Skip to main content
Top

2012 | Book

Advances in Computer, Communication, Control and Automation

insite
SEARCH

About this book

The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume topics covered include signal and Image processing, speech and audio Processing, video processing and analysis, artificial intelligence, computing and intelligent systems, machine learning, sensor and neural networks, knowledge discovery and data mining, fuzzy mathematics and Applications, knowledge-based systems, hybrid systems modeling and design, risk analysis and management, system modeling and simulation. We hope that researchers, graduate students and other interested readers benefit scientifically from the proceedings and also find it stimulating in the process.

Table of Contents

Frontmatter
Experimental Study on the Noise Identification of the Turbocharger

Based on the theories and methods of acoustic array measurement, the surface radiation noise of turbocharger was tested in the bench experiment. With the analysis of the experiment data, sound holography contour map was used to plot the noise distribution of the turbocharger. It is found that the major noise source closes to the compressor, and the maximum noise near the compressor brand. The major noise frequencies are related to the aerodynamic noise and rotating rotor vibration. These results basically coincide with the sound intensity experimental results and these results will also give help to further study of the NVH characteristic of the turbocharger.

Huibin Li, Mengxi Ning, Lei Hou, Tianqi Zhou
Design of Multithreading Rainfall Detection System

In this research paper, we will discuss some of functions of designing principles, constitution and crucial technology of the multithreading rainfall detection system. It requires multiple rain sensor synchronization to test on the same test platform in order to improve work efficiency. The article is focued on the working mechanism how to achieve by creating multithreading in the same process.

Huiguo Lu, Ming Cui, Juan-ping Jiang
Towards a DOM-Based Requirements Models Analysis for Automotive Software

Modeling software requirements is one of the grand challenges of Electronic Control Unit (ECU) development for vehicular applications. One of the main problems in this domain is: How to organize the large amount of complicated software requirements with a concise and manageable means. EAST-ADL2, as an architecture description language, dedicated to automotive electronic systems, is well-suitable for describing system structures. However, correctly modeling automotive software requirements using EAST-ADL2 is difficult. In this paper, we build a syntax analyzer for EAST-ADL2 domain models on top of an XML DOM tree. The tool takes the following advantages that: (1) it can effectively eliminate errors related with an EAST-ADL2 domain model; (2) it can be easily integrated in the EAST-ADL2 modeling environment; (3) it can interoperate with other tools developed using this approach.

Zhixue Wang, Xuqin Yan, Xiaojian Liu
Improved Carrier Frequency Estimation Based on Autocorrelation

Two improved carrier frequency estimating methods were proposed. The original method estimates carrier frequency directly using the phase of the autocorrelation of the signal, while the improved methods construct cost functions based on the autocorrelation, and estimate the carrier frequency through frequency searching, so that the frequency limitation in the original method is avoided. Otherwise, simulation results show that the estimating precision is also significantly improved because of not using phase directly.

Jiafeng Wang, Xiandong Yin, Husheng Lan
SNR and Carrier Phase Estimation of BPSK Signal

A method estimating signal-to-noise ratio (SNR) and carrier phase of the binary phase shift keying (BPSK) signal was proposed. First, the complex passband signal was converted to the complex baseband signal. Then baseband signal vectors were rotated step by step from 0 to 2

π

, and the maximum and minimal values of the power on the real axis were found so that the SNR value could be estimated. The rotated phase according to the maximum value was the estimation of the carrier phase. Simulation results show that the method can get satisfied estimation precision by using small number of symbols.

Jiafeng Wang, Xiandong Yin, Lixin Zheng
An Optimization Approach for SIMD Alignment in Mathematical Functions

To provide the best performance for SIMD memory accesses in mathematical functions, the memory access should be correctly aligned. Unaligned memory accesses have a large performance penalty or are even disallowed. In this paper, we focused on how to improve the performance of mathematical functions by using SIMD extensions. We present an optimization approach for SIMD alignment in the implementation of mathematical functions by using SIMD extensions, and adopt a systematic approach to handle both absolute-address and relative-address memory access schemes. Our result shows the approach achieves a 22.3% improvement compare with unaligned memory access scheme of mathematical functions. In addition, our analysis enables further code optimizing and transformations which adjust unaligned memory access to fit the alignment requirements.

Lei Wang, Chun-yan Zhang, Yong-Zhong Huang
Software Design of DSP F2812 Control System in Paste Extrusion Experimental Device

A control system based on TMS320F2812 DSP chip was developed in paste extrusion experimental device to investigate the intermittent paste extrusion process. The software of control system was designed to control the actions of step motor in this device. The upper computer (PC) software with interactive interface can input the parameters and collect the extrusion force data. The commands and instructions were sent to lower computer (DSP F2812 control system) through RS232 serial interface. The transmission data content was divided into three parts (upper 4 bits, middle 6 bits and low 6 bits) to avoid incomplete data between sixteen-bit peripheral bus and eight-bit registers in SCI module. The lower computer software includes main program and initialization module, motor driving module, interrupt module, communication module, A/D converting module. The DSP chip calculates the control instructions and parameters and drives the motor to execute the required actions. The actual tests showed that the running of control system software was reliable.

Hongjun Liu, Huabin Zheng, Jia Liu
Monitoring Energy Consumption in an Industrial Site

The Smart Grid vision imposes a new approach towards energy supply that is more affordable, reliable and sustainable. The core of this new vision is the use of advanced technology to monitor power system dynamics in real time and identify system in stability. In this paper we present a real time analysis tool specifically designed to monitor an industrial site with particular attention to power consumption. This solution, based on Wireless Sensor Networks, is able to produce useful results and to provide statistic analysis useful for the future choices of the industrial company.

Dario Bruneo, Angelo Cucinotta, Antonino Longo Minnolo, Antonio Puliafito, Marco Scarpa
Implementation of CAN Bus Real-Time Simulation Kernel Based on Windows Platform

CAN (Controller Area Network) Bus has been widely used in the development of automotive distributed electronic systems. At present, model-based V-cycle development is becoming more and more important, these models serve globally as a foundation of analysis, testing and integration of bus systems and ECUs. Thus problems are detected and corrected earlier. In this article a hardware based CAN bus simulation system is discussed, with the simulation kernel implemented on PC, which is able to simulate multiple CAN buses on-line or off-line. Simulation scripts can be assigned to each emulated node so that these emulated nodes are able to react to bus events. Besides, additional methods are used to ensure the real-time performance during the whole simulation. Results show that with the simulation kernel, testing and analysis of automotive networks are easily achieved, and the development efficiency of automotive distributed systems are enhanced significantly.

Feng Luo, Chu Liu
Stability of Discontinuous Systems Based on -K+L-Type Comparison Systems

This paper mainly discusses the stability problem of

–K+L

systems with discontinuous right-hand sides. In the framework of Filippov solutions, motivated by the theory of nonsmooth analysis, when Lyapunov function is Lipschitz continuous and regular, comparison principles and Lyapunov stability theorems with respect to a closed invariant set for

–K+L

systems with discontinuous right-hand sides are presented respectively.

Zhi-shuai Ding, Zhen Li, Gui-fang Cheng
A New MPPT Algorithm Based on ANN in Solar PV Systems

To optimize the solar energy efficiency, maximum power point tracking (MPPT) algorithm is usually used in solar photovoltaic (SPV) systems. In this paper, a new MPPT method based on artificial neural network (ANN) has been proposed for searching maximum power point (MPP). The new combined method is established on the three-point comparing method and ANN-based PV model method. The three-point comparing method has the advantage of searching the MPP exactly when the solar irradiance changes sharply, and it can make the system work under a stable mode. The advantage of ANN-based PV model method is the fast MPP approximation according to the parameters of PV panel. The proposed new MPPT algorithm can search the MPP fast and exactly based on the feedback voltage and current with different solar irradiance and temperature of environment. The method is simulated and studied using Matlab software and the results of simulation prove the effectiveness of the proposed algorithm.

Hong Zhang, Shuying Cheng
FPGA Design and Implementation of Low Power Consumption LDPC Encoder Based on DVB-S2

According to DVB-S2 standard for LDPC (Low Density Parity Check) codes, a novel LDPC codes encoder circuit structure is designed. The design has been implemented on the FPGA (Filed Programmable Gate Array). Simulations results show that, due to the random nature of the input data, this structure significantly reduces the power consumption of the calculation circuit. Meanwhile, during the entire coding process, the data is processed parallelly and distributed storage so that we can not only enhance the information processing rate but also save storage space in FPGA.

Xingyu Zou, Hui Qian, Shuying Cheng
Design of Photovoltaic System Based on an Improved MPPT Algorithm

In this paper an overall circuit of a photovoltaic system is designed. By analyzing the output characteristic of a solar cell, an improved MPPT algorithm on the basis of P&O method is put forward to track the MPP of solar cell modules. The experimental results show that the improved P&O MPPT algorithm has higher efficient compared with the P&O method in the same environment, and the photovoltaic system can keep working at MPP without oscillation and misjudgment. So it can not only reduce misjudgment, but also avoid power loss for constant perturbation around the MPP.

Yongcheng Yu, Shuying Cheng
Hardware Design of High-Speed Data Acquisition System Based on ARM9

A high-precision data acquisition system which can be connected with the embedded development platform is realized in this design. The advantages of embedded platform and data acquisition system are fully integrated, and the contradiction between high-speed operation of embedded platform and relatively slow speed of AD conversion is solved. It has certain reference value in the high-speed data acquisition system.

Bifeng Yang, Yanjun Zhan, Shangchang Ma
A Study on Duality Theorems of Nonconvex Fractional Semi-infinite Programming

In the framework of the generalized convex function we defined in paper [1], a Mond–Weir type dual for a class of nonconvex fractional semi-infinite programming problem is considered. Appropriate duality results are formulated. The results obtained not only provide a measurement of sensitivity for given problems to perturbations, but also can be apply to the questions occur in resource allocation, stock cutting problem in paper industry, agricultural planning and portfolio selection etc.

Yong Yang, ZaiEn Hou
Research on Bus Transfer Query Algorithm Based on Relational Database

A relational bus data model was established in order to solve realistic problem of difficult bus route query. A bus transfer query algorithm with a stepwise intersection solution of the query data was proposed with which data in relational database could be quickly searched according to conditions. A bus information query system based on relational database was also designed to verify the effectiveness of the algorithm. Information of fifty-five bus routes in Beijing was gathered and query experiment of information between any two stops was carried out. The query accuracy was 100% and average query time was 1.5 seconds. Experimental results showed that the database design and algorithm has advantages of short query time, high efficiency, identifying upward and downward directions and supporting walking transfer.

Zhongyuan Yu, Danzhi Wang, Weizheng Ren
Evaluation of University Websites as Communication Tools: An Iranian Report

This research aims to study the conformity of Islamic Azad University (IAU) Branches’ websites with some evaluation criteria. Using heuristic method, primary data as well as final websites for final analysis were identified. Research population includes 107 IAU Branches’ websites. Needed data were collected using a researcher-developed checklist which is based on nine broad evaluation criteria. To analyze collected data, software SPSS (version 17) was applied. Totally, IAU Branches had a relatively average performance (54.2662% > 50%) in observing the nine criteria considered in the study. Also, they had a better conformity with criteria “navigation” (78.6085%) and “coverage” (72.5234%), while criteria “interaction” and “accuracy” were observed less than the rest with 14.9533% and 36.6822%, respectively. websites of IAU Branches located in Iran’s capital, Tehran, had a better performance (60.46%) in observing the criteria.

Alireza Isfandyari-Moghaddam, Behrooz Bayat, Saeid Maleki, Vahid Ranjbar
An Adaptive Filter for a Small Attitude and Heading Reference System Using Low Cost Sensors

Small Attitude And Heading Reference System (AHRS) based on MEMS are small size, light weight, low power consumption, and low cost by the inclusion of micro sensors. Small AHRS have many potential uses beyond air- and spacecraft applications. However, the MEMS sensors have large noise, bias and scale factor errors due to drift. An extended Kalman filter with adaptive gain was used to build a small AHRS system based on a stochastic model. The adaptive filter tunes its gain automatically based on the system dynamitic sensed by the movement state to yield optimal performance.

Tongyue Gao, Chuntao Shen, Zhenbang Gong, Jinjun Rao, Jun Luo
About Structure Complex Error of a Control System with Feedback

In paper considered a new type of a control system feedback. Offered feedback compares an input (reference)

$\overline{r}$

with delayed plant output

$\overline{y}$

. The measurable phase delay Δ

ϕ

finding with used a Hilbert transform and allows define a structure complex error of control system. The phase angle delay Δ

ϕ

used for define the time delay in control system and controller design.

Oleg N. Agamalov
Mapping-Based Positioning Strategies for LGV

Positioning is the core of a LGV system. The basic concepts of positioning LGV are first introduced. On the basis of the concepts, the positioning process is divided into two steps, mapping and calculating. Two main categories of mapping process, fullmap and quickmap, are proposed. Quickmap are further discussed as position-based quickmap and angle-based quickmap. Fullmap is based on geometrical matching while quickmap is based on continuous mapping. Based on different mapping strategies, the calculating processes are accordingly different. Least Square Method is used to refine the result of position-based strategies, including fullmap and position-based quickmap. Least Square Quasi-Newton method is used to calculate the result of angle-based strategy, which here is angle-based quickmap.

Dancheng Li, Binsheng Liu, Cheng Liu, Weipeng Jin, Shuangshuang Zhou
BPEL Based Service Process Configuration in SaaS Application

SaaS system uses a single instance to meet the multi-tenant demand. In traditional information systems, in order to meet customer’s ever-changing business requirements, generally took the second development to improve existing software systems, but it would cause a certain lag. During the second development, customers can only use the original software system. It not only affects their work efficiency, but also requires programmers to improve the system within a short time. It is a large degree of challenge, and the quality may be a trouble. To solve this problem, SaaS applications take use of customization and configuration to deal with. SaaS can quickly adapt to requirements changed, maintain easily, and cost properly. Among these, one factor which promotes the development of the SaaS is that system can be configured by tenants. Specifically, through combining the tenants’ business processes configuration with function configuration to further meet the diverse needs of tenants.

Guoqi Liu, Wei Zhang, Dancheng Li, Shuangshuang Zhou, Zhiliang Zhu
Research and Application of Multiple Spanning Tree Network Topology Discovery Algorithm

Network topology information was vital for network management. According to the requirement of the real network environment ,in this paper we studied the current mainstream level two and level three topology discovery algorithms, including simple spanning tree topology discovery algorithms and forwarding-table topology discovery algorithm, discussing the advantages and disadvantages of each method and come up with a network topology discovery method suited for multiple spanning Tree protocol topology, protocols including STP / RSTP, PVST +, MISTP / MSTP protocols, The algorithm has been tested in several enterprise-level environments, and the results showed that it discovered the physical connection information, VLAN information, spanning tree logical connection information considerably accurate.

Dancheng Li, Chen Zheng, Chunyan Han, Yixian Liu
The Comparison of Classification Model with Partial Least Square Based Dimension Reduction

Dimension reduction is a very important technique to handle with the analysis of high dimensional data sets. Among various methods, Partial Least Square based Dimension Reduction (PLSDR) is one of the most effective one, which has been applied in many fields such as the analysis of microarray data. But the problem of choosing classification model with PLSDR has often been neglected, different classification models are applied arbitrary. Aim at this problem, the paper gives an examination of different classification model with PLSDR by intensive experiments. Furthermore, some interesting conclusions are presented.

Su-Fen Chen
Correlation Processing Based De-noising Method for Power Quality Disturbance

Correlation processing of signals is an approach to reduce the noise in signal processing. Continuous signal, break signal and noise are included in the detail coefficient after wavelet transform of PQD. The characteristic of correlation in the above three parts among the scales are different. The odd and even samples of the primary disturbance form two split disturbances with the same data length. Correlation processing between the detail coefficients of the same scale from two new disturbances after wavelet transform proves to reduce the noise. Soft threshold de-noising of the result after correlation processing acts as the guideline to de-noising of the two disturbances. Wavelet reconstructions build up the split disturbances which make up the total disturbance. The analysis for the complexity of computing in the algorithm shows that DSP microprocessor is competent for it.

Genghuang Yang, Xin Su, Feifei Wang, Shigang Cui, Li Zhao
Design and Implementation of Data Acquisition for Partial Discharge in Power Cable

Partial discharge of power cable is a serious hidden danger to shorten the life of cable and to lower power supply reliability. It is difficult to sample the partial discharge signal because of its weakness of 1mV and high spectrum of 300MHz. Data acquisition PXI5154, Multi-channel switch PXI2593 and the computer system produced by National Instrument Co., LTD are used to be the platform for data sampling. Data sampling & communication subsystem and client subsystem are designed to realize channel selection, data sampling and storing, data displaying, history data replaying, information setting and user authority management.

Genghuang Yang, Feifei Wang, Shigang Cui, Li Zhao
Programmable Scheme for DSP and Application in Small Hydropower Station

This paper brings forward a new programmable scheme based on the Digital Signal Processor (DSP) in the field of industrial supervisory control. First of all, a code loader embedded in DSP enables the spot programmable function of the device. Procedure and step form the programmable scheme. Some steps are included in a procedure. In a step, there are some conditions and action. When the steps lines up based on special rude, the procedure stimulates the industrial control. The scheme makes DSP work like a Programmable Logic Controller (PLC) but avoids fussy programming and high price. The scheme is adopted in the application of the small hydropower station. The result shows that the scheme is well designed to accomplish the tasks. The scheme makes the small hydropower stations run more flexibly and economically and speeds DSP to enter the field of complex industrial control.

Genghuang Yang, Jianhui Niu, Feifei Wang, Shigang Cui, Li Zhao
Multi-mode Human-Machine Interface for Robot

Multi-mode based human-machine interface is proposed to complete the task of controlling the machine by the primary information of human being such as Electroencephalogram (EEG) and electromyography (EMG). Digital signal processor is adopted to process the information. EEG and EMG are sampled before their feature is extracted. The detail order is formed to control the machine such as robot. The speech recognition based on some fixed Chinese words is included in the device. Many tests under the simulated condition in the lab proved that the developed system is capable to control the robot for key operation or stick control on a panel with reasonable reliability.

Genghuang Yang, Jianhui Niu, Feifei Wang, Shigang Cui, Li Zhao
Research of Portable ECG Monitoring Device

A new kind of portable electrocardiogram (ECG) recorder and clothes is developed for long-time health monitoring. The electrodes, wires and recorder are available for ECG detection. The electrodes are fixed in the lining of the clothes. The thin wires are attached between the front fabrics and the lining. The recorder can be put in the pocket of the clothes. There is interface in the recorder for ECG signal input. This recorder is designed by modules, which includes intelligent processing module based on MSP430, electric circuit module for signal preprocessing, Bluetooth based wireless data transmission module and displayer. The recorder analyzes ECG and obtains the heart rate which is displayer in LCD. The samples of ECG are transmitted to wireless mobile terminal such as cell phone or PDA for graph displaying and remote medical service. Amounts of clinic tests have been done and the results have been approved by the doctors in hospitals and patients.

Genghuang Yang, Xin Cai, Feifei Wang, Shigang Cui, Li Zhao
Speech Based Assisted Mini-device for Interphone in Shaft in Coal Mining

A speech based mini-device is designed to assist the interphone for operating on the shaft in coal mining. Some keys with separate speech tip are formed based on the detail tasks in the shaft. Order in work can be transmitted by the interphone. The order is sent from one of the couple interphones to the other after a key is pressed. The communication between the workers on the different work plat is formed. The mini-devices achieve automation when its output signal is connected to the relays driving the equipment. The mini-device with intelligent function is of high practical value.

Genghuang Yang, Ting Zhang, Feifei Wang, Shigang Cui, Li Zhao
Apply Time and Measurement Based Software Rejuvenation to Improve System Availability

As for software rejuvenation, there exists many policies now, including time based, measurement based, and time and measurement based policy. In this paper, the problem caused when applying time and measurement based policy in real system is discussed. And the procedure about how to use this time and measurement policy is presented to improve system availability and lower downtime cost. At last, numerical results for a real server is given.

Letian Jiang, Guozhi Xu
An Artificial-Neural-Network-Based Multiple Classifier System for Knee-Joint Vibration Signal Classification

The knee-joint vibration or vibroarthrographic (VAG) signal could be used as an indicator with regard to the condition of degenerative articular cartilage surfaces of the knee joint. Analysis of VAG signals can assist in the screening for knee-joint pathology and help prevent unnecessary exploratory surgery. This paper proposes a multiple classifier system (MCS) based on artificial neural networks for the classification of VAG signals with statistical features. The multiple classifier system combines a group of component least-squares support vector machine classifiers with a linear and normalized fusion model. The fusion model minimizes the mean-squared error (MSE) of the MCS by solving the corresponding constrained quadratic programming problem, and the optimal weights are derived from the energy convergence process of a recurrent neural network. The results obtained with a data set of 89 VAG signals show that the proposed MCS can effectively reduce the classification error in terms of MSE. In addition, the proposed MCS also provides an area of 0.8230 under the receiver operating characteristics curve, which is much better in comparison with any one of the component networks with different input features, and also superior to the popular simple average or weighted average fusion method.

Yunfeng Wu, Suxian Cai, Meng Lu, Sridhar Krishnan
Adaptive Control of Video Scramble Depth Based on Subjective Evaluation

Video scramble as one important means of protecting video distribution is the important guarantee for development of video services. In this paper, in order to solve the depth control problem in selective video scramble, the subjective evaluation method of scramble effects is proposed, and the corresponding subjective evaluation guidelines are given. Based on the result of subjective evaluation, the adaptive control model of selective video scramble depth is designed and the empirical formula is fitted by the relationship among the subjective evaluation grade, the scramble depth and the TS bit rate. Based on the model and the formula, the selective video scramble depth is adaptively adjusted according to coding type and TS bit rate. Experiments show that via the model and method in this paper, the actually scramble effect is consistent with the expected scramble effect.

Jianbo Liu, Cheng Yang, Yang Yu
Video Quality Assessment Based on Content-Partitioned Multi-Scale Structural Similarity

With the rapid development of video technology, VQA (Video Quality Assessment) has been playing more and more important roles in a variety of modern video processing applications. In this work, we follow a new philosophy in designing VQA algorithm, which uses a content-partitioned image model and motion-based frame weights. First, considering that different regions in image have different perceptual significances, we categorize an image into four different local regions according to the computed gradient magnitude, and allocate different weights to their MSSIM (Multi-scale Structural SIMilarity) scores when pooling. Second, different weights are allocated to different frames according to their different motion conditions. Finally, the overall quality of the entire video sequence is given by combining all the weighted frame values. The algorithm is tested on the LIVE (Laboratory for Image and Video Engineering) video quality database and the results show that it outperforms several modern popular algorithms.

Jie Yao, Yongqiang Xie, Jianming Tan, Zhongbo Li, Jin Qi, Lanlan Gao
Monaural Speech Segregation Using Signal Phase

An approach to segregate the target speech form the mixture utterance in low signal noise ratio (SNR) was proposed. Within the framework of computational auditory scene analysis (CASA), phase was the cue for segregation, and short time Fourier transforms (STFT) was used to extract the phase of the signal. Binary masking was used to group the target speech units based on the difference of phase between the mixture, clean speech and noise. The threshold of the binary masks was not linear. It adapted with the frequency change, and obtained from pretest. Experiments illustrated that the improvement of signal to noise ratio was more than 20dB in babble, m109, white and machinegun noise in -30dB to -20dB. The waveform of the result signal shown it remained most detail of the original signal, and had a well intelligibility. Phase is a robust cue in monaural speech segregation.

Hong Zhou, Yi Jiang, Xiao Chen, Yuanyuan Zu
Design and Analysis of a Fuzzy Controller for a Servo System

This paper presents design and simulation investigation of a fuzzy controller and a conventional PID controller for a servo system. First, a servo system is considered and its stability is discussed. Then, a PID controller that is tuned by the Ziegler-Nichols method is formulated for controlling the servo system. To improve the servo system’s dynamic response parameters, a fuzzy controller is then proposed for controlling the system. A performance comparison between the fuzzy and the PID controllers are carried out. The results are presented and discussed.

Mohammad Yaghoubi, Behnam Ganji, Abbas Z. Kouzani
A Head Mountable Deep Brain Stimulation Device for Laboratory Animals

Deep brain stimulation has emerged as an effective method to treat certain medical conditions. Electrical charges are injected into the target tissue through a conducting electrode exciting the tissue. A variety of DBS devices have been developed based on different operation principles. Majority of these devices, however, employ complex circuitry and are bulky. In clinical trials, laboratory animals need to freely move around and perform activities whilst receiving brain stimulation for days. This paper presents a simple lightweight head mountable deep brain stimulation device that can be carried by the animal during the course of a clinical trial. The device produces continuous current pulses of specific characteristics. It employs passive charge balancing to minimize undesirable effects on the target tissue. The device is constructed and its performance tested.

Abbas Z. Kouzani, Susannah Tye, Ken Walder, Lingxue Kong
On the Generalized Hamming Weights of Some Product Codes

The r-th generalized Hamming weight of a linear code is the minimum support size of any r-dimensional subcode. It has been found useful in the studies of cryptography and trellis coding. In this paper, we determine the generalized Hamming weights of some product codes in terms of the component codes, including two maximum-distance-separable codes, a maximum-distance-separable code and a first-order Reed-Muller code over the field

F

q

.

Zhi-min Li, Xin Xu, Cun-hua Li
Design and Investigation on Control System of a Rehabilitation Robot Based on Walking Gait

Gait rehabilitation robots are of increasing importance in neurorehabilitation. In order to overcome the single movement pattern shortcoming of existing gait rehabilitation training robots, a control system of a gait rehabilitation robot was designed. The system was able to implement gait rehabilitation trainings in passive and active mode respectively. In process of rehabilitation trainings, physical condition based on patient’s physiological information was evaluated and an appropriate rehabilitation mode was selected for them. In the passive mode, various motor velocity stalls were set according to degree of difficulty, the robot can aided patients to perform a predetermined movement; in the active mode, the system analyzed the patient’s plantar force/torque signals and determined their movement intention, then the robot would run in accordance with the patient’s intention. The experimental results indicate that the system performs good stablities and real-time response.

Yongjiu Liu, Leijie Zhang, Quanjun Song, Feng Shuang, Yunjian Ge
An Improved Method for Illumination Invariant Face Recognition Based on Adaptive Rescaling DCT Coefficient in Logarithm Domain

This paper presents an improved method for robust face recognition using illumination normalization based on Discrete Cosine Transform (DCT) in logarithm domain. Two novel coefficients are designed to identify the lighting condition (LC), based on which the low-frequency DCT coefficients are adaptively rescaled except the first one (DC). As a result variations under different illumination conditions are minimized meanwhile original information contained in low-frequency is comparatively well preserved. Results of experiments on Yale B database and Extended Yale B database show that proposed method has better performance under variational input illumination conditions. The proposed method is fast in computation and could be easily implemented into real time face recognition systems.

Chao Yu, Xiaoqun Zhao, Sei-ichiro Kamata
A dSPACE DSP Control Platform for V/F Controlled Induction Motor Drive and Parameters Identification

This paper presents a full digital implementation of open loop and closed loop Volt-per-Hertz (V/F) Controlled Induction Motor Drive with dSPACE DS 1104 Hardware/Software and Matlab/Simulink environment for educational purpose. A feature of this environment is a simple user interface, which requires a basic knowledge of Matlab/Simulink for designing the controller and motor parameter identification.

H. Akroum, M. Kidouche, A. Aibeche
Performance Improvement of Ranging and Communication System Using Ultra Wide-Band Tilted Frequency Chirp Signal

This paper proposes a ranging and communicating system that uses the ultra wide-band (UWB) frequency slope modulated chirp signal. Instead of using only the up-chirp and down-chirp with the same frequency sweeping rate, the proposed system uses several chirps that have different frequency sweeping rates with frequency hopping. This system performs better than the conventional communication and ranging schemes because it is capable of increasing the data transmission rate and at the same time decreasing the interference between sequences used by users.

Cheolwoo You, Intaek Kim, Seungsoo Han, Jinsoup Jeong, Dongho Kim
Controllability and Observability of a Class of Piecewise Linear Impulsive Control Systems

This paper studies the controllability and observability for a class of piecewise linear impulsive control systems with general jumping operator. The sufficient conditions for state controllability and state observability of such systems are established. A method of variation of parameters in piecewise linear ordinary differential systems is employed for achieving the required results.

Dengguo Xu
Design of Creeping Property of Wood Control Experiment System Based on STC12C5A60S2

Describes a control experiment system of creeping property of wood based on MCU. The upper and lower computer of the system use RS485 interface for communication. Lower computer is constituted by 32 fault-tolerant data acquisition which is consisted by STC12C5A60S2, and upper computer use Borland C++ Builder to achieve control experiment system for creeping property of Wood in order to access the creep curve in various stages and analysis of data to obtain creep property of wood. This system is strong anti-interference, higher overall stability, long time running and so on.

Weimin Han, Jianyu Zhao
Characteristics of the Tourism-Related Perception Propagation

The propagating of a tourism-related perception is closely associated with the destination image and has a great influence in purchase decision of potential tourists. Here, the chracteristics of the propagation were investigated by numerically simulating with a small-world network and an epidemic model. Results indicated that the number of both the message senders and the message receivers synchronously increase at the beginning and then decrease. The message will spread among a great portion of the population if the propagation is not controlled. We defined the least propagation times as the least times that is needed to propagate the message to the whole population. The relationship between the least propagation times and the population size was modeled. The model suggested that the message will be spread to all people only in a month in a one million-people city. Also, a high connection of the network will speed the propagation. Our studies revealed some details of the perception propagation.

Dan Luo, Wuzhong Zhou
Simultaneous Controller Design for a Family of Time-Varying Linear Systems

In this paper, we establish the parametrization of simultaneously stabilizing controllers for a family of time-varying linear systems. A newly designed approach of simultaneously stabilizing controllers is given for a family of time-varying linear systems.

Tianqiu Yu, Han Yan, Xiangwu Xiao
Simultaneous Robust Stabilization Problem of Linear Systems via Transitivity Approach

This paper considers the problem of simultaneous robust stabilization for two linear systems subject to coprime factor uncertainty. In view of the transitivity, we establish a criterion for the simultaneous robust stabilization in the framework of nest algebras.

Tianqiu Yu, Chunmei Wang
Study of Equipment Virtual Disassembly Petri Net Modeling for Virtual Maintenance

The constraint characteristics between the parts of the complex equipment were described with assembly matrix in the paper. And then, based on assembly matrix and Petri nets, a virtual disassembly Petri nets (VDPN) model including maintenance resource and maintenance cost was established. The model could describe the connecting relationship and priority. Moreover, it is also a proper model for solving disassembly planning problem by meta-heuristics. To verify the validity and efficiency of the approach, a variety of assemblies including some complicated products are tested.

Wang-wei Zhang, Qun-xing Su, Peng-yuan Liu
Two-State Regulation in MATLAB for the Comparison of Some Parameters (Damage, Power Consumption) by PSD Regulation

In today’s active era of ICT usage not only in education but also in the field of industrial and automation equipment there is a question coming into the foreground: how should some processes be used and controlled both to have their course reliable and to achieve the demanded result. One of the possibilities is the usage of regulators (e.g. adaptive ones) that ensure these functions. Besides the relatively low price we get protective, signalling, visual and registering function, while communication through them and the regulated system is practically either without a biased information or with a very small change. Afterwards an unlimited complexity of control algorithms comes into being and also the possibility of fast change of regulated system parameters.

Peter Brečka, Martin Magdin, Štefan Koprda
Anti-synchronization of Two Novel Four-Scroll Hyperchaotic Systems with Unknown Parameters via Adaptive Control

Anti-synchronization of two novel hyperchaotic systems with four-scroll attractors which have been found up to the present is investigated in this work. Adaptive control is employed when system parameters are unknown. Based on Lyapunov stability theory, an adaptive controller and a parameter update law are designed so that the two hyperchaotic systems can be anti-synchronized asymptotically. Numerical simulation is provided to show the effectiveness of the theoretical results.

Zhenwu Sun
A QoS-Aware Algorithm for Multi-services in Wireless Networks

In this paper we propose a new scheduling algorithm for emergency bound based on various services for each user. We integrate channel conditions associated with each time unit to provide overall fairness and maximize its total throughput. The proposed system model supports multiple users, each user may have several service demands, every demand has different characteristics such as emergency bound, etc. How to guarantee the fairness for each user and the emergency bound for each service is the problem to be solved. In addition, we investigate the channel condition for each user and provide the maximum throughput for the single channel of each time unit.

Haifeng Lin, Anna Jiang, Di Bai, Yunfei Liu
Web Security: Research Challenges and Open Issues

It has been observed for a quite long time that Web Security has been one of hot research areas, from point of view of be it either analysis or detection and later developing mitigation plans. Web security threats have undergone much sophistication compared to their initial introduction and they are becoming more & more evolved everyday. The evolution might be in terms of new ways of attack or bringing in resistance to using simulated OS or VM environments. Also, there has been considerable shift in the target of attacks in recent years. Earlier, clients were ignored while choosing targets. But, in recent years client user has become the main target for attacks as the adversary believe that the end user is the weakest link in the security chain. As a result of all these latest developments traditional security tools have been ineffective against these new attacks either for detecting or analyzing the attacks. In this regard this paper presents a brief survey of research challenges and open issues in the area of web security under the suitable subtitles depending upon type of attack associated with the issues.

V. Geetha, Pranesh. V. Kallapur
Web Security: A Survey of Latest Trends in Security Attacks

Every system used in real time will be having some security threats. Internet has not been exception for it. From as early as 1980s there has been occurrence of several different types of security attacks with Internet being their major target. Internet happens to be main target due to type and amount of information it stores and advancements in computer networks which makes it very easy for accessing the same. Also, at the same time limitations/design flaws in Internet design, programming languages etc. make attack techniques to evolve from day to day. Due to such evolution of new attack mechanisms, at present, we have a big list of different attacks. Further, motivations for making such attacks range from just having fun to sabotaging critical & specific infrastructures at national level. Hence, in this context, it is very necessary and useful to know about latest trends in security attacks. In this connection this paper provides a brief survey of latest security attacks on web. This paper also provides a summarized comparison of discussed attacks against chosen important parameters. In addition, an observational data about attacks via Emails over a period of time is also presented. The paper concludes by mentioning the need of such surveys and research opportunities in this area.

Pranesh V. Kallapur, V. Geetha
Optical Fiber Sensing Information Technology for Nuclear Waste Repository Monitoring

In this paper, a method based on optical fiber technology for high-level nuclear waste monitoring was presented after reviewing the restrictions of the existing technologies. Investigations were carried out for the design of a brand new distributed system using Fiber Bragg Grating (FBG) sensor arrays. The proposed system mainly included three parts: the quasi-distributed measurement array, the transmission cable and control center. Each part of it was deeply analyzed. Compared to the traditional sensors, the system had the potential to realize long-distance, real-time, low cost, multi-point and stable performance and could satisfy the practical requirements of the safe system.

Fan Yang, Biao Wei
Improvement of the Subset-Cover Broadcast Encryption Scheme

The security of many emerging applications is based upon broadcast encryption scheme, for example teleconference, pay-TV. This Paper detailed analyzes the scenario of Cable TV, and present the disadvantages of previous BES. In this paper, we improve and enhance the main broadcast encryption schemes so that they can be adapted by Cable TV. Finally, we make a comparison of these BES, and present their future application.

Zhifeng Qi, Yin Huang
Research on the Testing Method and System for the High-Power Low-Speed Diesel Engine

For the high-power low-speed diesel engine’s performance and reliability evaluation, this paper studies the engine’s running-in norms, presents the Test Scheme about the combustion process, the Inlet swirl control, the cooling system control, and the distribution and emission. The whole engine’s test methods and systems are established. By using the combined method of the test platform research and the theoretical model analysis, the diesel engine’s performance and reliability tests are made to evaluate the engine’s design.

Guojin Chen, Zhongmin Liu, Tingting Liu, Guangjie Yuan, Shaohui Su, Yijiang Cao
Constrains-Aware Web Service Composition Optimization Based on TTPN

A global constraint is independent if the values that should be assigned to all the remaining restricted attributes can not be uniquely determined once a value is assigned to one. To solve the problem, the Trust Time Petri net (TTPN) is used to model it, then a optimization algorithm is presented in order to local the optimal legal firing sequences in TTPN model on the basic idea of analyzing the minimal cycle time in the TTPN, so that the optimal Web service composition is obtained. Finally, the experiments show that this method has both lower time consuming and more optimal solution.

Juan Wang, Xianwen Fang, Xin Gao
Flexible and Low Cost Embedded Platform for Remote Web Monitoring and Control of Camera, Sensors and Actuators

This paper focuses on classes of remote monitoring and control applications where important functionality is required at low cost; a new methodology for monitoring and control is proposed where the processing is based on firmware on an off the shelf microcontroller. Sensing can range across a number of physical parameters and communication is based on exploiting existing infrastructure in particular support for TCP/IP. Flexibility, low cost, low maintenance are key drivers.

Anastasios Kanakis, Mohammed Benaissa
Random Number Generator Based on Transformed Image Data Source

Real random values play critical role in different application of computer science. One of the main challenges in generating real random values refers to the needs for physical noisy sources such as nuclear decay, brownian motion and quantum mechanics. Since usually these noisy sources are too costly and complicated, this research proposes an inexpensive and less complicated method for generating true random values by using normal image data as the source of generator and two cryptography hash functions as data extractor. The result of three levels of statistical tests on generated random sequences proves that the generated sequences achieved high level of randomness.

Saman Hedayatpour, Suriayati Chuprat
Low-Rate Wireless Personal Area Networks and DALI Protocol Applied to Street Lighting

This paper focuses on the development of an energy efficient street lighting remote management system making use of low-rate wireless personal area networks and the Digital Addressable Lighting Interface (DALI) protocol to get a duplex communication, necessary for checking lamp parameters like lamp status, current level, etc. Because of the fact that two thirds of the installed street lighting systems use old and inefficient technologies there exists a huge potential to renew the street lighting and save in the energy consumption. The proposed system uses DALI protocol in street lighting increasing the maximum number of slave devices (ballasts) that can be controlled with DALI – originally it can only have 64 ballasts. Some aspects regarding the lighting control protocol and the communication system are discussed, presenting experimental results obtained from several tests.

F. Domingo-Perez, A. Gil-de-Castro, J. M. Flores-Arias, F. J. Bellido-Outeirino, A. Moreno-Munoz
Manipulating Some Entangled States with a Three-Λ Atomic Ensemble

We first study the dark-state polaritons of the three- Λ EIT atom system with three quantized fields and three classical control fields. Then we focus on the storage mechanism and the quantum effect of this system. With this scheme, not only the three-mode quantum information but also some tripartite entangled states can be generated, stored, retrieved and transformed, thus the ability of the manipulation of entangled states is improved.

Zhuan Li, Ping-ping Li, Hong-min Wang
Smooth Acceleration Model for Maneuvering Target Tracking

According to the movement tendency of maneuvering target, Smooth Acceleration model was brought up in order to ensure the precision and smoothness of the tracking motion. Based on Kalman filter, a filtering algorithm with the concept of movement tendency was fit for Smooth Acceleration model. And the parameters in Smooth Acceleration model were analyzed for the influence of filtering process. At last, Smooth Acceleration model and its filtering algorithm was applied to ship-swaying attitude tracking. It demonstrated by the experiment results that the model could achieve a high precision of position control and the running smoothness could be improved obviously.

Ping Wang, Kai Xue, Liang Ma
Technology of Exposing Coal Seam and Passing Rock Cross-Cut in Sever Outburst Coal Seam

For some common problems during exposing coal seam, the six-steps exposing coal seam technology is present, which includes prediction, pre-extraction, framework, reinforcement, protection and emission. The key content of six-steps technology is pre-extract from coal seam and reinforce the roof coal mass of the rock cross-cut. Drill site is constructed in the position in 5m normal distance from working site, then cross-measure boreholes are drilled separately from rock cross-cut and runaround way to the expose zone. The separation of the boreholes is 2~3m and the control range is 10m surrounding the rock cross-cut. The pre-extraction of coal seam should not be less than 6 months. Malisan is injected into the roof of rock cross-cut to form a false roof, and then boreholes are drilled into cracking zone upper to the false roof. After that, Rock show is injected into the zone to fill the cracks of the rock. So the hard false roof above the tunnel is formed, and the coal seam with sever gas and coal outburst risk under complicated geological conditions is safety exposed.

Wei Gang
An Adaptive Threshold Based on RBF Neural Network for Fault Detection of a Nonlinear System

Considering the drawback of the big error when using fixed threshold in fault detection, this paper presented a practical approach to combine RBF-based fault detection observer with an adaptive threshold. Firstly, a fault detection observer based on RBF neural network was applied to generate a residual error signal. Secondly, several key factors in adaptive threshold model were outlined, such as modeling error, random disturbance, input instructions, system status and etc. In order to avoid the above errors, the observer model was modified to combine with an adaptive threshold based on RBF neural network as well. Finally, the suitability of the proposed technique was illustrated through its application to the condition monitoring of an E-cabin temperature control system. It is very effective to adaptively adjust the fault threshold according to a variety of influencing factors.

Zhaobing Wang, Chen Lu
Study on Chaos Characteristics of Electricity Price Based on Power-Law Distribution

Electricity market is a complex system involving multi-factors and multi-links. As an important economic lever, the electricity price shows the evolution of complex irregular movement. It’s significant to reveal the internal law of this seemingly stochastic evolution. the study firstly determined the sequence method as the research tool after comparative analysis of four different power indexes. And then, the study compared the single time sequence and the time-sharing time sequence in PJM market. The former sequence better reflected the complex factors. So exponential of the single time sequence was studied by sequential method of least squares fit. We found that the time-sharing time sequence has a distinct power-law distribution. The exponential is in the range of 2.262-3.375. At last, the study summarized the main factors affecting price volatility. It’s a new research idea for the complex nature of electricity price and the complex system of electricity market.

Sun Jingqi, Niu Dongxiao, Li Chunjie
Performance Analysis of a Simple Relay Coding Scheme Based on XOR Operation

Network coding emerging as a promising technology in wireless communication refers to coding at the relays. This paper presents a relay coding scheme that one relay processes the source’s data by XOR operation and then transmits to the destination. We analyzed the theoretical performance of the presented scheme using system outage probability, and did Monte Carlo simulation by the criterion of bit error rate (BER). Results show that this scheme provides an additional diversity gain, outperforms the conventional scheme with two relays, and approaches to the conventional scheme with three relays.

Shibin Su, Yuanyuan Gao, Yajun Zhang, Baofeng Yang, Kun Xu
English-to-Chinese Translation for Technical Terms Based on Improved Mutual Information

A method of translation selection based on improved mutual information is employed to select the best word translation. The selection of words in the translation is not independently carried out. The context is helpful for correctly translating words in the context. On the basis of the improvement of the characteristics of the existing mutual information formula, the best translation can be selected by combining the translation model with mutual information. Experimental results show that our method has a good effect especially on the translation of technical terms in a certain domain just as technical or patent term translation, etc. Our method outperforms a baseline traditional mutual information by using BLEU(Bilingual Evaluation Understudy) evaluation system.

Xiaoqing Lin, Dongyang Jiang
Design of National Special Requirement’s Acquisition System in Network

In this paper, we will discuss the process and method of National Special Requirement’s Acquisition System in Network, and will compare some feasible schemes. We will accomplish the design of system frame based on the demands and business logic. Design of persistence layer DAO, Domain Model and page transfer will also be discussed. Simple description will be given to database table. The system will be accomplished by oracle 11g.

Junxing Zhang, Xi Zhang, Chunjuan Bo, Guokai Xu
A Method of Detecting Ship Hydrodynamic Pressure Signal Based on Wavelet Transform and Support Vector Machine

This paper deals with a new method for feature extraction and target detection of ship hydrodynamic pressure signal from wind wave background. The signal is decomposed using the wavelet transform in a set of constitutive series. Then the future values of a special constitutive series are forecast using a support vector machine model. The prediction errors are employed to detect the target signal. By means of this method, it is possible to recognize whether target signal is involved or not in received signals. The effectiveness of the method is verified by a real target signal with additive simulated noise signal, especially under the condition of low SNR.

Liping Jiang, Weiwen Hu, Hongxiang Tian
Scenario-Based Design of Wireless Sensor System for Food Chain Visibility and Safety

Food chain visibility and safety problems have caused huge loss of money and threat to public food safety. The blooming Wireless Sensor Network (WSN) technology has been highlighted as a promising solution to resolve these problems. Because nowadays food chains has become highly distributed, heterogeneous, cooperative, and globalized, a comprehensive system-picture is needed in design practices to meet the extremely diverse requirements. In this paper, a universal WSN platform is designed for food chain monitoring applications based on a scenario-based method. It classifies the complicated real food chains into five typical scenarios (

Produce, Store, Transport, Sell, and Consume

). All scenarios are supported by convergence of all the necessary technical requirements. And corresponding operation models, networking protocols, hardware, and software are implemented. Comparing to existing researches, this paper provides a more comprehensive system-picture and its technical feasibility is approved by practical implementation as well as field experiments.

Zhibo Pang, Qiang Chen, Lirong Zheng
Improved Exponential Stability Criteria of Uncertain Stochastic System with Time-Varying Delay

The problem of robust stability for a class of stochastic time-delay systems with norm bounded and nonlinear uncertainties is considered. By combining Lyapunov-Krasovskii functional method and Jensen inequality technique, several robustly exponential stability criteria are investigated for the class of systems. In order to save computer time and reduce conservativeness of results, the approach proposed here avoids to use delay fraction, free weighting matrix and slack matrix. Mathematical and numerical comparisons indicate that the approach proposed in this paper may be more effective than the existing ones.

Yantao Wang, Jianting Lv, Ying Zhou
Delay-Partition-Dependent Robust Stability Criteria for Uncertain Discrete-Time Systems with an Interval Time-Varying State Delay

This paper focuses on the robust stability analysis of discrete-time linear systems with norm bounded uncertainty and an interval time-varying state delay. Delay-partition-dependent robust stability criteria for the class of systems are obtained by combining Jensen inequality and delay-partition techniques. Mathematical and numerical comparisons of the approach proposed in this paper and many of existing ones are presented, which shows the effectiveness and superiority of the proposed method.

Qiu Li, Yantao Wang, Huanyu Zhu, Yanmei Hu
Fuzzy PI Speed Controller Optimal Design for PMSM Drives

This paper proposes a new fuzzy PI control optimal design scheme for permanent magnet synchronous motor (PMSM) drive by using particle swarm optimization algorithm with normal cloud mutation (mPSO). The key of fuzzy PI control design is the design of fuzzy rules with expert experience. The performance of fuzzy PI control is degraded because of expert experience. In this paper, the mPSO is used to optimize the parameters of membership functions to automatically acquire the fuzzy space structure of system and fuzzy rules remain the same. The simulation results show that the proposed control strategy operates robustly under parameters variations and external disturbances and has good dynamic performance.

Wei Guo, Chuan-Wei Zhang
Proposing a Novel Algorithm to Improve Security in Wireless Sensor Networks Using Data Coding

Applications of Wireless Sensor Networks (WSNs) in industrial and consumer applications cause to get the attention of most researchers in this field. Besides these applications, security and reliability of WSN are extremely important, as important data can be conveyed securely from senders to receivers. Security and reliability in the WSNs always considers as a challenging issues. Several algorithms have been proposed to overcome the problem. However, the results are still not satisfactory. This paper proposes a new algorithm using coding theory to overcome the security and reliability problems in WSNs. The proposed algorithm uses minimum redundancy and optimal symbol allocation to ensure that the probability of successful data decoding is greater than or equal to a specified threshold. The experimental results show that the performance of proposed algorithm is much better when compared with other algorithms.

Iman Attarzadeh, Siew Hock Ow, Ali Barati
Semi-active Control of Structure Vibrations with MR Damper Using Fuzzy Control System (FLC) and Optimization through Genetic Algorithm (GA)

Magneto- Rheological (MR) damper is a new generation of dampers, filled up with a MR fluid. This fluid, when exposed to a magnetic field, will transform regularly from a slipper linear viscous fluid to a semi rigid state. In this article, semi-active control of structures equipped with MR damper is studied. For this purpose, fuzzy control theory is used to determine appropriate command voltage applied to MR damper; and genetic algorithm is used to optimize the fuzzy rules. Then, generated fuzzy rules database will improve fuzzy control system performance relative to experimental fuzzy rules database. Consequently, with applying an appropriate command voltage through an optimized fuzzy control system will decrease vibrations of the structures. The results show that, in the presence of optimized fuzzy rules through genetic algorithm, the amplitude of vibrations is decreased significantly.

M. Reza Elhami, Chamran Daneshdoost, Dariush Madady
Implementation of VMware Server Function Test Based on STAF

Based on STAF and some test tools such as SilkTest and TestLink, VMware Server function testing system has been studied. Virtual test environment is stressed, which successfully ensures the consistency of the test platform. Automation test platform proposed resolves some problems, such as the complexity of professional test tools and difficulties of expansion, and greatly enhances the efficiency of product testing. The research in this paper expands the scope of application of automation testing.

Chongwen Wang
An Analysis of Global Exponential Stability of Genetic Regulatory Networks with Time-Varying Delay

This paper presents a new sufficient condition for global exponential stability of the equilibrium point for genetic regulatory networks with time-varying delays. The results are also compared with the previous results in the literature, implying that the results obtained in this paper provide one more set of criteria for determining the global exponential stability of genetic regulatory networks with time-varying delays.

Mingjia Tan, Wenyong Dong
Stochastic Resonance in Nonlinear Multiple Signal Detection for Four Representative Noises

Stochastic resonance (SR) is an interesting phenomenon of noise-assisted signal transmission or signal processing through certain nonlinear systems. This paper discusses SR in nonlinear multiple signal detection for four representative noises based on a maximum a posterior probability (MAP) criterion. The performance of detection is assessed by the probability of detection error

P

er

. When the signal is suprathreshold, the

P

er

increases monotonously with the noise intensity and noise always degenerates signal detection. However, when the signal is subthreshold, the

P

er

shows non-monotonous variations and noise can improve multiple signal detection, i.e., SR exists. The efficacy of SR is significantly improved and the minimum of

P

er

can dramatically approach to zero as the sample number increases. These results extend the applicability of SR in multiple signal detection.

Youguo Wang, Qiuyun Hu
Multilevel Thresholding Based on Exponential Cross Entropy and Niche Chaotic Particle Swarm Optimization

The existing method of threshold selection based on maximal Shannon entropy or exponential entropy neglects the relationship between object and background to some extent. Aimed at the above-mentioned problem, a threshold selection method based on exponential cross entropy is proposed in this paper. Being different from maximal Shannon entropy only based on histogram distribution, minimum exponential cross entropy minimize the difference between the amount of information of original image and that of segmented image. First, exponential cross entropy is defined and the corresponding method of single threshold selection is derived. Then the method is extended to multilevel threshold selection. Furthermore, the niche chaotic mutation particle swarm optimization algorithm is adopted to find the optimal multi-thresholds. A large number of experimental results show that, compared with the method of multilevel threshold selection based on maximum Shannon entropy with particle swarm optimization (PSO), the segmented images of proposed method are more accurate and their visual effect is improved significantly.

Yufei Zhang, Yiquan Wu, Shihua Wu, Yu Song
Crack Width Detection of the Concrete Surfaced Based on Images

In order to detect the crack width of the concrete surface, we propose an algorithm of local rotation of images. Firstly, we calculate the normal direction of the given point in the crack to get the rotation angel. Secondly, we take a sub-image centering in the point, and rotate the sub-image around the point to make the crack in the sub-image changing to be vertical. Finally, the crack width is defined by the number of pixels on the line where the point is. By this algorithm, we can calculate the width of every cross-section on the entire crack, and the automation of the crack width detection will be come true. Based on this, we can also derive the crack length through the number of pixels on the crack (area) and the crack width. Theoretical analysis and numerical experiments show that this algorithm has high precision and good stability.

Wei Cai, Anguo Dong, Xianyan Zhang
Kinematics Analysis and Simulation of a 7-DOF Welding Robot Based on ADAMS and MATLAB

According to the structure and motion features of 7-DOF welding robots, as well as the D-H matrix theory, we used MATLAB software to obtain the end-position of the manipulator, and modeled the robot virtual prototype based on ADAMS. By setting up the corresponding simulation environment, we computed and analyzed the end-position and orientation curve of the manipulator. We also compared the results of MATLAB programming with ADAMS simulation, which finally verified the reasonableness of the mechanical design.

Zhixiang Yuan, Wanhui Zhu, Dianjun Wang, Wei Wang, Huiyi Zhang
Performance Comparison between P2P VoD with and without Network Coding

The use of random network coding has been reported in a real Peer-to-Peer Video-on-Demand (P2P VoD) system recently. While this demonstrates the practicality and effectiveness of network coding (NC) in one system implementation, the design space for different scheduling algorithms of P2P VoD using network coding has been hardly explored. In this paper, we extend our large-scale packet-level P2P VoD simulation platform based on PDNS to compare performance with and without NC. We adopt practical trace files from a popular P2P VoD company. In contrast to previous research, one surprising result from our extensive simulations is that P2P VoD using NC will increase the server load, though it can decrease the overhead of control messages.

Jiaqing Huang, Xiaobiao Zhang
Mining Social Behavior Ideas of Przewalski Horses

Literature introduces idea mining as an approach for extracting interesting ideas from textual information. Related research focuses on extracting technological ideas as starting point for future technological research and development activities. Thus, it is limited to the technological domain. The algorithms standing behind idea mining also are optimized for the technological domain.

In contrast to previous research, this work transfers idea mining to the social behavior domain by selecting and adapting parameters of the idea mining algorithm. Forward selection as main approach in stepwise regression is used to choose the predictive variables based on their statistical significance. Grid search is used to optimize the parameter values. A case study shows that these optimized idea mining parameters are successful in extracting social behavior ideas of animals in this case of Przewalski horses. Based on these findings, differences between technological ideas and social behavior ideas can be shown.

Dirk Thorleuchter, Sarah Herberz, Dirk Van den Poel
Music Category Based on Adaptive Mutation Particle Swarm Optimization BP Neural Network

To overcome the inadequacies of the traditional classification methods, an adaptive mutation particle swarm optimization BP neural network was introduced in the music category. Adaptive mutation particle swarm optimization algorithmhas the advantages of PSO and GM algorithm. Using the algorithm to find a better network weights and threshold can not only overcome the slow convergence of basic and easy to fall into local minimum limitations, but also has a high accuracy of the model. The simulation results show that the algorithm has higher accuracy than traditional classification methods, and verified adaptive mutation particle swarm optimization is an effective classification to optimize BP neural network.

Qingsheng Yu, Jianxi Peng
Design of a High Reliable SOC

Single event upsets (SEU) is a major concern in space-borne electric system, result in crashing of application programs and considerable economic losses. To satisfy with the requirements of future space computers, this paper designs a high reliable SOC: Longteng-FT-SOC, which is based on a SPARC V8 compatible microprocessor. Several high reliable schemes such as direct error correction pipeline, a reliable cache controller based on grouped checking and an automatic recovery memory controller, are proposed. The experimental results preliminarily show that the Longteng-FT-SOC we designed is reliable and can tolerate SEU up to 300 Krads (Si).

Danghui Wang, Jiakai Feng, Mingrui Xin, Jianfeng An
A Formal Description Method for Service Network Topology and the Application in E-Government Maintenance Management

This paper proposes a kind of formal description method for service network topology structure, which define a relationship among business, IT services and ICT components (Information Communication Technology), and then formalize the description of ICT path. This method can effectively achieve service network availability and service risk quantification.

Peng Chen, Yue Lin
Automated Offline Programming for Robotic Welding System with High Degree of Freedoms

Although robotics based flexible automation is an intriguing prospect for small to median enterprises in the era of the global competition, the complexity of programming remains one of the major hurdles limiting its applications. This paper presents an automated offline programming (AOLP) method to address this issue. AOLP is software that automatically plans and programs for a robotic welding system with high Degree of Freedoms (DOFs). It takes CAD model as input, and is able to generate the complete robotic welding code without any further programming effort.

Zengxi Pan, Joseph Polden, Nathan Larkin, Stephen van Duin, John Norrish
Genetic Algorithm Based Spectrum Allocation for Cognitive Radio Networks

Cognitive Radio provides an effective approach to improve the spectrum utilization. Spectrum allocation for cognitive radio networks is a multi-objective and interference-constraint optimization problem. This paper mainly discussed spectrum allocation performances based on genetic algorithm for cognitive networks and a Max-Overall-Performance algorithm is proposed, which best result of allocation is achieved with target of maximizing system’s overall performance. The simulation results show that the proposed MOP algorithm unifies system’s sum bandwidth reward and cognitive users’ access fairness.

Kai Wen, Lingsheng Fu, Xuesong Li
Random Access Preamble Assignment Algorithm of TD-LTE

Random access is the necessary process in the establishment wireless link between the UE and the network, the performance of the random access directly affects the performance the network. According to the analysis of the random access process and the disadvantage of current random access preamble choice and assignment plan of TD-LTE system, this article proposed one kind of preamble assignment algorithm which is based on the users’ priority and the user load situation of Base Station. This algorithm increases a preamble part which is based on priority of users, all the preambles are divided into three cases and different cases will trigger according to different user load threshold. This preamble assignment plan compensates the disadvantage of traditional preamble assignment plan; and the simulation result indicates that this algorithm can raise the access success ratio in different situation of user load.

Nan Hu, Xiao-lin Li, Qian-nan Ren
Scalable Spectral Clustering Combined with Adjacencies Merging for Image Segmentation

A novel scalable graph partitioning framework has been proposed in this paper. The scalable graph partitioning is new thought to deal with the large scale images, which improves the efficiency greatly and maintains the major local details. It involves two levels clustering, namely blockwise and segment, to achieve the excellent performance. In this paper, spectral clustering has been implemented twice combined with the morphologic adjacencies separating and merging algorithm to obtain the final segmentation results. Experimental results show that it keeps fine details and removes the noise pixels generated by spectral clustering.

Li You, Shilin Zhou, Gui Gao, Meng Leng
Realization of Link-Level Simulation Platform of TD-LTE Based on Matlab

The Link-level performance of the TD-LTE needs to be evaluated in link-level simulation. Based on the requirement of 3GPP specifications for link-level simulation, a link-level simulation frame and flow are presented, and with the application of various system level simulation models and methods, a link-level simulation platform of TD-LTE based on Matlab is constructed. Finally, in different SNR conditions, the link bit error rate and cell throughput of the link are evaluated and analyzed. This simulation platform plays a guiding role in the establishment of the TD-LTE system level simulation platform, and provides relevant data for it.

Kai Wen, Yingbo Su, Yu Jin, Peng Zhan
Database Construction of Soybean Biology

Based on database model approach of relational model, integrated application of data warehousing, data mining and heterogeneous database integration, integrated application of data warehousing, data mining and integration of heterogeneous databases, to build databases of the soybean cultivation intelligent decision support system. Get massive soybean diseases, insects and weeds data by data collection, analysis the characteristic of them by data mining technology, and tap the potential link between them, to help the integrated control of soybean diseases, insects and weeds.

Gui-fang Jiang, Nan Zhong
Performance Evaluation on Smart Antenna of LTE Uplink

To meet the uplink performance requirements of improving spectrum efficiency and increasing the system capacity, inter-cell interference have must been mitigated effectively. This contribution described inter-cell interference mitigation with smart antenna based on user equipments (UE). And it discussed and compared smart antenna and omni antenna in LTE, focusing on the different of interference position, the ratios of inter-cell interference degradation and the system capacity. The analysis shows that inter-cell interference can degrade at least 66% and the system capacity should increase multiple times with the angle half the width of beam-forming from 30 to 100 degree. The more the UE which use the same frequency or PRB, the spectral efficiency will be reduced with the smart antenna’s angle unchanged.

Xiao-lin Li, Bo Yuan, Ying-bo Su
Multiuser MIMO User Selection Schemes Using Block Diagonalization

Block diagonalization (BD) is a classical and practical interference cancelation precoding algorithm in MU-MIMO system. But once BD is used, the user number can be supported simultaneously by the base station is limited by the ratio of the numbers of transmit and receive antennas. In this paper, some existed lower complexity user selected schemes are discussed. These schemes are all based on capacity as the performance measure. However, there is an inherent drawback in these algorithms. Since the BS always selected the same users based on capacity or the correlation of the users in each time slot, it may not guarantee the quality-of-service of a single user. In order to ensure fairness in some systems, we improve the existed algorithms and propose the round-robin user selection algorithms.

Zhang Chunfang, Yang Long-xiang, Ding Meiling, Wu Zhihua
An Adaptive Method of CAVLC Scanning Based on Hardware

It is well known that a conventional zig-zag scanning method usually have to handle all quantized transform coefficients one by one in inverse order. It takes 16 cycles at least to scan a 4x4 pixel block without considering any way of parallelism, since we must scan all pixels of the current block based on hardware. Obviously, that method restricts the enhancement of CAVLC encoder throughout seriously. CAVLC scan phase has always become the bottleneck in CAVLC encoding process. By analyzing the static features of quantified residual coefficients, an improved method was proposed to achieve zig-zag scan without handling all pixels. According to the distribution of different coefficients in a block., the proposed method scan every block in forward sequence and it costs few cycles since we count non-zero coefficients only. In addition, to further get better performance, we reorder and scan the block while reading residual coefficients. The experiments results show that the new method can reduce about 60% cycles cost in scanning phrase at the same hardware consumption.

Bao-chuan Li, Yu-kun Song, Duo-li Zhang, Gao-ming Du
The Research and Design of Cloud Computing Security Framework

As a new technique, cloud computing has a rapid development in recent years. However, the security problems have caused great influences to the development and popularization of cloud computing, the importance and urgency has not to be ignored. This paper introduces cloud computing and security situation, studies the main security problems of cloud computing, and comes up with a cloud computing security framework which can effectively solve these security problems, and points out that only to solve the security problems, cloud computing can unceasingly expanded, and the application will be more and more widely.

Xiaowei Yan, Xiaosong Zhang, Ting Chen, Hongtian Zhao, Xiaoshan Li
A Modified GBVS Method with Entropy for Extracting Bottom-Up Attention Information

A bottom-up visual attention extraction method is presented in the paper. Based on experiments, we have found that the original Graph-Based Visual Saliency (GBVS) method proposed by Itti had not taken signal complexity into consideration, which just can be measured with entropy. Thus, a modified attention model which combines GBVS and entropy measurement has been provided in the paper. What’s more, some experiments are also given which indicates the effect on extracting bottom-up attention information with the modified model.

Jiuyu Sun, Ruofan Chen, Jun He
Three-Level Storage Structure of Reference Pixels of H.264 Intra Prediction

Intra prediction of H.264 encoder is to reduce spatial redundancy of image compression code. Intra prediction has up to 17 prediction modes, different modes have different ways to read reference pixel and to store. With so many prediction modes, how to deal with memory and how to read of reference pixels becomes more important. To reduce cycles of intra prediction, this paper employs an optimized hardware architecture, making intra 4×4 prediction and intra 16×16 prediction in parallel, and changes the order of intra 4×4 prediction. In this paper, a three-level storage structure of reference pixels is proposed, which saves storage resource and reduces access time. It takes at most 496 cycles to finish intra prediction of a MB in this paper and the execution time is reduced by 29.5%.

Yong Zheng, Yu-kun Song, Duo-li Zhang, Gao-ming Du, La-gou Wu
Four-Band Metal Frame Antenna for Handy Terminals

A novel four-band metal frame antenna for 3G smart phone is proposed in this paper. The proposed antenna is much friendly to inner devices and suitable to be integrated with the supporting metal frame for the display of the smart phone. Moreover, the proposed antenna can provide two parts of impedance bandwidths of 900MHz (890MHz~1080MHz) and 1080MHz (1640MHz~2720MHz), making it easily cover the 2/3G frequent bandwidth (890MHz~960MHz and 1710MHz~ 2170MHz). The proposed antenna is studied in detail in this study, experimental and simulation results are presented also. The results were simulated by CST MICROWAVE STUDIO and measured by chamber.

Wei Wang, Gang Yan
Cloud Computing Based Software Testing Framework Design and Implementation

Cloud computing is profound changing the whole IT industry, and lead traditional software testing to a new direction. In this paper, aiming at the existing framework of cloud computing, we analyze the advantages and disadvantages of existing methods of software testing, then designs a cloud computing based software Testing framework, and have implemented a prototype. The experiments prove that the efficiency of the cloud computing based software testing is greatly improved.

Weiwei Wang, Xiaosong Zhang, Ting Chen, Xueyang Wu, Xiaoshan Li
The Study of Customer Relationship Management of Commercial Bank Based on Customer Lifetime Value

Customer is the foundation of the survival and development of commercial banks. This forces domestic commercial banks need to establish a perfect customer value analysis and evaluation system to enhance the customer value analysis. This article establishes a scientific and reasonable evaluation system of corporate client lifetime value of commercial banks on the basis of previous research. Then we get a scientific structural equation model of customer lifetime value by using the analysis of software SPSS13.0 and AMOS17.0. The structural equation model of customer lifetime value enrich the field of customer lifetime value and provide basis for customer relationship management and customer classification of commercial banks. It makes the commercial bank’s customer relationship management more scientific and reasonable.

Xiaohua Song, Lingqing Chen
Backmatter
Metadata
Title
Advances in Computer, Communication, Control and Automation
Editor
Yanwen Wu
Copyright Year
2012
Publisher
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-25541-0
Print ISBN
978-3-642-25540-3
DOI
https://doi.org/10.1007/978-3-642-25541-0