectoral muscle boundary. DTMC is used to model two important characteristics of the pectoral muscle edge, i.e., continuity and uncertainty. After obtaining a rough boundary, an active contour model is applied to refine the detection results. The experimental results on images from the Digital Database for Screening Mammography (DDSM) showed that our method can overcome many limitations of existing algorithms. The false positive (FP) and false negative (FN) pixel percentages are less than 5% in 77.5% mammograms. The detection precision of 91% meets the clinical requirement.
被引次数: WebOfScience(9)
4. Modeling of hydraulic turbine systems based on a Bayesian-Gaussian neural network driven by sliding window data
Yi-jian LIU, Yan-jun FANG, Xue-mei ZHU
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 56-62.   DOI: 10.1631/jzus.C0910176
摘要   PDF(pc) (337KB)(2126)   
In this paper, a novel Bayesian-Gaussian neural network (BGNN) is proposed and applied to on-line modeling of a hydraulic turbine system (HTS). The new BGNN takes account of the complex nonlinear characteristics of HTS. Two redefined training procedures of the BGNN include the off-line training of the threshold matrix parameters, optimized by swarm optimization algorithms, and the on-line BGNN predictive application driven by the sliding window data method. The characteristics models of an HTS are identified using the new BGNN method and simulation results are presented which show the effectiveness of the BGNN in addressing modeling problems of HTS.
被引次数: WebOfScience(2)
5. Image meshing via hierarchical optimization
Hao XIE,Ruo-feng TONG
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 32-40.   DOI: 10.1631/FITEE.1500171
摘要   HTML PDF(pc) (1027KB)(628)   

Vector graphic , as a kind of geometric representation of raster images, has many advantages, e.g., definition independence and editing facility. A popular way to convert raster images into vector graphics is {image meshing}, the aim of which is to find a mesh to represent an image as faithfully as possible. For traditional meshing algorithms, the crux of the problem resides mainly in the high non-linearity and non-smoothness of the objective, which makes it difficult to find a desirable optimal solution. To ameliorate this situation, we present a hierarchical optimization algorithm solving the problem from coarser levels to finer ones, providing initialization for each level with its coarser ascent. To further simplify the problem, the original non-convex problem is converted to a linear least squares one, and thus becomes convex, which makes the problem much easier to solve. A dictionary learning framework is used to combine geometry and topology elegantly. Then an alternating scheme is employed to solve both parts. Experiments show that our algorithm runs fast and achieves better results than existing ones for most images.

6. Image compression based on spatial redundancy removal and image inpainting
Vahid BASTANI, Mohammad Sadegh HELFROUSH, Keyvan KASIRI
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 92-100.   DOI: 10.1631/jzus.C0910182
摘要   PDF(pc) (606KB)(4314)   
We present an algorithm for image compression based on an image inpainting method. First the image regions that can be accurately recovered are located. Then, to reduce the data, information of such regions is removed. The remaining data besides essential details for recovering the removed regions are encoded to produce output data. At the decoder, an inpainting method is applied to retrieve removed regions using information extracted at the encoder. The image inpainting technique utilizes partial differential equations (PDEs) for recovering information. It is designed to achieve high performance in terms of image compression criteria. This algorithm was examined for various images. A high compression ratio of 1:40 was achieved at an acceptable quality. Experimental results showed attainable visible quality improvement at a high compression ratio compared with JPEG.
被引次数: WebOfScience(3)
7. Improved switching based filter for protecting thin lines of color images
Chang-cheng WU, Chun-yu ZHAO, Da-yue CHEN
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 36-44.   DOI: 10.1631/jzus.C0910145
摘要   PDF(pc) (581KB)(2021)   
The classical vector median filter (VMF) has been widely used to remove impulse noise from color images. However, since the VMF cannot identify thin lines during the denoising process, many thin lines may be removed out as noise. This serious problem can be solved by a newly proposed filter that uses a noise detector to find these thin lines and then keep them unchanged. In this new approach, the noise detection scheme applied on a current processed pixel is realized through counting the close pixels in its eight neighbor positions and the expanded window to see whether the current pixel is corrupted by impulse noise. Based on the previous outputs, our algorithm can increase the performance in detecting and canceling the impulse noise. Extensive experiments indicate that this approach can be used to remove the impulse noise from a color image without distorting the useful information.
被引次数: WebOfScience(1)
8. Image driven shape deformation using styles
Guang-hua TAN, Wei CHEN, Li-gang LIU
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 27-35.   DOI: 10.1631/jzus.C0910089
摘要   PDF(pc) (452KB)(1771)   
In this paper, we propose an image driven shape deformation approach for stylizing a 3D mesh using styles learned from existing 2D illustrations. Our approach models a 2D illustration as a planar mesh and represents the shape styles with four components: the object contour, the context curves, user-specified features and local shape details. After the correspondence between the input model and the 2D illustration is established, shape stylization is formulated as a style-constrained differential mesh editing problem. A distinguishing feature of our approach is that it allows users to directly transfer styles from hand-drawn 2D illustrations with individual perception and cognition, which are difficult to identify and create with 3D modeling and editing approaches. We present a sequence of challenging examples including unrealistic and exaggerated paintings to illustrate the effectiveness of our approach.
被引次数: WebOfScience(2)
9. Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 119-129.   DOI: 10.1631/jzus.C0910488
摘要   PDF(pc) (423KB)(2532)   
It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon engender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model, in this paper, we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors: (1) network topology, (2) countermeasures taken by Internet service providers (ISPs) and users, (3) configuration diversity of nodes in the P2P network, and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways: improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation.
被引次数: WebOfScience(8)
10. Efficient dynamic pruning on largest scores first (LSF) retrieval
Kun JIANG, Yue-xiang YANG
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 1-14.   DOI: 10.1631/FITEE.1500190
摘要   HTML PDF(pc) (451KB)(676)   

Inverted index traversal techniques have been studied in addressing the query processing performance challenges of web search engines, but still leave much room for improvement. In this paper, we focus on the inverted index traversal on document-sorted indexes and the optimization technique called dynamic pruning, which can efficiently reduce the hardware computational resources required. We propose another novel exhaustive index traversal scheme called largest scores first (LSF) retrieval, in which the candidates are first selected in the posting list of important query terms with the largest upper bound scores and then fully scored with the contribution of the remaining query terms. The scheme can effectively reduce the memory consumption of existing term-at-a-time (TAAT) and the candidate selection cost of existing document-at-a-time (DAAT) retrieval at the expense of revisiting the posting lists of the remaining query terms. Preliminary analysis and implementation show comparable performance between LSF and the two well-known baselines. To further reduce the number of postings that need to be revisited, we present efficient rank safe dynamic pruning techniques based on LSF, including two important optimizations called list omitting (LSF_LO) and partial scoring (LSF_PS) that make full use of query term importance. Finally, experimental results with the TREC GOV2 collection show that our new index traversal approaches reduce the query latency by almost 27% over the WAND baseline and produce slightly better results compared with the MaxScore baseline, while returning the same results as exhaustive evaluation.

11. A novel ternary JK flip-flop using the resonant tunneling diode literal circuit
Mi Lin, Ling-ling Sun
Front. Inform. Technol. Electron. Eng.    2012, 13 (12): 944-950.   DOI: 10.1631/jzus.C1200214
摘要  
A literal circuit with a three-track-output structure is presented based on resonant tunneling diodes (RTDs). It can be transformed conveniently into a single-track-output structure according to the definition and properties of the literal operation. A ternary resonant tunneling JK flip-flop is created based on the RTD literal circuit and the module-3 operation, and the JK flip-flop also has two optional types of output structure. The design of the ternary RTD JK flip-flop is verified by simulation. The RTD literal circuit is the key design component for achieving various types of multi-valued logic (MVL) flip-flops. It can be converted into ternary D and JK flip-flops, and the ternary JK flip-flop can also be converted simply and conveniently into ternary D and ternary T flip-flops when the input signals satisfy certain logical relationships. All these types of flip-flops can be realized using the traditional Karnaugh maps combined with the literal and module-3 operations. This approach offers a novel design method for MVL resonant tunneling flip-flop circuits.
12. Computer vision based eyewear selector
Oscar DÉNIZ, Modesto CASTRILLÓN, Javier LORENZO, Luis ANTÓN, Mario HERNANDEZ, Gloria BUENO
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 79-91.   DOI: 10.1631/jzus.C0910377
摘要   PDF(pc) (1850KB)(3490)   
The widespread availability of portable computing power and inexpensive digital cameras are opening up new possibilities for retailers in some markets. One example is in optical shops, where a number of systems exist that facilitate eyeglasses selection. These systems are now more necessary as the market is saturated with an increasingly complex array of lenses, frames, coatings, tints, photochromic and polarizing treatments, etc. Research challenges encompass Computer Vision, Multimedia and Human-Computer Interaction. Cost factors are also of importance for widespread product acceptance. This paper describes a low-cost system that allows the user to visualize different glasses models in live video. The user can also move the glasses to adjust its position on the face. The system, which runs at 9.5 frames/s on general-purpose hardware, has a homeostatic module that keeps image parameters controlled. This is achieved by using a camera with motorized zoom, iris, white balance, etc. This feature can be specially useful in environments with changing illumination and shadows, like in an optical shop. The system also includes a face and eye detection module and a glasses management module.
被引次数: WebOfScience(3)
13. Blind carrier frequency offset estimation for constant modulus signaling based OFDM systems: algorithm, identifiability, and performance analysis
Wei-yang XU, Bo LU, Xing-bo HU, Zhi-liang HONG
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 14-26.   DOI: 10.1631/jzus.C0910150
摘要   PDF(pc) (445KB)(2423)   
Carrier frequency offset (CFO) estimation is critical for orthogonal frequency-division multiplexing (OFDM) based transmissions. In this paper, we present a low-complexity, blind CFO estimator for OFDM systems with constant modulus (CM) signaling. Both single-input single-output (SISO) and multiple-input multiple-output (MIMO) systems are considered. Based on the assumption that the channel keeps constant during estimation, we prove that the CFO can be estimated uniquely and exactly through minimizing the power difference of received data on the same subcarriers between two consecutive OFDM symbols; thus, the identifiability problem is assured. Inspired by the sinusoid-like cost function, curve fitting is utilized to simplify our algorithm. Performance analysis reveals that the proposed estimator is asymptotically unbiased and the mean square error (MSE) exhibits no error floor. We show that this blind scheme can also be applied to a MIMO system. Numerical simulations show that the proposed estimator provides excellent performance compared with existing blind methods.
被引次数: WebOfScience(2)
14. Automatic actor-based program partitioning
Omid BUSHEHRIAN
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 45-55.   DOI: 10.1631/jzus.C0910096
摘要   PDF(pc) (303KB)(2080)   
Software reverse engineering techniques are applied most often to reconstruct the architecture of a program with respect to quality constraints, or non-functional requirements such as maintainability or reusability. In this paper, AOPR, a novel actor-oriented program reverse engineering approach, is proposed to reconstruct an object-oriented program architecture based on a high performance model such as an actor model. Reconstructing the program architecture based on this model results in the concurrent execution of the program invocations and consequently increases the overall performance of the program provided enough processors are available. The proposed reverse engineering approach applies a hill climbing clustering algorithm to find actors.
被引次数: WebOfScience(1)
15. Multi-instance learning for software quality estimation in object-oriented systems: a case study
Peng HUANG, Jie ZHU
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 130-138.   DOI: 10.1631/jzus.C0910084
摘要   PDF(pc) (160KB)(2327)   
We investigate a problem of object-oriented (OO) software quality estimation from a multi-instance (MI) perspective. In detail, each set of classes that have an inheritance relation, named ‘class hierarchy’, is regarded as a bag, while each class in the set is regarded as an instance. The learning task in this study is to estimate the label of unseen bags, i.e., the fault-proneness of untested class hierarchies. A fault-prone class hierarchy contains at least one fault-prone (negative) class, while a non-fault-prone (positive) one has no negative class. Based on the modification records (MRs) of the previous project releases and OO software metrics, the fault-proneness of an untested class hierarchy can be predicted. Several selected MI learning algorithms were evaluated on five datasets collected from an industrial software project. Among the MI learning algorithms investigated in the experiments, the kernel method using a dedicated MI-kernel was better than the others in accurately and correctly predicting the fault-proneness of the class hierarchies. In addition, when compared to a supervised support vector machine (SVM) algorithm, the MI-kernel method still had a competitive performance with much less cost.
被引次数: WebOfScience(2)
16. A new protocol of wide use for e-mail with perfect forward secrecy
Tzung-her CHEN, Yan-ting WU
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 74-78.   DOI: 10.1631/jzus.A0910126
摘要   PDF(pc) (219KB)(1945)   
Recently, Sun et al. (2005) highlighted the essential property of perfect forward secrecy (PFS) for e-mail protocols when a higher security level is desirable. Furthermore, Sun et al. (2005)’s protocols take only a single e-mail server into account. Actually, it is much more common that the sender and the recipient register at different e-mail servers. Compared to existing protocols, the protocol proposed in this paper takes into account the scenario that the sender and the recipient register at different servers. The proposed protocol is skillfully designed to achieve PFS and end-to-end security as well as to satisfy the requirements of confidentiality, origin, integrity and easy key management. The comparison in terms of functionality and computational efficiency demonstrates the superiority of the present scheme.
被引次数: WebOfScience(1)
17. Mathematical modeling of electrochemical storage for incorporation in methods to optimize the operational planning of an interconnected micro grid
Elaheh Mashhour, S. M. Moghaddas-Tafreshi
Front. Inform. Technol. Electron. Eng.    2010, 11 (9): 737-750.   DOI: 10.1631/jzus.C0910721
摘要  
We extract a mathematical model to simulate the steady-state charging and discharging behaviors of an electrochemical storage over a 24-hour time interval. Moreover, we develop a model for optimizing the daily operational planning of an interconnected micro grid considering electrochemical storage. The optimization model is formulated to maximize the total benefit of the micro grid via selling power to its end consumers and also exchanging power with the wholesale energy market so that the constraints of distributed energy resources (DERs) and low-voltage grid are met. The optimization problem is solved by a genetic algorithm, and applied on two micro grids operating under different scenarios containing the absence or presence of electrochemical storages. Comparison of the results of the optimization model for this micro grid, with and without electrochemical storage, shows that the electrochemical storage can improve the economical efficiency of the interconnected micro grids by up to 10.16%.
被引次数: WebOfScience(6)
18. Semantics-oriented approach for information interoperability and governance: towards user-centric enterprise architecture management
Imran Ghani, Choon Yeul Lee, Sung Hyun Juhn, Seung Ryul Jeong
Front. Inform. Technol. Electron. Eng.    2010, 11 (4): 227-240.   DOI: 10.1631/jzus.C0910508
摘要   PDF(pc) (271KB)(1267)   
Enterprise architecture (EA) efforts focus on business, technology, data, and application architecture, and their integration. However, less attention has been given to one of the most critical EA elements, i.e., users (EA audiences). As a result, existing EA management systems (EAMS) have become old, large, content-centric document-repositories that are unable to provide meaningful information of use to the enterprise users and aligned with their needs and functional scope. We argue that a semantic technology based mechanism focusing on enterprise information and user-centricity has the potential to solve this problem. In this context, we present a novel ontology-based strategy named the user-centric semantics-oriented EA (U-SEA) model. Based on this model, we have developed a user-centric semantics-oriented enterprise architecture management (U-SEAM) system. Our approach is generic enough to be used in a wide variety of user-centric EAM applications. The results obtained show computational feasibility to integrate and govern enterprise information and to reduce complexity with respect to interoperability between enterprise information and users.
被引次数: WebOfScience(1)
19. Review of the current and future technologies for video compression
Lu YU, Jian-peng WANG
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 1-13.   DOI: 10.1631/jzus.C0910684
摘要   PDF(pc) (339KB)(2938)   
Many important developments in video compression technologies have occurred during the past two decades. The block-based discrete cosine transform with motion compensation hybrid coding scheme has been widely employed by most available video coding standards, notably the ITU-T H.26xand ISO/IEC MPEG-xfamilies and video part of China audio video coding standard (AVS). The objective of this paper is to provide a review of the developments of the four basic building blocks of hybrid coding scheme, namely predictive coding, transform coding, quantization and entropy coding, and give theoretical analyses and summaries of the technological advancements. We further analyze the development trends and perspectives of video compression, highlighting problems and research directions.
被引次数: WebOfScience(3)
20. An efficient radix-2 fast Fourier transform processor with ganged butterfly engines on field programmable gate arrays
Zhen-guo Ma, Feng Yu, Rui-feng Ge, Ze-ke Wang
Front. Inform. Technol. Electron. Eng.    2011, 12 (4): 323-329.   DOI: 10.1631/jzus.C1000258
摘要   PDF(pc) (164KB)(1084)   
We present a novel method to implement the radix-2 fast Fourier transform (FFT) algorithm on field programmable gate arrays (FPGA). The FFT architecture exploits parallelism by having more pipelined units in the stages, and more parallel units within a stage. It has the noticeable advantages of high speed and more efficient resource utilization by employing four ganged butterfly engines (GBEs), and can be well matched to the placement of the resources on the FPGA. We adopt the decimation-in-frequency (DIF) radix-2 FFT algorithm and implement the FFT processor on a state-of-the-art FPGA. Experimental results show that the processor can compute 1024-point complex radix-2 FFT in about 11 μs with a clock frequency of 200 MHz.
被引次数: WebOfScience(1)
21. Optimization of the resonant frequency servo loop technique in the resonator micro optic gyro
Yang Ren, Zhong-he Jin, Yan Chen, Hui-lian Ma
Front. Inform. Technol. Electron. Eng.    2011, 12 (11): 942-950.   DOI: 10.1631/jzus.C1000441
摘要   PDF(pc) (634KB)(2808)   
Proportional integrator (PI) is always adopted in the resonant frequency servo loop in a resonator micro optic gyro (RMOG). The oscillation phenomenon is observed when adjusting the loop gain surpassing a threshold. This phenomenon limits system performance on step response speed and residual error. Based on the experiment system, a simulation model was set up. Further analysis shows that the threshold gain is related to the system loop filter setting and the loop delay. The traditional PI frequency servo loop technique in the RMOG system cannot keep up with the environment’s disturbance quickly enough, which leads to a large residual error. A compensating method is proposed to optimize the tracking performance, solve the oscillation problem, and speed up the system response. Simulation and experiment results show that the compensated system is superior in performance. It has less residual error in the stable state and is 10 times quicker than the uncompensated system on the step response.
被引次数: WebOfScience(9)
22. Dr. Hadoop: an infinite scalable metadata management for Hadoop—How the baby elephant becomes immortal
Dipayan DEV,Ripon PATGIRI
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 15-31.   DOI: 10.1631/FITEE.1500015
摘要   HTML PDF(pc) (1278KB)(1230)   

In this Exa byte scale era, data increases at an exponential rate. This is in turn generating a massive amount of metadata in the file system. Hadoop is the most widely used framework to deal with big data. Due to this growth of huge amount of metadata, however, the efficiency of Hadoop is questioned numerous times by many researchers. Therefore, it is essential to create an efficient and scalable metadata management for Hadoop. Hash-based mapping and subtree partitioning are suitable in distributed metadata management schemes. Subtree partitioning does not uniformly distribute workload among the metadata servers, and metadata needs to be migrated to keep the load roughly balanced. Hash-based mapping suffers from a constraint on the locality of metadata, though it uniformly distributes the load among NameNodes, which are the metadata servers of Hadoop. In this paper, we present a circular metadata management mechanism named dynamic circular metadata splitting (DCMS). DCMS preserves metadata locality using consistent hashing and locality-preserving hashing, keeps replicated metadata for excellent reliability, and dynamically distributes metadata among the NameNodes to keep load balancing. NameNode is a centralized heart of the Hadoop. Keeping the directory tree of all files, failure of which causes the single point of failure (SPOF). DCMS removes Hadoop’s SPOF and provides an efficient and scalable metadata management. The new framework is named ‘Dr. Hadoop’ after the name of the authors.

23. Antenna-in-package system integrated with meander line antenna based on LTCC technology
Gang DONG,Wei XIONG,Zhao-yao WU,Yin-tang YANG
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 67-73.   DOI: 10.1631/FITEE.1500167
摘要   HTML PDF(pc) (2719KB)(801)   

We present an antenna-in-package system integrated with a meander line antenna based on low temperature co-fired ceramic (LTCC) technology. The proposed system employs a meander line patch antenna, a packaging layer, and a laminated multi-chip module (MCM) for integration of integrated circuit (IC) bare chips. A microstrip feed line is used to reduce the interaction between patch and package. To decrease electromagnetic coupling, a via hole structure is designed and analyzed. The meander line antenna achieved a bandwidth of 220 MHz with the center frequency at 2.4 GHz, a maximum gain of 2.2 dB, and a radiation efficiency about 90% over its operational frequency. The whole system, with a small size of 20.2 mm × 6.1 mm × 2.6 mm, can be easily realized by a standard LTCC process. This antenna-in-package system integrated with a meander line antenna was fabricated and the experimental results agreed with simulations well.

24. 一种城市主干道信号动态协调控制方法及其应用
Guo-jiang Shen, Yong-yao Yang
Front. Inform. Technol. Electron. Eng.    2016, 17 (9): 907-918.   DOI: 10.1631/FITEE.1500227
摘要  
概要:针对城市主干道的交通流特征,提出了一种新的交通信号协调控制方法。其核心控制算法包括两个模块:控制子区划分模块和信号协调控制模块。本文首先分析了相邻交叉口的路段长度、路段交通密度以及交叉口信号配时参数对相邻交叉口交通关联度的影响,然后设计了基于分层结构的相邻交叉口交通关联度的模糊计算方法和基于关联度的主干道控制子区划分方法。接着提出了一种控制子区协调控制算法,根据一段时间内交通流信息计算控制子区公共信号周期、路段上下行相位差和各路口的绿信比。实际应用表明该控制方法能有效降低主干道交通流平均旅行时间和平均停车率,效果令人满意。
25. Adaptive fuzzy integral sliding mode velocity control for the cutting system of a trench cutter
Qi-yan TIAN,Jian-hua WEI,Jin-hui FANG,Kai GUO
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 55-66.   DOI: 10.1631/FITEE.15a0160
摘要   HTML PDF(pc) (1392KB)(653)   

This paper presents a velocity controller for the cutting system of a trench cutter (TC). The cutting velocity of a cutting system is affected by the unknown load characteristics of rock and soil. In addition, geological conditions vary with time. Due to the complex load characteristics of rock and soil, the cutting load torque of a cutter is related to the geological conditions and the feeding velocity of the cutter. Moreover, a cutter’s dynamic model is subjected to uncertainties with unknown effects on its function. In this study, to deal with the particular characteristics of a cutting system, a novel adaptive fuzzy integral sliding mode control (AFISMC) is designed for controlling cutting velocity. The model combines the robust characteristics of an integral sliding mode controller with the adaptive adjusting characteristics of an adaptive fuzzy controller. The AFISMC cutting velocity controller is synthesized using the backstepping technique. The stability of the whole system including the fuzzy inference system, integral sliding mode controller, and the cutting system is proven using the Lyapunov theory. Experiments have been conducted on a TC test bench with the AFISMC under different operating conditions. The experimental results demonstrate that the proposed AFISMC cutting velocity controller gives a superior and robust velocity tracking performance.

26. Improving the efficiency of magnetic coupling energy transfer by etching fractal patterns in the shielding metals*
Qing-feng LI,Shao-bo CHEN,Wei-ming WANG,Hong-wei HAO,Lu-ming LI
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 74-82.   DOI: 10.1631/FITEE.1500114
摘要   HTML PDF(pc) (905KB)(816)   

Thin metal sheets are often located in the coupling paths of magnetic coupling energy transfer (MCET) systems. Eddy currents in the metals reduce the energy transfer efficiency and can even present safety risks. This paper describes the use of etched fractal patterns in the metals to suppress the eddy currents and improve the efficiency. Simulation and experimental results show that this approach is very effective. The fractal patterns should satisfy three features, namely, breaking the metal edge, etching in the high-intensity magnetic field region, and etching through the metal in the thickness direction. Different fractal patterns lead to different results. By altering the eddy current distribution, the fractal pattern slots reduce the eddy current losses when the metals show resistance effects and suppress the induced magnetic field in the metals when the metals show inductance effects. Fractal pattern slots in multilayer high conductivity metals (e.g., Cu) reduce the induced magnetic field intensity significantly. Furthermore, transfer power, transfer efficiency, receiving efficiency, and eddy current losses all increase with the increase of the number of etched layers. These results can benefit MCET by efficient energy transfer and safe use in metal shielded equipment.

27. Extracting hand articulations from monocular depth images using curvature scale space descriptors
Shao-fan WANG,Chun LI,De-hui KONG,Bao-cai YIN
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 41-54.   DOI: 10.1631/FITEE.1500126
摘要   HTML PDF(pc) (2840KB)(569)   

We propose a framework of hand articulation detection from a monocular depth image using curvature scale space (CSS) descriptors. We extract the hand contour from an input depth image, and obtain the fingertips and finger-valleys of the contour using the local extrema of a modified CSS map of the contour. Then we recover the undetected fingertips according to the local change of depths of points in the interior of the contour. Compared with traditional appearance-based approaches using either angle detectors or convex hull detectors, the modified CSS descriptor extracts the fingertips and finger-valleys more precisely since it is more robust to noisy or corrupted data; moreover, the local extrema of depths recover the fingertips of bending fingers well while traditional appearance-based approaches hardly work without matching models of hands. Experimental results show that our method captures the hand articulations more precisely compared with three state-of-the-art appearance-based approaches.

28. 基于社会网络整体模糊化度量的时序预测方法
Li-ming Yang, Wei Zhang, Yun-fang Chen
Front. Inform. Technol. Electron. Eng.    2015, 16 (10): 805-816.   DOI: 10.1631/FITEE.1500025
摘要  
目的:面向真实世界的时序社会网络,实现基于其复杂关系不确定性的模糊化模型的建立,同时实现网络整体模糊化度量的时序预测。
创新点:提出一种基于节点相似度的社会网络模糊化方法,并对网络模糊密度与模糊中心势进行预测,实现模糊网络的度量预测。
方法:首先,考虑真实社会网络普遍存在的不确定性因素,提出一种基于网络节点相似度的模糊化方法,通过用模糊关系代替传统关系,可以将传统的社会网络转化为模糊的社会网络(图2)。然后,针对需要观测的网络密度及中心势两个整体度量(图1),同样根据网络的模糊化方法的定义可以得到网络模糊密度及模糊中心势。最后,结合模糊马尔可夫链模型,通过调整模糊度量的隶属函数以及模糊状态划分,来预测模糊度量变化并分析网络演化趋势。
结论:针对真实的社会网络,提出一种社会网络的模糊化方法,实验说明了模糊网络可以比传统网络更好地描述网络演化过程。
29. An efficient projection defocus algorithm based on multi-scale convolution kernel templates
Bo Zhu, Li-jun Xie, Guang-hua Song, Yao Zheng
Front. Inform. Technol. Electron. Eng.    2013, 14 (12): 930-940.   DOI: 10.1631/jzus.C1300080
摘要  
The focal problems of projection include out-of-focus projection images from the projector caused by incomplete mechanical focus and screen-door effects produced by projection pixilation. To eliminate these defects and enhance the imaging quality and clarity of projectors, a novel adaptive projection defocus algorithm is proposed based on multi-scale convolution kernel templates. This algorithm applies the improved Sobel-Tenengrad focus evaluation function to calculate the sharpness degree of intensity equalization and then constructs multi-scale defocus convolution kernels to remap and render the defocus projection image. The resulting projection defocus corrected images can eliminate out-of-focus effects and improve the sharpness of uncorrected images. Experiments show that the algorithm works quickly and robustly and that it not only effectively eliminates visual artifacts and can run on a self-designed smart projection system in real time but also significantly improves the resolution and clarity of the observer’s visual perception.
30. National semantic infrastructure for traditional Chinese medicine
Hua-jun Chen
Front. Inform. Technol. Electron. Eng.    2012, 13 (4): 311-314.   DOI: 10.1631/jzus.C1101012
摘要  
We use a domain ontology to construct a Semantic Web environment to unify and link the legacy databases, which typically have heterogeneous logic structures and physical properties. Users need only to interact with the Semantic Web environment, and perform searching, querying, and navigating around an extensible set of databases without the awareness of the database boundaries. Additional deductive capabilities can then be implemented to increase the usability and re-usability of data.
In the DartGrid project, we focus on three major TCM requirements, including academic virtual organization, personalized healthcare, and drug discovery and safety. Here we present a brief overview of the major applications that we have developed to satisfy the above requirements.

编辑部公告More

友情链接