全文下载排行

一年内发表文章 | 两年内 | 三年内 | 全部 | 最近1个月下载排行 | 最近1年下载排行

当前位置: 最近1个月下载排行
Please wait a minute...
1. Multi-instance learning for software quality estimation in object-oriented systems: a case study
Peng HUANG, Jie ZHU
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 130-138.   DOI: 10.1631/jzus.C0910084
摘要   PDF(pc) (160KB)(2320)   
We investigate a problem of object-oriented (OO) software quality estimation from a multi-instance (MI) perspective. In detail, each set of classes that have an inheritance relation, named ‘class hierarchy’, is regarded as a bag, while each class in the set is regarded as an instance. The learning task in this study is to estimate the label of unseen bags, i.e., the fault-proneness of untested class hierarchies. A fault-prone class hierarchy contains at least one fault-prone (negative) class, while a non-fault-prone (positive) one has no negative class. Based on the modification records (MRs) of the previous project releases and OO software metrics, the fault-proneness of an untested class hierarchy can be predicted. Several selected MI learning algorithms were evaluated on five datasets collected from an industrial software project. Among the MI learning algorithms investigated in the experiments, the kernel method using a dedicated MI-kernel was better than the others in accurately and correctly predicting the fault-proneness of the class hierarchies. In addition, when compared to a supervised support vector machine (SVM) algorithm, the MI-kernel method still had a competitive performance with much less cost.
被引次数: WebOfScience(2)
2. Robust lossless data hiding scheme
Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 101-110.   DOI: 10.1631/jzus.C0910177
摘要   PDF(pc) (549KB)(2808)   
This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-1-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the algorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved.
被引次数: WebOfScience(1)
3. Image meshing via hierarchical optimization
Hao XIE,Ruo-feng TONG
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 32-40.   DOI: 10.1631/FITEE.1500171
摘要   HTML PDF(pc) (1027KB)(621)   

Vector graphic , as a kind of geometric representation of raster images, has many advantages, e.g., definition independence and editing facility. A popular way to convert raster images into vector graphics is {image meshing}, the aim of which is to find a mesh to represent an image as faithfully as possible. For traditional meshing algorithms, the crux of the problem resides mainly in the high non-linearity and non-smoothness of the objective, which makes it difficult to find a desirable optimal solution. To ameliorate this situation, we present a hierarchical optimization algorithm solving the problem from coarser levels to finer ones, providing initialization for each level with its coarser ascent. To further simplify the problem, the original non-convex problem is converted to a linear least squares one, and thus becomes convex, which makes the problem much easier to solve. A dictionary learning framework is used to combine geometry and topology elegantly. Then an alternating scheme is employed to solve both parts. Experiments show that our algorithm runs fast and achieves better results than existing ones for most images.

4. Improving the efficiency of magnetic coupling energy transfer by etching fractal patterns in the shielding metals*
Qing-feng LI,Shao-bo CHEN,Wei-ming WANG,Hong-wei HAO,Lu-ming LI
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 74-82.   DOI: 10.1631/FITEE.1500114
摘要   HTML PDF(pc) (905KB)(814)   

Thin metal sheets are often located in the coupling paths of magnetic coupling energy transfer (MCET) systems. Eddy currents in the metals reduce the energy transfer efficiency and can even present safety risks. This paper describes the use of etched fractal patterns in the metals to suppress the eddy currents and improve the efficiency. Simulation and experimental results show that this approach is very effective. The fractal patterns should satisfy three features, namely, breaking the metal edge, etching in the high-intensity magnetic field region, and etching through the metal in the thickness direction. Different fractal patterns lead to different results. By altering the eddy current distribution, the fractal pattern slots reduce the eddy current losses when the metals show resistance effects and suppress the induced magnetic field in the metals when the metals show inductance effects. Fractal pattern slots in multilayer high conductivity metals (e.g., Cu) reduce the induced magnetic field intensity significantly. Furthermore, transfer power, transfer efficiency, receiving efficiency, and eddy current losses all increase with the increase of the number of etched layers. These results can benefit MCET by efficient energy transfer and safe use in metal shielded equipment.

5. An efficient hardware design for HDTV H.264/AVC encoder
Liang Wei, Dan-dan Ding, Juan Du, Bin-bin Yu, Lu Yu
Front. Inform. Technol. Electron. Eng.    2011, 12 (6): 499-506.   DOI: 10.1631/jzus.C1000201
摘要   PDF(pc) (187KB)(2538)   
This paper presents a hardware efficient high definition television (HDTV) encoder for H.264/AVC. We use a two-level mode decision (MD) mechanism to reduce the complexity and maintain the performance, and design a sharable architecture for normal mode fractional motion estimation (NFME), special mode fractional motion estimation (SFME), and luma motion compensation (LMC), to decrease the hardware cost. Based on these technologies, we adopt a four-stage macro-block pipeline scheme using an efficient memory management strategy for the system, which greatly reduces on-chip memory and bandwidth requirements. The proposed encoder uses about 1126k gates with an average Bjontegaard-Delta peak signal-to-noise ratio (BD-PSNR) decrease of 0.5 dB, compared with JM15.0. It can fully satisfy the real-time video encoding for 1080p@30 frames/s of H.264/AVC high profile.
被引次数: WebOfScience(2)
6. Review of the current and future technologies for video compression
Lu YU, Jian-peng WANG
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 1-13.   DOI: 10.1631/jzus.C0910684
摘要   PDF(pc) (339KB)(2935)   
Many important developments in video compression technologies have occurred during the past two decades. The block-based discrete cosine transform with motion compensation hybrid coding scheme has been widely employed by most available video coding standards, notably the ITU-T H.26xand ISO/IEC MPEG-xfamilies and video part of China audio video coding standard (AVS). The objective of this paper is to provide a review of the developments of the four basic building blocks of hybrid coding scheme, namely predictive coding, transform coding, quantization and entropy coding, and give theoretical analyses and summaries of the technological advancements. We further analyze the development trends and perspectives of video compression, highlighting problems and research directions.
被引次数: WebOfScience(3)
7. Efficient dynamic pruning on largest scores first (LSF) retrieval
Kun JIANG, Yue-xiang YANG
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 1-14.   DOI: 10.1631/FITEE.1500190
摘要   HTML PDF(pc) (451KB)(673)   

Inverted index traversal techniques have been studied in addressing the query processing performance challenges of web search engines, but still leave much room for improvement. In this paper, we focus on the inverted index traversal on document-sorted indexes and the optimization technique called dynamic pruning, which can efficiently reduce the hardware computational resources required. We propose another novel exhaustive index traversal scheme called largest scores first (LSF) retrieval, in which the candidates are first selected in the posting list of important query terms with the largest upper bound scores and then fully scored with the contribution of the remaining query terms. The scheme can effectively reduce the memory consumption of existing term-at-a-time (TAAT) and the candidate selection cost of existing document-at-a-time (DAAT) retrieval at the expense of revisiting the posting lists of the remaining query terms. Preliminary analysis and implementation show comparable performance between LSF and the two well-known baselines. To further reduce the number of postings that need to be revisited, we present efficient rank safe dynamic pruning techniques based on LSF, including two important optimizations called list omitting (LSF_LO) and partial scoring (LSF_PS) that make full use of query term importance. Finally, experimental results with the TREC GOV2 collection show that our new index traversal approaches reduce the query latency by almost 27% over the WAND baseline and produce slightly better results compared with the MaxScore baseline, while returning the same results as exhaustive evaluation.

8. Blind carrier frequency offset estimation for constant modulus signaling based OFDM systems: algorithm, identifiability, and performance analysis
Wei-yang XU, Bo LU, Xing-bo HU, Zhi-liang HONG
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 14-26.   DOI: 10.1631/jzus.C0910150
摘要   PDF(pc) (445KB)(2419)   
Carrier frequency offset (CFO) estimation is critical for orthogonal frequency-division multiplexing (OFDM) based transmissions. In this paper, we present a low-complexity, blind CFO estimator for OFDM systems with constant modulus (CM) signaling. Both single-input single-output (SISO) and multiple-input multiple-output (MIMO) systems are considered. Based on the assumption that the channel keeps constant during estimation, we prove that the CFO can be estimated uniquely and exactly through minimizing the power difference of received data on the same subcarriers between two consecutive OFDM symbols; thus, the identifiability problem is assured. Inspired by the sinusoid-like cost function, curve fitting is utilized to simplify our algorithm. Performance analysis reveals that the proposed estimator is asymptotically unbiased and the mean square error (MSE) exhibits no error floor. We show that this blind scheme can also be applied to a MIMO system. Numerical simulations show that the proposed estimator provides excellent performance compared with existing blind methods.
被引次数: WebOfScience(2)
9. Modeling of hydraulic turbine systems based on a Bayesian-Gaussian neural network driven by sliding window data
Yi-jian LIU, Yan-jun FANG, Xue-mei ZHU
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 56-62.   DOI: 10.1631/jzus.C0910176
摘要   PDF(pc) (337KB)(2113)   
In this paper, a novel Bayesian-Gaussian neural network (BGNN) is proposed and applied to on-line modeling of a hydraulic turbine system (HTS). The new BGNN takes account of the complex nonlinear characteristics of HTS. Two redefined training procedures of the BGNN include the off-line training of the threshold matrix parameters, optimized by swarm optimization algorithms, and the on-line BGNN predictive application driven by the sliding window data method. The characteristics models of an HTS are identified using the new BGNN method and simulation results are presented which show the effectiveness of the BGNN in addressing modeling problems of HTS.
被引次数: WebOfScience(2)
10. Congestion avoidance, detection and alleviation in wireless sensor networks
Wei-wei FANG, Ji-ming CHEN, Lei SHU, Tian-shu CHU, De-pei QIAN
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 63-73.   DOI: 10.1631/jzus.C0910204
摘要   PDF(pc) (638KB)(4352)   
Congestion in wireless sensor networks (WSNs) not only causes severe information loss but also leads to excessive energy consumption. To address this problem, a novel scheme for congestion avoidance, detection and alleviation (CADA) in WSNs is proposed in this paper. By exploiting data characteristics, a small number of representative nodes are chosen from those in the event area as data sources, so that the source traffic can be suppressed proactively to avoid potential congestion. Once congestion occurs inevitably due to traffic mergence, it will be detected in a timely way by the hotspot node based on a combination of buffer occupancy and channel utilization. Congestion is then alleviated reactively by either dynamic traffic multiplexing or source rate regulation in accordance with the specific hotspot scenarios. Extensive simulation results under typical congestion scenarios are presented to illuminate the distinguished performance of the proposed scheme.
被引次数: WebOfScience(13)
11. A new protocol of wide use for e-mail with perfect forward secrecy
Tzung-her CHEN, Yan-ting WU
Front. Inform. Technol. Electron. Eng.    2010, 11 (1): 74-78.   DOI: 10.1631/jzus.A0910126
摘要   PDF(pc) (219KB)(1935)   
Recently, Sun et al. (2005) highlighted the essential property of perfect forward secrecy (PFS) for e-mail protocols when a higher security level is desirable. Furthermore, Sun et al. (2005)’s protocols take only a single e-mail server into account. Actually, it is much more common that the sender and the recipient register at different e-mail servers. Compared to existing protocols, the protocol proposed in this paper takes into account the scenario that the sender and the recipient register at different servers. The proposed protocol is skillfully designed to achieve PFS and end-to-end security as well as to satisfy the requirements of confidentiality, origin, integrity and easy key management. The comparison in terms of functionality and computational efficiency demonstrates the superiority of the present scheme.
被引次数: WebOfScience(1)
12. A fine-grained access control model for relational databases
Jie Shi, Hong Zhu
Front. Inform. Technol. Electron. Eng.    2010, 11 (8): 575-586.   DOI: 10.1631/jzus.C0910466
摘要  
Fine-grained access control (FGAC) must be supported by relational databases to satisfy the requirements of privacy preserving and Internet-based applications. Though much work on FGAC models has been conducted, there are still a number of ongoing problems. We propose a new FGAC model which supports the specification of open access control policies as well as closed access control policies in relational databases. The negative authorization is supported, which allows the security administrator to specify what data should not be accessed by certain users. Moreover, multiple policies defined to regulate user access together are also supported. The definition and combination algorithm of multiple policies are thus provided. Finally, we implement the proposed FGAC model as a component of the database management system (DBMS) and evaluate its performance. The performance results show that the proposed model is feasible.
被引次数: WebOfScience(2)
13. Adaptive fuzzy integral sliding mode velocity control for the cutting system of a trench cutter
Qi-yan TIAN,Jian-hua WEI,Jin-hui FANG,Kai GUO
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 55-66.   DOI: 10.1631/FITEE.15a0160
摘要   HTML PDF(pc) (1392KB)(651)   

This paper presents a velocity controller for the cutting system of a trench cutter (TC). The cutting velocity of a cutting system is affected by the unknown load characteristics of rock and soil. In addition, geological conditions vary with time. Due to the complex load characteristics of rock and soil, the cutting load torque of a cutter is related to the geological conditions and the feeding velocity of the cutter. Moreover, a cutter’s dynamic model is subjected to uncertainties with unknown effects on its function. In this study, to deal with the particular characteristics of a cutting system, a novel adaptive fuzzy integral sliding mode control (AFISMC) is designed for controlling cutting velocity. The model combines the robust characteristics of an integral sliding mode controller with the adaptive adjusting characteristics of an adaptive fuzzy controller. The AFISMC cutting velocity controller is synthesized using the backstepping technique. The stability of the whole system including the fuzzy inference system, integral sliding mode controller, and the cutting system is proven using the Lyapunov theory. Experiments have been conducted on a TC test bench with the AFISMC under different operating conditions. The experimental results demonstrate that the proposed AFISMC cutting velocity controller gives a superior and robust velocity tracking performance.

14. Design of a novel low power 8-transistor 1-bit full adder cell
Yi Wei, Ji-zhong Shen
Front. Inform. Technol. Electron. Eng.    2011, 12 (7): 604-607.   DOI: 10.1631/jzus.C1000372
摘要   PDF(pc) (124KB)(5326)   
An addition is a fundamental arithmetic operation which is used extensively in many very large-scale integration (VLSI) systems such as application-specific digital signal processing (DSP) and microprocessors. An adder determines the overall performance of the circuits in most of those systems. In this paper we propose a novel 1-bit full adder cell which uses only eight transistors. In this design, three multiplexers and one inverter are applied to minimize the transistor count and reduce power consumption. The power dissipation, propagation delay, and power-delay produced using the new design are analyzed and compared with those of other designs using HSPICE simulations. The results show that the proposed adder has both lower power consumption and a lower power-delay product (PDP) value. The low power and low transistor count make the novel 8T full adder cell a candidate for power-efficient applications.
被引次数: WebOfScience(2)
15. Dr. Hadoop: an infinite scalable metadata management for Hadoop—How the baby elephant becomes immortal
Dipayan DEV,Ripon PATGIRI
Front. Inform. Technol. Electron. Eng.    2016, 17 (1): 15-31.   DOI: 10.1631/FITEE.1500015
摘要   HTML PDF(pc) (1278KB)(1228)   

In this Exa byte scale era, data increases at an exponential rate. This is in turn generating a massive amount of metadata in the file system. Hadoop is the most widely used framework to deal with big data. Due to this growth of huge amount of metadata, however, the efficiency of Hadoop is questioned numerous times by many researchers. Therefore, it is essential to create an efficient and scalable metadata management for Hadoop. Hash-based mapping and subtree partitioning are suitable in distributed metadata management schemes. Subtree partitioning does not uniformly distribute workload among the metadata servers, and metadata needs to be migrated to keep the load roughly balanced. Hash-based mapping suffers from a constraint on the locality of metadata, though it uniformly distributes the load among NameNodes, which are the metadata servers of Hadoop. In this paper, we present a circular metadata management mechanism named dynamic circular metadata splitting (DCMS). DCMS preserves metadata locality using consistent hashing and locality-preserving hashing, keeps replicated metadata for excellent reliability, and dynamically distributes metadata among the NameNodes to keep load balancing. NameNode is a centralized heart of the Hadoop. Keeping the directory tree of all files, failure of which causes the single point of failure (SPOF). DCMS removes Hadoop’s SPOF and provides an efficient and scalable metadata management. The new framework is named ‘Dr. Hadoop’ after the name of the authors.

16. Non-uniform B-spline curves with multiple shape parameters
Juan Cao, Guo-zhao Wang
Front. Inform. Technol. Electron. Eng.    2011, 12 (10): 800-808.   DOI: 10.1631/jzus.C1000381
摘要   PDF(pc) (554KB)(1936)   
We introduce a kind of shape-adjustable spline curves defined over a non-uniform knot sequence. These curves not only have the many valued properties of the usual non-uniform B-spline curves, but also are shape adjustable under fixed control polygons. Our method is based on the degree elevation of B-spline curves, where maximum degrees of freedom are added to a curve parameterized in terms of a non-uniform B-spline. We also discuss the geometric effect of the adjustment of shape parameters and propose practical shape modification algorithms, which are indispensable from the user’s perspective.
被引次数: WebOfScience(1)
17. Clustering-based hyperspectral band selection using sparse nonnegative matrix factorization
Ji-ming Li, Yun-tao Qian
Front. Inform. Technol. Electron. Eng.    2011, 12 (7): 542-549.   DOI: 10.1631/jzus.C1000304
摘要   PDF(pc) (401KB)(2217)   
Hyperspectral imagery generally contains a very large amount of data due to hundreds of spectral bands. Band selection is often applied firstly to reduce computational cost and facilitate subsequent tasks such as land-cover classification and higher level image analysis. In this paper, we propose a new band selection algorithm using sparse nonnegative matrix factorization (sparse NMF). Though acting as a clustering method for band selection, sparse NMF need not consider the distance metric between different spectral bands, which is often the key step for most common clustering-based band selection methods. By imposing sparsity on the coefficient matrix, the bands’ clustering assignments can be easily indicated through the largest entry in each column of the matrix. Experimental results showed that sparse NMF provides considerable insight into the clustering-based band selection problem and the selected bands are good for land-cover classification.
被引次数: WebOfScience(3)
18. Extracting classification rules based on a cumulative probability distribution approach
Jr-shian Chen
Front. Inform. Technol. Electron. Eng.    2011, 12 (5): 379-386.   DOI: 10.1631/jzus.C1000205
摘要   PDF(pc) (205KB)(972)   
This paper deals with a reinforced cumulative probability distribution approach (CPDA) based method for extracting classification rules. The method includes two phases: (1) automatic generation of the membership function, and (2) use of the corresponding linguistic data to extract classification rules. The proposed method can determine suitable interval boundaries for any given dataset based on its own characteristics, and generate the fuzzy membership functions automatically. Experimental results show that the proposed method surpasses traditional methods in accuracy.
被引次数: WebOfScience(1)
19. A tracking and predicting scheme for ping pong robot
Yuan-hui Zhang, Wei Wei, Dan Yu, Cong-wei Zhong
Front. Inform. Technol. Electron. Eng.    2011, 12 (2): 110-115.   DOI: 10.1631/jzus.C0910528
摘要   PDF(pc) (238KB)(1707)   
We describe a new tracking and predicting scheme applied to a lab-made ping pong robot. The robot has a monocular vision system comprised of a camera and a light. We propose an optimized strategy to calibrate the light center using the least square method. An ellipse fitting method is used to precisely locate the center of ball and shadow on the captured image. After the triangulation of the ball position in the world coordinates, a tracking algorithm based on a Kalman filter outputs an accurate estimation of the flight states including the ball position and velocity. Furthermore, a neural network model is constructed and trained to predict the following flight path. Experimental results show that this scheme can achieve a good predicting precision and success rate of striking an incoming ball. The robot can achieve a success rate of about 80% to return a flight ball of 5 m/s to the opposite court.
被引次数: WebOfScience(8)
20. A pipelined architecture for normal I/O order FFT
Xue Liu, Feng Yu, Ze-ke Wang
Front. Inform. Technol. Electron. Eng.    2011, 12 (1): 76-82.   DOI: 10.1631/jzus.C1000234
摘要   PDF(pc) (165KB)(1880)   
We present a novel pipelined fast Fourier transform (FFT) architecture which is capable of producing the output sequence in normal order. A single-path delay commutator processing element (SDC PE) has been proposed for the first time. It saves a complex adder compared with the typical radix-2 butterfly unit. The new pipelined architecture can be built using the proposed processing element. The proposed architecture can lead to 100% hardware utilization and 50% reduction in the overall number of adders required in the conventional pipelined FFT designs. In order to produce the output sequence in normal order, we also present a bit reverser, which can achieve a 50% reduction in memory usage.
被引次数: WebOfScience(9)
21. New separation algorithm for touching grain kernels based on contour segments and ellipse fitting
Lei Yan, Cheol-Woo Park, Sang-Ryong Lee, Choon-Young Lee
Front. Inform. Technol. Electron. Eng.    2011, 12 (1): 54-61.   DOI: 10.1631/jzus.C0910797
摘要   PDF(pc) (283KB)(1479)   
A new separation algorithm based on contour segments and ellipse fitting is proposed to separate the ellipse-like touching grain kernels in digital images. The image is filtered and converted into a binary image first. Then the contour of touching grain kernels is extracted and divided into contour segments (CS) with the concave points on it. The next step is to merge the contour segments, which is the main contribution of this work. The distance measurement (DM) and deviation error measurement (DEM) are proposed to test whether the contour segments pertain to the same kernel or not. If they pass the measurement and judgment, they are merged as a new segment. Finally with these newly merged contour segments, the ellipses are fitted as the representative ellipses for touching kernels. To verify the proposed algorithm, six different kinds of Korean grains were tested. Experimental results showed that the proposed method is efficient and accurate for the separation of the touching grain kernels.
被引次数: WebOfScience(4)
22. Robust time reversal processing for active detection of a small bottom target in a shallow water waveguide
Xiang Pan, Jian-long Li, Wen Xu, Xian-yi Gong
Front. Inform. Technol. Electron. Eng.    2010, 11 (5): 401-406.   DOI: 10.1631/jzus.C0910212
摘要   PDF(pc) (219KB)(1182)   
With the spatial-temporal focusing of acoustic energy, time reversal processing (TRP) shows the potential application for active target detection in shallow water. To turn the ‘potential’ into a reality, the TRP based on a model source (MS) instead of a physical probe source (PS) is investigated. For uncertain ocean environments, the robustness of TRP is discussed for the narrowband and broadband signal respectively. The channel transfer function matrix is first constructed in the acoustic perturbation space. Then a steering vector for time reversal transmission is obtained by singular value decomposition (SVD) of the matrix. For verification of the robust TRP, the tank experiments of time reversal transmission focusing and its application for active target detection are undertaken. The experimental results have shown that the robust TRP can effectively detect and locate a small bottom target.
被引次数: WebOfScience(3)
23. Real-time motion deblurring algorithm with robust noise suppression
Hua-jun Feng, Yong-pan Wang, Zhi-hai Xu, Qi Li, Hua Lei, Ju-feng Zhao
Front. Inform. Technol. Electron. Eng.    2010, 11 (5): 375-380.   DOI: 10.1631/jzus.C0910201
摘要   PDF(pc) (467KB)(1424)   
In an image restoration process, to obtain good results is challenging because of the unavoidable existence of noise even if the blurring information is already known. To suppress the deterioration caused by noise during the image deblurring process, we propose a new deblurring method with a known kernel. First, the noise in the measurement process is assumed to meet the Gaussian distribution to fit the natural noise distribution. Second, the first and second orders of derivatives are supposed to satisfy the independent Gaussian distribution to control the non-uniform noise. Experimental results show that our method is obviously superior to the Wiener filter, regularized filter, and Richardson-Lucy (RL) algorithm. Moreover, owing to processing in the frequency domain, it runs faster than the other algorithms, in particular about six times faster than the RL algorithm.
被引次数: WebOfScience(2)
24. A relative feasibility degree based approach for constrained optimization problems
Cheng-gang Cui, Yan-jun Li, Tie-jun Wu
Front. Inform. Technol. Electron. Eng.    2010, 11 (4): 249-260.   DOI: 10.1631/jzus.C0910072
摘要   PDF(pc) (305KB)(1258)   
Based on the ratio of the size of the feasible region of constraints to the size of the feasible region of a constrained optimization problem, we propose a new constraint handling approach to improve the efficiency of heuristic search methods in solving the constrained optimization problems. In the traditional classification of a solution candidate, it is either a feasible or an infeasible solution. To refine this classification, a new concept about the relative feasibility degree of a solution candidate is proposed to represent the amount by which the ‘feasibility’ of the solution candidate exceeds that of another candidate. Relative feasibility degree based selection rules are also proposed to enable evolutionary computation techniques to accelerate the search process of reaching a feasible region. In addition, a relative feasibility degree based differential evolution algorithm is derived to solve constraint optimization problems. The proposed approach is tested with nine benchmark problems. Results indicate that our approach is very competitive compared with four existing state-of-the-art techniques, though still sensitive to the intervals of control parameters of the differential evolution.
被引次数: WebOfScience(1)
25. Measured boundary parameterization based on Poisson’s equation
Jun-jie CAO, Zhi-xun SU, Xiu-ping LIU, Hai-chuan BI
Front. Inform. Technol. Electron. Eng.    2010, 11 (3): 187-198.   DOI: 10.1631/jzus.C0910460
摘要   PDF(pc) (628KB)(1499)   
One major goal of mesh parameterization is to minimize the conformal distortion. Measured boundary parameterizations focus on lowering the distortion by setting the boundary free with the help of distance from a center vertex to all the boundary vertices. Hence these parameterizations strongly depend on the determination of the center vertex. In this paper, we introduce two methods to determine the center vertex automatically. Both of them can be used as necessary supplements to the existing measured boundary methods to minimize the common artifacts as a result of the obscure choice of the center vertex. In addition, we propose a simple and fast measured boundary parameterization method based on the Poisson’s equation. Our new approach generates less conformal distortion than the fixed boundary methods. It also generates more regular domain boundaries than other measured boundary methods. Moreover, it offers a good tradeoff between computation costs and conformal distortion compared with the fast and robust angle based flattening (ABF++).
26. Computer vision based eyewear selector
Oscar DÉNIZ, Modesto CASTRILLÓN, Javier LORENZO, Luis ANTÓN, Mario HERNANDEZ, Gloria BUENO
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 79-91.   DOI: 10.1631/jzus.C0910377
摘要   PDF(pc) (1850KB)(3485)   
The widespread availability of portable computing power and inexpensive digital cameras are opening up new possibilities for retailers in some markets. One example is in optical shops, where a number of systems exist that facilitate eyeglasses selection. These systems are now more necessary as the market is saturated with an increasingly complex array of lenses, frames, coatings, tints, photochromic and polarizing treatments, etc. Research challenges encompass Computer Vision, Multimedia and Human-Computer Interaction. Cost factors are also of importance for widespread product acceptance. This paper describes a low-cost system that allows the user to visualize different glasses models in live video. The user can also move the glasses to adjust its position on the face. The system, which runs at 9.5 frames/s on general-purpose hardware, has a homeostatic module that keeps image parameters controlled. This is achieved by using a camera with motorized zoom, iris, white balance, etc. This feature can be specially useful in environments with changing illumination and shadows, like in an optical shop. The system also includes a face and eye detection module and a glasses management module.
被引次数: WebOfScience(3)
27. Image compression based on spatial redundancy removal and image inpainting
Vahid BASTANI, Mohammad Sadegh HELFROUSH, Keyvan KASIRI
Front. Inform. Technol. Electron. Eng.    2010, 11 (2): 92-100.   DOI: 10.1631/jzus.C0910182
摘要   PDF(pc) (606KB)(4308)   
We present an algorithm for image compression based on an image inpainting method. First the image regions that can be accurately recovered are located. Then, to reduce the data, information of such regions is removed. The remaining data besides essential details for recovering the removed regions are encoded to produce output data. At the decoder, an inpainting method is applied to retrieve removed regions using information extracted at the encoder. The image inpainting technique utilizes partial differential equations (PDEs) for recovering information. It is designed to achieve high performance in terms of image compression criteria. This algorithm was examined for various images. A high compression ratio of 1:40 was achieved at an acceptable quality. Experimental results showed attainable visible quality improvement at a high compression ratio compared with JPEG.
被引次数: WebOfScience(3)

编辑部公告More

友情链接