Please wait a minute...

当期目录

2010年, 第1期 刊出日期:2010-01-01    下一期
Review of the current and future technologies for video compression
Lu YU, Jian-peng WANG
Front. Inform. Technol. Electron. Eng., 2010, 11(1): 1-13.   https://doi.org/10.1631/jzus.C0910684
摘要( 3581 )     PDF(0KB)( 2809 )
Many important developments in video compression technologies have occurred during the past two decades. The block-based discrete cosine transform with motion compensation hybrid coding scheme has been widely employed by most available video coding standards, notably the ITU-T H.26xand ISO/IEC MPEG-xfamilies and video part of China audio video coding standard (AVS). The objective of this paper is to provide a review of the developments of the four basic building blocks of hybrid coding scheme, namely predictive coding, transform coding, quantization and entropy coding, and give theoretical analyses and summaries of the technological advancements. We further analyze the development trends and perspectives of video compression, highlighting problems and research directions.
Blind carrier frequency offset estimation for constant modulus signaling based OFDM systems: algorithm, identifiability, and performance analysis
Wei-yang XU, Bo LU, Xing-bo HU, Zhi-liang HONG
Front. Inform. Technol. Electron. Eng., 2010, 11(1): 14-26.   https://doi.org/10.1631/jzus.C0910150
摘要( 3435 )     PDF(0KB)( 2339 )
Carrier frequency offset (CFO) estimation is critical for orthogonal frequency-division multiplexing (OFDM) based transmissions. In this paper, we present a low-complexity, blind CFO estimator for OFDM systems with constant modulus (CM) signaling. Both single-input single-output (SISO) and multiple-input multiple-output (MIMO) systems are considered. Based on the assumption that the channel keeps constant during estimation, we prove that the CFO can be estimated uniquely and exactly through minimizing the power difference of received data on the same subcarriers between two consecutive OFDM symbols; thus, the identifiability problem is assured. Inspired by the sinusoid-like cost function, curve fitting is utilized to simplify our algorithm. Performance analysis reveals that the proposed estimator is asymptotically unbiased and the mean square error (MSE) exhibits no error floor. We show that this blind scheme can also be applied to a MIMO system. Numerical simulations show that the proposed estimator provides excellent performance compared with existing blind methods.
Image driven shape deformation using styles
Guang-hua TAN, Wei CHEN, Li-gang LIU
Front. Inform. Technol. Electron. Eng., 2010, 11(1): 27-35.   https://doi.org/10.1631/jzus.C0910089
摘要( 3609 )     PDF(0KB)( 1715 )
In this paper, we propose an image driven shape deformation approach for stylizing a 3D mesh using styles learned from existing 2D illustrations. Our approach models a 2D illustration as a planar mesh and represents the shape styles with four components: the object contour, the context curves, user-specified features and local shape details. After the correspondence between the input model and the 2D illustration is established, shape stylization is formulated as a style-constrained differential mesh editing problem. A distinguishing feature of our approach is that it allows users to directly transfer styles from hand-drawn 2D illustrations with individual perception and cognition, which are difficult to identify and create with 3D modeling and editing approaches. We present a sequence of challenging examples including unrealistic and exaggerated paintings to illustrate the effectiveness of our approach.
Improved switching based filter for protecting thin lines of color images
Chang-cheng WU, Chun-yu ZHAO, Da-yue CHEN
Front. Inform. Technol. Electron. Eng., 2010, 11(1): 36-44.   https://doi.org/10.1631/jzus.C0910145
摘要( 2984 )     PDF(0KB)( 1977 )
The classical vector median filter (VMF) has been widely used to remove impulse noise from color images. However, since the VMF cannot identify thin lines during the denoising process, many thin lines may be removed out as noise. This serious problem can be solved by a newly proposed filter that uses a noise detector to find these thin lines and then keep them unchanged. In this new approach, the noise detection scheme applied on a current processed pixel is realized through counting the close pixels in its eight neighbor positions and the expanded window to see whether the current pixel is corrupted by impulse noise. Based on the previous outputs, our algorithm can increase the performance in detecting and canceling the impulse noise. Extensive experiments indicate that this approach can be used to remove the impulse noise from a color image without distorting the useful information.
Automatic actor-based program partitioning
Omid BUSHEHRIAN
Front. Inform. Technol. Electron. Eng., 2010, 11(1): 45-55.   https://doi.org/10.1631/jzus.C0910096
摘要( 3067 )     PDF(0KB)( 2018 )
Software reverse engineering techniques are applied most often to reconstruct the architecture of a program with respect to quality constraints, or non-functional requirements such as maintainability or reusability. In this paper, AOPR, a novel actor-oriented program reverse engineering approach, is proposed to reconstruct an object-oriented program architecture based on a high performance model such as an actor model. Reconstructing the program architecture based on this model results in the concurrent execution of the program invocations and consequently increases the overall performance of the program provided enough processors are available. The proposed reverse engineering approach applies a hill climbing clustering algorithm to find actors.
Modeling of hydraulic turbine systems based on a Bayesian-Gaussian neural network driven by sliding window data
Yi-jian LIU, Yan-jun FANG, Xue-mei ZHU
Front. Inform. Technol. Electron. Eng., 2010, 11(1): 56-62.   https://doi.org/10.1631/jzus.C0910176
摘要( 3349 )     PDF(0KB)( 2024 )
In this paper, a novel Bayesian-Gaussian neural network (BGNN) is proposed and applied to on-line modeling of a hydraulic turbine system (HTS). The new BGNN takes account of the complex nonlinear characteristics of HTS. Two redefined training procedures of the BGNN include the off-line training of the threshold matrix parameters, optimized by swarm optimization algorithms, and the on-line BGNN predictive application driven by the sliding window data method. The characteristics models of an HTS are identified using the new BGNN method and simulation results are presented which show the effectiveness of the BGNN in addressing modeling problems of HTS.
Congestion avoidance, detection and alleviation in wireless sensor networks
Wei-wei FANG, Ji-ming CHEN, Lei SHU, Tian-shu CHU, De-pei QIAN
Front. Inform. Technol. Electron. Eng., 2010, 11(1): 63-73.   https://doi.org/10.1631/jzus.C0910204
摘要( 6236 )     PDF(0KB)( 4296 )
Congestion in wireless sensor networks (WSNs) not only causes severe information loss but also leads to excessive energy consumption. To address this problem, a novel scheme for congestion avoidance, detection and alleviation (CADA) in WSNs is proposed in this paper. By exploiting data characteristics, a small number of representative nodes are chosen from those in the event area as data sources, so that the source traffic can be suppressed proactively to avoid potential congestion. Once congestion occurs inevitably due to traffic mergence, it will be detected in a timely way by the hotspot node based on a combination of buffer occupancy and channel utilization. Congestion is then alleviated reactively by either dynamic traffic multiplexing or source rate regulation in accordance with the specific hotspot scenarios. Extensive simulation results under typical congestion scenarios are presented to illuminate the distinguished performance of the proposed scheme.
A new protocol of wide use for e-mail with perfect forward secrecy
Tzung-her CHEN, Yan-ting WU
Front. Inform. Technol. Electron. Eng., 2010, 11(1): 74-78.   https://doi.org/10.1631/jzus.A0910126
摘要( 2857 )     PDF(0KB)( 1879 )
Recently, Sun et al. (2005) highlighted the essential property of perfect forward secrecy (PFS) for e-mail protocols when a higher security level is desirable. Furthermore, Sun et al. (2005)’s protocols take only a single e-mail server into account. Actually, it is much more common that the sender and the recipient register at different e-mail servers. Compared to existing protocols, the protocol proposed in this paper takes into account the scenario that the sender and the recipient register at different servers. The proposed protocol is skillfully designed to achieve PFS and end-to-end security as well as to satisfy the requirements of confidentiality, origin, integrity and easy key management. The comparison in terms of functionality and computational efficiency demonstrates the superiority of the present scheme.
8 articles

编辑部公告More

友情链接