Skip to main content

Über dieses Buch

The latest inventions in computer technology influence most of human daily activities. In the near future, there is tendency that all of aspect of human life will be dependent on computer applications. In manufacturing, robotics and automation have become vital for high quality products. In education, the model of teaching and learning is focusing more on electronic media than traditional ones. Issues related to energy savings and environment is becoming critical.

Computational Science should enhance the quality of human life, not only solve their problems. Computational Science should help humans to make wise decisions by presenting choices and their possible consequences. Computational Science should help us make sense of observations, understand natural language, plan and reason with extensive background knowledge. Intelligence with wisdom is perhaps an ultimate goal for human-oriented science.

This book is a compilation of some recent research findings in computer application and computational science. This book provides state-of-the-art accounts in Computer Control and Robotics, Computers in Education and Learning Technologies, Computer Networks and Data Communications, Data Mining and Data Engineering, Energy and Power Systems, Intelligent Systems and Autonomous Agents, Internet and Web Systems, Scientific Computing and Modeling, Signal, Image and Multimedia Processing, and Software Engineering.



A Novel Approach for Extracting Nociceptive-Related Time-Frequency Features in Event-Related Potentials

In the present study, we are mainly objective to develop a novel approach to extract nociceptive-related features in the time-frequency domain from the event-related potentials (ERPs) that were recorded using high-density EEG. First, the independent component analysis (ICA) was used to separate single-trial ERPs into a set of independent components (ICs), which were then clustered into three groups (symmetrically distributed ICs, non-symmetrically distributed ICs, and noise-related ICs). Second, the time-frequency distributions of each clustered group were calculated using continuous wavelet transform (CWT). Third, the principal component analysis (PCA) with varimax rotation was used to extract time-frequency features from all single-trial time-frequency distributions across all channels. Altogether, the developed approach would help effectively extracting nociceptive-related time-frequency features, thus yielding to an important contribution to the study of nociceptive-specific neural activities.

Li Hu, Weiwei Peng, Yong Hu

Numerical Simulation of Turbulent Flow through a Francis Turbine Runner

Three-dimensional turbulent viscous flow analyses for a Francis turbine runner are performed by solving Reynolds averaged Navier-Stokes equations closed with the realizable k-


turbulence model. The discretization is carried out by the finite element method based FVM on a patched block-structured grid system. The boundary conditions for the turbulent properties are treated with a particular attention. In a new research view, CFX-TASCflow software are used to calculate the 3D unsteady turbulent flow in a model Francis turbine runner and to simulate the 3D turbulent flow field in it. The results at the design operating condition are presented in this paper. They show that the flow field structures and the characteristics of swirling flow and its developing process in the Francis turbine can be well predicted. It can be concluded that the results are able to provide important guidance for the hydraulic design of a Francis turbine or its optimization.

Hu Ying, Hu Ji

Learning Is a Team Sport ... Analysis of a Model for Interactions in Computer Science Education

This paper introduces Computer Science students’ need to learn team interaction skills. A model that emphasizes the importance of structuring team interactions for effectiveness in Computer Science education by ensuring that key variables are present, is then offered. Findings regarding an analysis of this model in terms of positive interdependence, individual accountability, interpersonal and small-team skills, promotive interaction and team processing is further detailed. This is done by indicating to what extent, and how, educators ensured that the key variables were implemented. The paper finally offers conclusions, including a summary and an indication of the importance of this research.

Leila Goosen

Static Power Optimization for Homogeneous Multiple GPUs Based on Task Partition

Recently, GPU has been widely used in High Performance Computing (HPC). In order to improve computational performance, several GPUs are integrated into one computer node in practical system. However, power consumption of GPUs is very high and becomes as bottleneck to its further development. In doing so, optimizing power consumption have been draw broad attention in the research area and industry community. In this paper, we present an energy optimization model considering performance constraint for homogeneous multi-GPUs, and propose a performance prediction model when task partitioning policy is specified. Experiment results validate that the model can accurately predict the execution of program for single or multiple GPUs, and thus reduce static power consumption by the guide of task partition.

Yisong Lin, Tao Tang, Guibin Wang

A Dynamic Structure of Counting Bloom Filter

Counting Bloom Filter based on the counter-array structure has the shortcoming of counter overflow and less space-efficient. To address these shortcomings, we propose a dynamic structure for Counting Bloom Filter which dynamically changes the counter size according to the number of inserted elements. Hence it not only makes a better use of memory space but also eliminates counter overflow. We put up with the methods of addition and subtraction bit by bit while inserting and deleting elements to effectively reduce the times of memory access. In this way, an effective tradeoff can be achieved between counter access speed and space efficiency. Besides, to reduce excessive memory allocation/deallocation cost caused by consecutively changing counter size, we propose a configurable delayed shrinking algorithm which can appropriately delay the counter size shrinking based on user’s configuration. The experiment results show that our dynamic structure could meet the needs of most application scenarios.

Jianhua Gu, Xingshe Zhou

Draft Line Detection Based on Image Processing for Ship Draft Survey

Draft line detection is the first and significant step for ship draft survey, usually determined by visual observation manually. In order to overcome the man-made error, an automated draft line detection method based on image process is proposed in this paper. Firstly, the image containing draft line is obtained and preprocessed, then the contours including draft line are extracted from the image by Canny edge detection algorithm, finally the draft line is detected by Hough transform. The experimental results show that the proposed method is effective to detect the draft line and helpful to improve the accuracy of ship survey.

Xin Ran, Chaojian Shi, Jinbiao Chen, Shijun Ying, Keping Guan

High Throughput Computing Application to Transport Modeling

Optimization of road space allocation (RSA) from a network perspective is computationally challenging. Analogues to the Network Design Problem (NDP), RSA can be classified as a NP-hard problem. In large scale networks when the number of alternatives increases exponentially, there is a need for an efficient method to reduce the number of alternatives as well as a computational approach to reduce the computer execution time of the analysis. A heuristic algorithm based on Genetic Algorithm (GA) is proposed to efficiently select Transit Priority Alternatives (TPAs). In order to reduce the execution time, the GA is modified to implement two parallel processing techniques: A High Performance Computing (HPC) technique using Multi-threading (MT) and a High Throughput Computing (HTC) technique. The advantages and limitations of the MT and HTC techniques are discussed. Moreover, the proposed framework allows for a TPA to be analyzed by a commercial package which is a significant provision for large scale networks in practice.

Mahmoud Mesbah, Majid Sarvi, Jefferson Tan, Fateme Karimirad

Towards an Organic PLM Approach Providing a Semantic Engineering Desktop

The paper describes research efforts to address three core problems of the complete process of bringing a new product or service to market from an IT perspective and especially focusing on Product Lifecycle Management systems (PLMS). Today’s major challenges are the support of globally distributed and multi-disciplinary teams, complexity, and enterprise knowledge management. Essential building block is the use of semantic web technologies for IT systems integration and also for semantic enrichment of data. The aim is to give a strategic view of usage and integration of supportive technologies and tools. This contribution introduces an approach to future IT working environment for engineers in the sense of a “Semantic Engineering Desktop” and answers the question how mashup technologies can contribute to more individual and flexible engineering application integration and knowledge management without losing data and process security.

Detlef Gerhard

Parameterized Path Based Randomized Oblivious Minimal Path Routing with Fault Tolerance in 2D Mesh Network on Chip

Fault tolerance has become one of the major concerns in routers or links as the transistor feature size is shrinking leading to gate scaling in Network on Chip (NoC). More number of processing elements (PE) are being incorporated for interconnection in system on chip, making it difficult to deliver packets to the destination. Overcome from permanent fault can be achieved using efficient routing algorithms whereas retransmission of faulty packet resolve transient faults in the network. Routing would be efficient, if it can handle multiple faults in the path while managing congestion in the network. In this paper a path based randomized oblivious minimal routing algorithm (FTPROM) with fault tolerance is proposed. FTPROM is derived from parameterized PROM is an oblivious routing. It uses probability functions to provide more diversity to route in the network and handles congestion in better way. Routing follows minimal path in presence of faults both as node and link failure. Simulation results show that the proposed algorithm is effective in terms of congestion handling, latency, and degree of adaptiveness.

Mushtaq Ahmed, Vijay Laxmi, M. S. Gaur, Yogesh Meena

Radiation Study of SEE in ASIC Fabricated in 0.18μm Technology

The research on the radiation effects of ASIC has been the hot point in the field of the international aerospace devices. This paper developed a test system for the single event effects (SEEs), which was applied to test the radiation effects of some domestic ASIC chips. Based on the result, SEEs under different work conditions: high temperature, normal temperature, low voltage, normal voltage were analyzed. Thus the voltage and temperature effects on SEE can be studied. The test showed that the increasing temperature and decreasing voltage could affect SEEs, meanwhile the sensibility of the ASIC circuit to SEE will be enhanced. The high temperature and low voltage is the worst work condition to the ASIC circuit, and there is no latch-up on the work condition of high temperature and high voltage.

Pan Dong, Long Fan, Suge Yue, Hongchao Zheng, Shougang Du

Optimal Task Scheduling Algorithm for Parallel Processing

This paper proposes an optimal task scheduling algorithm for parallel processing. The scheduling problem is formulated as a 0-1 integer problem, where a priority of processing is represented by constraints of the problem. A numerical example shows the effectiveness of the proposing scheduling.

Hiroki Shioda, Katsumi Konishi, Seiichi Shin

Null Convention Logic Circuits Using Balanced Ternary on SOI

We propose and analyze novel Ternary logic circuits targeting an asynchronous Null Convention Logic (NCL) pipeline where the Null value (i.e. Data not valid) is used to make the pipeline self-synchronizing and delay insensitive. A balanced Ternary logic system is used, in which the logic set {High Data, Null, Low Data} maps to voltage levels {+V


, 0V, -V


}. Low power circuits such as Ternary to Binary converter, DATA/NULL Detector and Ternary Register are described based a 45nm SOI process technology that offers multiple simultaneous transistor thresholds.

Sameh Andrawes, Paul Beckett

Application of Computer Capacity to Evaluation of Intel x86 Processors

Computer capacity was recently suggested as a new theoretical metric for computer performance evaluation. To show the benefits of this approach, we determine the capacities of well-known processors of Intel x86 family and compare the results to the metrics obtained from some available benchmarks. We show that our theoretical evaluation of computer performance conforms well to that given by the benchmarks.

Andrey Fionov, Yury Polyakov, Boris Ryabko

Channel Height Estimation for VLSI Design

Given an instance of channel routing problem (CRP) in VLSI design, the number of tracks used in a solution for the instance is called the channel height of the solution. The objective of CRP is to minimize the channel heights, that is, to find a solution with minimum channel height. In an instance of CRP, HCG and VCG denote the horizontal and vertical constraint graphs, respectively. Let GM be the graph obtained from HCG by adding edges whose ends are connected by a directed path in VCG. Pal et al. first gave lower bounds on the channel heights in terms of the clique number of GM, and presented algorithms to find such lower bounds. In this paper, we find some interesting theoretic properties, about the structure of the cliques in GM, which can be used to improve Pal’s algorithms. So far, little is known about upper bounds on the channel heights. We find that CRP can be translated into an orientation problem on HCG with arcs in VCG oriented and keeping directed acyclic, and it is also proved that the channel height is determined by the longest directed path in the orientation. Moreover,we show that a lemma on the lower bound in [2] is incorrect and thus another lemma is given to modify it.

Yuannian Liu

High Speed BCD Adder

In recent trends managing, using and processing a high volume of data has become part of real time computation. As the importance of decimal arithmetic is growing in all financial, internet-based and commercial applications, more attention has to be paid for fast decimal data processing. Despite the widespread use of binary arithmetic, decimal computation remains essential for many applications, Decimal numbers are not only required whenever numbers are presented for human inspection, but also often used when fractions are involved. In this paper new design of high speed Binary Coded Decimal (BCD) addition is discussed.

C. Sundaresan, C. V. S. Chaitanya, P. R. Venkateswaran, Somashekara Bhat, J. Mohan Kumar

Research on Handover Algorithm for LEO Satellite Network

Low Earth Orbit (LEO) satellite networks are playing an important role in current global mobile communications. An optimized handover scheme can greatly improve performance in respect of end-to-end communication delay and link bandwidth utilization of LEO satellite networks. Various handover schemes in LEO satellite networks are researched in this paper. Ground-satellite link handover and recomputing routes problem is analyzed in detail. Then, a link handover algorithm for LEO satellite mobile communication network is proposed. Simulation results show that the satellite link handover algorithm proposed has less end-to-end delay, and is more stable and customizable.

Ye XiaoGuo, Wang RuChuan, Sun LiJuan

Mobility Support in IPv4/v6 Network

IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a solution to Mobile IPv4/v6 problems. In the solution, a gateway called Mobile IPv4/v6 translation gateway (MIPv4/v6-TG) is introduced to bridge between IPv4 network and IPv6 network, which is made up of a traditional NAT-PT gateway and a Mobile IP application level gateway (MIP-ALG) built upon the NAT-PT gateway. MIP-ALG maintains MIP table, a data structure, which is formed by entries. We use the MIP table to realize the communication between the IPv4 entities and the IPv6 entities. The creation, usage and update processes of MIP table are described in this paper. Through the experiment we find that the MIPv4/v6-TG can realize the basic communication in IPv4/v6 mixed network. The measurement of performance test proves the solution’s efficiency. And it can work compatibly with RFC3344 and RFC3775.

Zheng Xiang, Zhengming Ma

Finding Security Vulnerabilities in Java Web Applications with Test Generation and Dynamic Taint Analysis

This paper investigates how to combine techniques of static and dynamic analysis for finding security vulnerabilities in Java web applications. We present a hybrid analyzer that employs test case generation and dynamic taint analysis to achieve the goal of no false negatives and reduced false positives.

Yu-Yu Huang, Kung Chen, Shang-Lung Chiang

A Scalable Distributed Multimedia Service Management Architecture Using XMPP

In this paper, we propose a scalable distributed multimedia service management architecture using XMPP. We first study the XMPP and investigate the limitations of related multimedia service management models. Then we describe the scalable distributed multimedia service management architecture in detail along with a video conferencing system case using this model. The performance simulation results show that the proposed distributed multimedia service management architecture achieves great scalability.

Xianli Jin

Sensor-Level Real-Time Support for XBee-Based Wireless Communication

The ZigBee standard is focused on low-cost, low-power, wireless mesh networking, having a wide applicability mainly in the field of wireless sensor networks. A growing number of such applications require real-time behavior, both at the wireless communication and at the sensor levels. This paper proposes a solution to the problem of providing sensor-level real-time support for wireless platforms using ZigBee-based devices such as the XBee module. The discussion of the experimental results proves the predictable behavior of the XBee sensor platform used as a case study.

Mihai V. Micea, Valentin Stangaciu, Cristina Stangaciu, Constantin Filote

An Ontology Based Personalizing Search Measure with the Protection of Original Engine Integrity

IR techniques are widely used to locate surfers’ interesting information resource on the Web. Every IR engine has its immanent advantage, while user’s retrieval hobby is also diverse. Thus, to satisfy individual, personalizing search becomes more and more popular. But, regardless of familiar environment for users, exist personalizing search measures just present a mixed result list from different engines. The combination destroys the integrity of original IR engine and pilot user to a strange interface. Aim to overcome the outstanding shortcoming, this paper presents an Ontology based personalizing search measure, which builds user profile and offers not a rigid combination result but the most appropriate engine with respect to query, so that the original engine integrity is protected. Some primary experiments illustrate that the measure is feasible and valuable.

Xiao-dong Wang, Qiang (Patrick) Qiang

A Study on QoS Routing Scheme for Tactical Ad-Hoc Network

Recently developments in the field of telecommunications and network technology has been formed new paradigm shift in defense weapon system. The military also developing the Tactical Information Communication Network (TICN) system to meet the changing aspects of these wars. To equip its function from the battlefield, TICN system have to be received real-time information from the battlefield troop, and the key technologies that support these features is MANET (Mobile Ad-hoc Network) routing protocol. In this paper, basis on the tactical environment of small combat units, by studying on the MANET routing protocol that can be transmitted in real time & reliable information, suggest efficient routing protocol in tactical MANET that can be applicable to advanced digital battlefield.

Taehun Kang, Jaiyong Lee

Business Process Execution Based on Map Reduce Architecture

Map Reduce is a programming model and software framework for writing applications that rapidly process vast amounts of data in parallel on large clusters of compute nodes. Users define a map function with key/value parameters to generate a set of intermediate key/value pairs and a reduce function that merges all intermediate values associated with the same intermediate key. At the same time, the business process execution of web services has the same context with map reduce. It can be integrated with map reduce which will be the basic infrastructure. Business process is automatically parallelized and executed on a large cluster of web services. This paper takes care of the details of partitioning the input data, definite map function, compare function, reduce function and analysis functions. On the other hand, map reduce functions are also responsible to realize statistical analysis to provide services’ QoS data. We can finally know that this model can improve efficiency and is easy to realize the dynamic replacement of web services based on the generated QoS data.

Chenni Wu, Wei Zhang

Developing Village Knowledge Sharing Capability in Supporting E-Village at Cipadu Village, Tangerang Region

Computer Network and Communication are tools, which is an indispensable in business life, since it will characterize economic competitiveness. This paper presents a study on knowledge sharing in groupware in the form of e-village web based communication. The development of a prototype of e-village will be discussed in order to support the national e-village. The Cipadu village, Larangan sub-district in Tangerang Region, Banten Province, Indonesia has been chosen as a pilot project because of its potential and resources. By developing e-village web-based communication, the knowledge holders and knowledge seekers, starting from e-village level, can communicate each other. This communication group will create new knowledge. The e-village knowledge management web application of Cipadu will support the web-based communication in storing, distributing, and accessing knowledge from other village or agencies. This paper proposes the development of Cipadu e-village which is knowledge management based for sharing knowledge. It is a hope that the communication on knowledge is in the form of web-based communication and in action becomes a knowledge sharing culzopture of this village.

Dian Anubhakti, Basuki Hari Prasetyo, Teddy Mantoro, Nazir Harjanto

A State Oriented Buffer Control Mechanism for the Priority-Based Congestion Control Algorithm in WSNs

In the multiple-event WSNs, each event has different importance and most of the congestions are caused by the burst events with high importance. Therefore, the priority-based congestion control algorithm is required to WSNs. Most of the existing algorithms to control the congestions of the WSNs do not consider the priorities of the events. In addition, the existing algorithms rely on the rate control of source nodes using the backpressure mechanism but it is not efficient for the dynamic applications (ex. Tracking application). Therefore, we proposed a new algorithm that uses the queue state management and duty-cycle adjustment. This new algorithm tries to prevent the congestion previously and adjusts the duty-cycle to guarantee the reliability of the important events. The simulation results show that the proposed algorithm performs better than the existing algorithm in both of the static case and dynamic case.

Jeongseok On, Yoonpil Sung, Jaiyong Lee

Survey on P2P Traffic Managements

P2P applications have become more and more popular in the Internet. They have consumed most of the Internet bandwidth, and affected the performance of traditional Internet applications. Many researchers proposed various technologies to manage P2P traffic, such as P2P traffic control, P2P caching technologies. This paper introduced P2P technology and the factors that affecting P2P traffic distribution, and then surveyed the research efforts on P2P traffic management technologies.

Yingru Luo

Solution of Collision Caused by Unidirectional Link in MANET on the Navy Ships

With the development of information and communication technology the future battlefield will be grow multidimensional integration war based on Network Centric Warfare(NCW). In this paper, to conducting NCW, reliable data transfer methods were studied through the resolution of collision caused by unidirectional link in MANET on Navy ship. In the proposed method, CTS is transfered one more hop by first CTS received nodes through in a way to transfer PCTS for near nodes. In addition, proposed method occurs a little overhead, but that speed loss level can be acceptable because the number of hops is limited by characteristic of Navy ship.

Jungseung Lee, Jaiyong Lee

Fast and Memory Efficient Conflict Detection for Multidimensional Packet Filters

Packet classification plays an important role in supporting advanced network services such as Virtual Private Networks (VPNs), quality-of-service (QoS), and policy-based routing. Routers classify incoming packets into different categories according to pre-defined rules, which are called packet filters. If two or more filters overlap, a conflict may occur and leads to ambiguity in packet classification. In this paper, we propose an algorithm which can efficiently detect and resolve filter conflicts. The proposed algorithm can handle filters with more than two fields, which is more general than algorithms designed for two-dimensional filters.We use the synthetic filter databases generated by ClassBench to evaluate the proposed algorithm. Compared with the bit-vector algorithm, simulation results show that the proposed algorithm can reduce the detection times by over 84% for 10 out of 12 filter databases, and only uses less than 26% of memory space.

Chun-Liang Lee, Guan-Yu Lin, Yaw-Chung Chen

Hierarchical Codes in Bandwidth-Limited Distributed Storage Systems

Distributed storage systems store data on the “unreliable” network peers that can leave the system at any moment and their network bandwidth is limited. In this case, the only way to assure reliability of the data is to add redundancy using either replication or erasure codes. As a generalization of replication, erasure codes require less storage space with the same reliability as replication. Recently, a near-optimal erasure code named Hierarchical Codes, has been proposed that can significantly reduce the repair traffic by reducing the number of nodes participating in repair, which is referred to as repair degree


. To overcome the complexity of


and efficiently control the reliability of Hierarchical Codes, we refine two concepts called




, then we propose an integrated maintenance scheme, which allow us to tune the code construction.

Zhen Huang, Lixia Liu, Yuxing Peng, Shoufu Xue

Middleware-Based Distributed Data Acquisition and Control in Smart Home Networks

For each of the networking techniques widely adopted in the field of home appliance control has its strength and weakness, it is more desirable to use multiple network technologies at the same time. Multi-platform smart home system would be an objective existence. In general point to point method, with the increasing of underlying hardware units and upper applications, the complexity of the central control unit will increase linearly. By using a universal home control middleware adapter, we decouple the application layer from the hardware layer, and make it possible to enable distributed data acquisition and control in a multi-platform smart home system. Many validated methods efficient to implement distributed data acquisition and control are discussed under this architecture, like using a timer or special thread with the unified API of the middleware adapter, redefinition callback or delegation functions for one type of the application interface, or using middleware integrated database to directly save the collected data. For each of these discussed methods, higher quality and usability both of devices and user interfaces, higher performance, lower production costs and loose-coupled hardware networks of different technologies are concerned.

Yaohui Wu, Pengfei Shao

Improving the Efficiency and Accuracy of SIFT Image Matching

Developing an accurate mechanism of correspondence and increasing matching stability are crucial tasks in many computer vision applications. This work improves the accuracy and efficiency in image matching via a novel method. The Modifiable Area Harmony Dominating Rectification (MHDR) method is proposed to eliminate mismatched key-point couples automatically and protect matching couples. The matching performance of the proposed scheme was evaluated on a test image database and via the transformation of the shearing effect and thin-plate splines. Compared with other methods, including the Exhaustive Search, Best Bin Search, and Sliding Midpoint Splitting, the proposed method had promising results in improving the accuracy and efficiency of the SIFT image matching.

Daw-Tung Lin, Chin-Hui Hsu

Morphological Characteristics of Cervical Cells for Cervical Cancer Diagnosis

This paper investigates cervical cancer diagnosis based on the morphological characteristics of cervical cells. The developed algorithms cover several steps: pre-processing, image segmentation, nuclei and cytoplasm detection, feature calculation, and classification. The K-means clustering algorithm based on colour segmentation is used to segment cervical biopsy images into five regions: background, nuclei, red blood cell, stroma and cytoplasm. The morphological characteristics of cervical cells are used for feature extraction of cervical histopathology images. The cervical histopathology images are classified using four well known discriminatory features: 1) the ratio of nuclei to cytoplasm, 2) the diameter of nuclei, 3) the shape factor and 4) the compactness of nuclei. Finally, the images are analysed and classified into appropriate classes. This method is utilised to classify the cervical biopsy images into normal, pre-cancer (Cervical Intraepithelial Neoplasia (CIN)1, CIN2, CIN3) and malignant.

Rahmadwati, Golshah Naghdy, Montse Ros, Catherine Todd

A Study on a Method of Effective Memory Utilization on GPU Applied for Neighboring Filter on Image Processing

In this paper, the methods of implementing neighboring filters on newly supplied Graphics Processing Unit (GPU) are described. In general, neighboring filters are always utilized in image processing. Mainly in consideration of memory accesses, four methods implementing neighboring filtering are proposed and compared. The experimental result shows that one of the proposed methods (called “4X-block”) at the block size of 16 is the fastest among them, when loading and processing data in shared memory in GPU. It is also shown that this method is about 1.45X faster than the basic method implemented on GPU.

Yoshio Yanagihara, Yuki Minamiura

A New Design for Digital Audio Effect of Flange Based on Subband Decomposition

Traditional flange processing is carried out only from the time domain. The frequency characteristics of audio signals is not considered. This paper presents a new time-frequency processing scheme for flange effect, which is based on subband decomposition. An audio signal is broken down into several bands of low, middle, and high frequencies to be flanged separately. In each frequency band, the flanging parameters are selected according to the characteristics of the signal in that band. Theoretical analysis and experimental results show that the new flange processing system fits the human hearing sense and improves the effect of flange processing effectively.

Jianping Chen, Xiaodong Ji, JianliSn Qiu, Tianyi Chen

A Robust Algorithm for Arabic Video Text Detection

In this paper, we propose an efficient Arabic text detection method based on the Laplacian operator in the frequency domain. The zero crossing value is computed for each pixel in the Laplacian-filtered image to found edges in four directions. K-means is then used to classify all the pixels of the filtered image into two clusters: text and non-text. For each candidate text region, the corresponding region in the canny edge map of the input image undergoes projection profile analysis to determine the boundary of the text blocks. Finally, we employ empirical rules to eliminate false positives based on geometrical properties. Experimental results show that the proposed algorithm is able to detect texts of different fonts, contrasts and backgrounds. Moreover, it outperforms four existing algorithms in terms of detection and false positive rates.

Ashraf M. A. Ahmad, Ahlam Alqutami, Jalal Atoum

Detection of Lip Area and Smile Analysis for Self Smile Training

In this study, we propose an automated smile analysis system for self smile training. The proposed system detects face area from the input image with the AdaBoost algorithm. It then identifies facial features based on the face shape model generated by using ASM(Active Shape Model). Once facial features of the face are identified, the lip line and teeth area necessary for smile analysis are detected. An analysis of the lip line and individual teeth areas allows for an automated analysis of smiling degree of users, enabling users to check their smiling degree on a real time basis. The developed system exhibited an average error of 0.7 compared to previous smile analysis results released by dental clinics for smile training, and it is expected to be used directly by users for smile training.

Won-Chang Song, Sun-Kyung Kang, Jin-Keun Dong, Sung-Tae Jung

Algorithm for the Vertex-Distinguishing Total Coloring of Complete Graph

A new algorithm whose name is algorithm of classified order coloring is proposed on the base of the characteristics of the vertex-distinguishing total coloring of complete graph in this paper. All of its elements are classified according to some rules and then are colored in proper sequence. Moreover, a relate-lock-table is presented to judge whether the results are correct. The experimental results show that the algorithm can effectively solve the vertex-distinguishing total coloring of complete graph.

Li Jingwen, Xu Xiaoqing, Yan Guanghui

A Comparison of Local Linear Feature Extraction

A number of studies have been carried out on the passive ranging method based on the monocular imaging features to non-cooperative target. This paper deals with target ranging estimation system focus on image linear feature. The ranging system implements target ranging by means of adjacent image matching method to extract target feature points, then obtain target rotational invariant linear feature, and combined target azimuth and pitching relative to camera when image is taken with camera space coordinate, the target distance to image pickup system is gained by solving the certain target ranging equation. As for target linear feature extraction, the paper applies three algorithms of the sub-pixel Harris corners method, the Simplified Scale Invariant Feature Transform (SSIFT) method and Speeded Up Robust features (SURF) method to extract linear feature and makes an analysis to ranging performance. It implied by our experiment that the SURF algorithm is the best one in the three methods. Its computational error is relatively small, and the time consumed is shorter compared with other two algorithms. The error of the sub-pixel Harris algorithm is a bit of larger than SSIFT algorithm while the real time realization performance is better than SSIFT algorithm.

Hou Guo-qiang, Fu Xiao-ning, He Tian-xiang

Reducing X-Ray Exposure of 3D Hepatic MDCT Images by Applying an Optimized Feature Preserving Strategy

The X-ray exposure of hepatic MDCT (Multidetector-Row Computed Tomography) images threatens human health. In this paper, the 3D adaptive median filter with local averaging is optimized to improve the image quality of low dose hepatic MDCT images. The modified strategy is designed according to the subtle texture of a hepatic tumor. Filtering experiments are based on phantom images with different dose levels and clinical hepatic ones with a certain dose level. Radiologists’ visual evaluation and voxel value profiles show that the x-ray exposure can be reduced to 60% at least without compromising the quality of diagnostic images.

Jiehang Deng, Min Qian, Guoqing Qiao, Yuanlie He, Zheng Li

Quickly Creating Illumination-Controllable Point-Based Models from Photographs

Based on the theory of visual hulls, this paper presents a method to create point based models for real objects. Instead of using the expensive special equipments such as 3D laser scanners, this method deals with some silhouette images of the objects, and generates uniformly point-sampled models. We adopt a uniform-interval index table to organize the silhouette edges of each sample image, which provides much flexibility for point sampling. Moreover, combining the surface splatting technology and Layered Depth Buffers (LDB), we introduce a new algorithm to judge the visibilities of the points. The experimental results have shown the high accuracy of the visibility judgment.

Weihua An

Development on Insole 3D Plantar Pressure Measurement System Based on Zigbee Technology

Plantar pressure measurement is now considered commonplace in the healthcare control and monitoring of normal people and patients, as well as having applications in military applications. Based on this need, we create a plan to construct a new insole plantar pressure system based on multifunction data acquisition modular, LabVIEW and Zigbee technology. Then the hardware and software parts are developed respectively. There are 3 sensors arrayed at each measurement point, that means 3 sensors are assembled in 3 different directions of X,Y and Z . The piezoelectric ceramic type sensors are designed, manufactured and calibrated according to scientific methods. Meanwhile, the DAQ card is selected carefully. Of course, the software part is developed based on LabVIEW. The singnal transmission and inception are performed based on wireless communication technology of Zigbee. A series of tests are performed in order to validate the function of the measurement system. The results satisfy the anticipated design requirements. The existing problems and application trend of the measurement system are predicted.

Yemin Guo, Lanmei Wang

A Study of Software Architecture for Real-Time Image and Graphic Processing for Time-Sequenced 3-D CT Images

Software architecture is studied, in which real time image and Graphic processing are executed for time-sequenced three-dimensional computer tomogram images, to observe the organs with movement, such as heart or lung. Because such system must process so huge number of images, its observer might wait a while for processing images and then generating graphic images. In developing such system, it might be efficient to utilize GPU (graphic processor unit) for processing. The experimental result shows that the processing times on GPU are almost 1/4 of the times on CPU including memory transfer. Furthermore some suitable software architecture must be investigated in consideration of the size of targeted images and the processing time for image process and graphic process. In this paper, software architecture in the system will be proposed, which continues to display animated graphic images naturally as heart movement even while huge image process executes.

Yoshio Yanagihara

Entropy Application in Partial Discharge Analysis with Non-intrusive Measurement

Partial discharge (PD) occurs when insulation deterioration happens in electrical apparatus. It is often detected in order to evaluate the state of insulation. For metal-clad equipments, external sensors which are easy to install and interruption-free on operations are preferred. However, their performances are compromised by heavy noise. Although time-frequency (TF) spectrum provides much information to discriminate PDs and noises, automatic selection remains a tough issue in field application. Entropy, a measure of disorder, is applied in this paper to extract PD pulses automatically. This entropy-based algorithm is implemented and examined by two field-collected datasets. Practical results show that true PDs can be identified and extracted effectively.

Guomin Luo, Daming Zhang

Three-Dimensional Imaging of a Human Body Using an Array of Ultrasonic Sensors and a Camera

This paper describes the three-dimensional (3D) imaging of a human body using an array of ultrasonic sensors and a camera. We have previously reported on a system that measures the shape of an object (including a human body) using a camera and combines this information with 3D position data obtained using an ultrasonic array; however, this system only detects the center position of the object. In the present research, a prototype system was constructed using an ultrasonic sensor array and a camera. The 3D positions of each body part were measured using the ultrasonic array and combined with the image of the human body. Some difficulties in combining the 3D positions and the camera image are discussed. One problem is the lack of 3D position data (partially due to the poor signals of the reflected ultrasonic waves), which can be resolved by using the neighboring position data.

Hideo Furuhashi, Yuta Kuzuya, Chen Gal, Masatoshi Shimizu

A Parallel Adaptive Block FSAI Preconditioner for Finite Element Geomechanical Models

Efficient ad hoc preconditioners are a key factor for a successful implementation of linear solvers in a parallel computing environment. The class of Factorized Sparse Approximate Inverses (FSAI), although originally developed for scalar machines, has proven extremely promising in multicore hardware. A recent evolution of FSAI is Block FSAI (BFSAI) which clusters the largest coefficients of the preconditionedmatrix in a number of diagonal blocks defined in advance. A further improvement of BFSAI is the adaptive BFSAI (labelled ABF) where the non zero pattern of the BFSAI preconditioner is not prescribed a priori but computed automatically and adaptively by a suitable algorithm. Numerical results from large finite element (FE) geomechanical models show that ABF coupled with an incomplete Cholesky factorization of each individual diagonal block, i.e. ABF-IC, may outperform BFSAI-IC by up to a factor 4 while exhibiting an excellent degree of parallelization on any multiprocessor computer.

Carlo Janna, Massimiliano Ferronato, Giuseppe Gambolati

An Effective Inductive Learning Algorithm for Extracting Rules

In this paper we present a new inductive learning algorithm named MONSAMAX for extracting rules. It has some advantages compared to several machine learning algorithms: it uses several new pruning techniques which guarantee great effectiveness of the algorithm; it extracts overlapping rules; as a result it finds determinative set of rules that we can use for post-analysis of extracted rules. Compared to a former algorithm MONSIL it is much less labor-consuming.

Rein Kuusik, Grete Lind

Computational Knowledge Modeling in Cardiovascular Clinical Information Systems

Cardiac surgery is a complex surgical operation that is performed on patients with a severe insufficiency in their cardiac function. In this study, we present a CIS (Clinical Information System) with knowledge modeling that combines information extracted from the heterogeneous data sources in order to assess the evolution of the Cardiac surgery after the intervention and data extracted from Follow-Up Record. Once the integrating of data, the homogeneous data could be useful in answering important clinical questions and could help optimize cardiac methodologies in the clinical decision field. The results show that the system proposed by this approach yields valuable information and knowledge for Cardiac surgery patients.

Nan-Chen Hsieh, Jui-Fa Chen, Hsin-Che Tsai, Fan Su

Automatic Extraction and Categorization of Lung Abnormalities from HRCT Data in MDR/XDR TB Patients

An ancient disease, tuberculosis (TB) remains one of the major causes of disability and death worldwide. In 2006, 9.2 million new cases of TB emerged and killed 1.7 million people. We report on the development of tools to help in the detection of lesions and nodules from High Resolution Computed Tomography (HRCT) scans and changes in total lesion volumes across a study. These automated tools are designed to assist radiologists, clinicians and scientists assess patients’ responses to therapies during clinical studies. The tools are centered upon a rule-based system that initially segments the lung from HRCT scans and then categorizes the different components of the lung as normal or abnormal. A layered segmentation process, utilizing a combination of adaptive thresholding, three-dimensional region growing and component labeling is used to successively peel off outside entities, isolating lung and trachea voxels. Locating the Carina allows logical labeling of the trachea and left/right lungs. Shape and texture analysis are used to validate and label normal vascular tree voxels. Remaining abnormal voxels are clustered on density, gradient and texture-based criteria. Several practical problems that arise due to large changes in lung morphology due to TB and patients’ inability to hold their breath during scan operations need to be addressed to provide a viable computational solution. Comparisons of total common volumes of lesions by size for a given patient across multiple visits are in concordance with expert radiologist’s manual measurements.

Saher Lahouar, Clifton E. Barry, Praveen Paripati, Sandeep Somaiya, Yentram Huyen, Alexander Rosenthal, Michael Tartakovsky

DNA Algorithm Based on K-Armed Molecule and Sticker Model for Shortest Path Problem

DNA computing is a computing paradigm based on biochemical reactions by using DNA molecule. Because of its advantages, such as mass storage and parallelism, it has been used to solve many complex problems. Shortest path problem is a frequently used problem in practical application. In this paper, a DNA algorithm based on k-armd molecule and sticker model to solve shortest path problem for weighted graph is proposed. The encoding method for the vertex, edges and weights is described in detail. This method shorten the length of the DNA strands for the weight code and may decrease the error during the biochemical reaction in a certain degree. The solving process for shortest path problem is also described in this paper.

Hong Zheng, Zhili Pei, Qing’an Yao, QingHu Wang, Yanchun Liang

Smith Normal Form Using Scaled Extended Integer ABS Algorithms

Classes of integer ABS methods have recently been introduced for solving linear systems of Diophantine equations. The Smith normal form of a general integermatrix is a diagonal integer matrix, obtained by elementary nonsingular (unimodular) operations. Such a form may conveniently be used in solving integer systems of equations and integer linear programming problems. Here, we present a class of algorithms for computing the Smith normal form of an integer matrix. In doing this, we propose new ideas to develop a new class of extended integer ABS algorithms generating an integer basis for the integer null space of the matrix. Finally, we test our algorithms and report the obtained numerical results on randomly generated test problems.

Effat Golpar-Raboky, Nezam Mahdavi-Amiri

The Characteristics of Flat-Topped and Pinnacle Building on SAR Image

Because of the characteristics of SAR side-looking imaging, the buildings in SAR images showing the geometric characteristics obviously, and the different roof structure buildings have the different features in the SAR images, these characteristics play an important role in the city monitoring of building three-dimensional reconstruction. First, discusses the SAR imaging principle and general characteristics, including layerover, shadow, perspective contraction, the dihedral angle reflection characteristics, and gives the different imaging characteristics of flat-topped and pinnacle building which have variety of different geometries, provides information for future city buildings identification and three-dimensional reconstruction.

Wang Min, Zhou Shu-dao, Liu Zhi-hua, Huang Feng, Bai Heng

Haar Wavelet Method for Solving Two-Dimensional Burgers’ Equation

In the present paper, An novel and efficient combination of two-dimensional Haar wavelet functions for solving a two-dimensional Burger problem with the aid of tensorial products. The numerical results demonstrate that making use of Haar wavelets to solve two-dimensional Burgers equation could reach higher accuracy and calculate easily.

Miaomiao Wang, Fengqun Zhao

A Summarization Strategy of Chinese News Discourse

Due to the problem of information overloading, automatic text summarization is becoming more and more necessary. This paper proposes a strategy for Chinese news discourse summarization based on veins theory. This method can produce a summary of an original text without requiring its full semantic interpretation, but instead relying on the discourse structure.

Deliang Wang

A Neuron Model Based on Hamilton Principle and Energy Coding

The studies on neural network and dynamics analysis are done by lots of researchers while there is few about single neuron. We get a dynamical model based on Hamilton principle from neural physical circuit. The discharge of neuron can be simulated successfully. Furthermore, we discuss the system generalized energy consumption when the neuron is firing. The variety patterns of energy maybe contain some coding about information transmission between neurons.

Yan Chuankui

Formation of Bonded Exciplex in the Excited States of Dicyanoanthracene-Pyridine System: Time Dependent Density Functional Theory Study

Strong quenching of fluorescence was recently observed in pyridine solutions of 9,10-dicyanoanthracene chromophore. It was hypothesized that quenching may be attributed to the formation of bound charge transfer complexes in the excited states of the molecules. In this work, using time-dependent density functional calculations, we investigate the possibility of formation of bonded exciplex states between DCA and pyridine molecules. On the basis of theoretical calculations, it is proposed that a partial electron transfer occurs in the lowest excited state of the dicyanoanthracene-pyridine system which leads to the formation of bonded exciplex species and to quenching of fluorescence from dicyanoanthracene.

Dani Setiawan, Daniel Sethio, Muhamad Abdulkadir Martoprawiro, Michael Filatov

Simulation of a Cockpit Display System under the Sunlight

More and more visual information is being displayed by the aircraft Cockpit Display System (CDS) nowadays. In order to keep flight safety and avoid tiredness, the design of CDS must meet every light condition during the flight to ensure the readability of the information. As the main factor of ambient light in the cockpit, sunlight may heavily affect the visual ergonomy of CDS. Therefore, simulating the CDS under the sunlight within the design phase is required. As an example, depending on different sunlight incident angle and front sunshade layout, varied affections were simulated by the SPEOS simulation software from OPTIS. The results directly showed the effects of sunlight on the CDS and tested the design of front sunshade, which could be of value in evaluating the CDS.

Wei Heng-yang, Zhuang Da-min, Wan-yan Xiao-ru

Dynamic Analysis of Nonlinear Elasticity Microbeam with Electromechanical Couping

The material nonlinearity is one of the many nonlinear factors in MEMS(Micro Electro Mechanical System). The microbeam is a basic component in MEMS. In this paper, the influence of nonlinear elasticity factor has been considered in dynamic analysis of the microbeam. A nonlinear modal is set up that as a clamped-clamped microbeam subjected to a transverse electrostatic force. The nonlinear governing equation is transformed into a linear differential equation system through the use of Linstedt-Poincaré perturbation method, which are then solved by using the Galerkin method. Numerical results show that, the nonlinear factor can’t be ignored when the number of the nonlinear material constant, B is big. The amplitude and the period of the microbeam will increase when the number of B is increasing.

Yang Liu, Peng Jian-she, Xie Gang, Luo Guang-bing

Continuous Analysis Based on Profile Information for Vectorization Optimization

Aiming at the non-continuous reference problem inside the loop, a method which can implement the continuous analysis based on feedback-directed compiling optimization technique is proposed. It can make up for the traditional vector-based static analysis identified inadequate for the program appears contains a lot of pointers, array of structures and other complex data structures, and to provide more accurate identification and optimization of the vector.

Yuan Yao, Rong-cai Zhao

A New Three-Dimensional Spherical Terrain Rendering Method Based on Network Environment

A new three-dimensional spherical terrain rendering method based on network environment is proposed in this study. Delay of fetching data or failure of data transmission could happen on network environment, and this method can deal with the situation without affecting real-time rending. In this method, a set of nest regular grids (NRG) are used to cache the terrain, Graphics hardware GPU is applied to accelerate the terrain rendering, and cracks elimination is discussed.

X. F. Dai, H. J. Xiong, X. W. Zheng

Combining Probabilistic Dependency Models and Particle Swarm Optimization for Parameter Inference in Stochastic Biological Systems

In this work we present an efficient method to tackle the problem of parameter inference for stochastic biological models. We develop a variant of the Particle Swarm Optimization algorithm by including Probabilistic Dependency statistical models to detect the parameter dependencies. This results in a more efficient parameter inference of the biological model.We test the Probabilistic Dependency- PSO on a well-known benchmark problem: the thermal isomerization of



Michele Forlin, Debora Slanzi, Irene Poli

Neuro-aided H2 Controller Design for Aircraft under Actuator Failure

To advocate the development of new robust and reliable controllers, it has been defined a benchmark problem, where robust controllers are required for controlling a 6-Degree of Freedom (6-DOF) nonlinear F16 aircraft in auto-landing phase undergoing actuator failures. This paper attempt to provide a solution by developing a robust Neural Network (Neuro) aided H


controller. Simulation results show that the fault tolerant performance of the proposed Neuro-aided H


controller is better than H


controller under actuator failure condition, both the number of hidden neurons and the time of on-line learning are small enough to be used in engineer problems.

Zhifeng Wang, Guangcai Xiong

Transcriptome to Reactome Deterministic Modeling: Validation of in Silico Simulations of Transforming Growth Factor-β1 Signaling in MG63 Osteosarcoma Cells, TTR Deterministic Modeling

Integrated Systems Biology was used to study bone cancer via an iterative process of

in vitro

testing for validation of an

in silico

computer simulation where the transcriptome was used to derive the parameters of a kinetic model. A computer simulation model of the transforming growth factor-beta (TGF-


1) signaling pathway was obtained from Reactome®. The transcriptome of MG-63 cells was accessed from NCBI GEO GSE11414. With this method the model is not trained to match the biological system. The

in vitro

study on osteosarcoma (MG-63) cells was used to compare with the results from the computer simulation. MG-63 cells were grown in culture and exposed to TGF-


1 to identify differences in expression of a target-gene, TGF-


-Induced 68kDa protein (TGFBI), at serial time intervals. Real-time PCR was used to measure TGFBI mRNA levels and the temporal profile was identical with that predicted by the

in silico

model. A sensitivities test was performed through the

in silico

model and a candidate target for gene-knock-down in the TGF-


signaling pathway, Smad3, was identified. An 80% reduction of this reactant in the model attenuated TGFBI expression by 64%, an effect that matched such knockdown of Smad3,

in vitro

, for other target genes reported in the literature. The assumption that the transcriptome drives the reactome is validated and substantiates a novel method for deriving parameters for kinetic deterministic models of biological systems.

Clyde F. Phelix, Bethaney Watson, Richard G. LeBaron, Greg Villareal, Dawnlee Roberson

Advanced Co-phase Traction Power Supply Simulation Based on Multilevel Converter

Serious power quality and neutral sections disadvantage restrict the evolution of traditional traction power supply system. An advanced co-phase traction power supply system is proposed in this paper based on three-phase to single-phase converter as the key equipment in substation. This converter adopts multi-module diode clamped multi-level algorithm, connects between industrial grid and feeder line without using output transformer. It transfers active power from three-phase grid isolated to one-phase traction line, and provides the frequency, phase and amplitude controlled output voltage. Then, the feeder line between different substation can be connected directly, and constructs an ideal co-phase traction supply system in the same phase. The performance of the converter is validated by the discussion and simulation results in this paper.

Zeliang Shu, Xifeng Xie, Yongzhi Jing

Exponential Convergence of a Randomized Kaczmarz Algorithm with Relaxation

The Kaczmarz method is a well-known iterative algorithm for solving linear system of equations


 = b. Recently, a randomized version of the algorithm has been introduced. It was proved that for the system


= b or


 ≈ b + r, where r is an arbitrary error vector, the randomized Kaczmarz algorithm converges with expected exponential rate. In the present paper, we study the randomized Kaczmarz algorithm with relaxation and prove that it converges with expected exponential rate for the system of


= b and


 ≈ b + r. The numerical experiments of the randomized Kaczmarz algorithm with relaxation are provided to demonstrate the convergence results.

Yong Cai, Yang Zhao, Yuchao Tang

The Experiment and Simulation Study of Respiration on the Dose Distribution in Radiotherapy

Objective: To evaluate the influence of respiration on the radiation dose distribution in radiotherapy with matlab simulation and film dosimetry. Methods: Radiation of 50MU was delivered in a square, round, ellipse, dumb bell, or female shaped field to the films within a moving or static Respiration Motion Phantom respectively, the dose distributions for the two motion status were measured and compared. In order to further verify the impact of amplitude of respiration movement, the matlab simulation with movement amplitude of 0 cm, 0.5 cm, 1.0 cm, 1.5 cm, 2.0 cm, and 2.5cm were done respectively. The dose distributions in different status were measured and compared with film dosimetry. Iso-dose line comparison, NAT (Normalized Agreement Tests) and


comparison were used for the comparison of dose distributions. F


was used as an index to evaluate the differences of the areas that surrounded by iso-dose lines in different situations (F


, F


, F


delegates the ratio of the areas that surrounded by 90%, 50%, 25% iso-dose line in different situation respectively). Results: (1) For round field, the matlab simulation showed that S


decreased as the increase of the movement. S


was almost 0 when the amplitude became to half of the diameter of the field. S


varied inversely. (2) The experiment showed that in horizontal movement situation compared with in static situation, the F


became smaller and the F


became larger. The more the displacement became larger, the more the F


and the F


deviate remarkable. In vertical movement situation, F


changed significantly in square field and dumb bell shaped field while changed a little in the others. (3)


and NAT comparison: In the horizontal movement situation, compared with in the static phantom, the P


was <60% and the P


was <75% in every radiation field. In vertical movement situation, the P


was less than 85% for all the square, round, dumb bell and female shaped fields. Conclusions


The respiration can impact on the dose distribution within the target volume in radiotherapy, leading to a smaller area of higher dose level and an expanded area of lower dose level. The influence will become more significant with larger movement of the target.

Xiao Xu, Keqiang Wang

Level Based Flooding for Node Search in Wireless Sensor Network

In this paper, we pay attention to the problem of node search in Wireless Sensor Networks (WSNs). The main problem of basic flooding is that the cost is too high. In order to solve above problem, we propose a variant of Flooding called Level Based Flooding (LBF). In LBF, the whole network is divided into several layers according to the distance (hops) between the nodes and the sink node. The sink node knows the level information of each node. The search packet is broadcast in the network according to levels of nodes and its


is set to the level of the target node. When the target node receives the packet, it sends its data back to the sink node in random walk within


hops.We show by extensive simulations that the energy consumption of LBF is much better than that of basic flooding.

Yanhong Ding, Tie Qiu, Honglian Ma, Naigao Jin

Numerical and Experimental Study of Hydrogen Release from a High-Pressure Vessel

The dispersion characteristics of hydrogen leaking through a small hole from a high-pressure reservoir are investigated numerically and experimentally to provide a guideline in determining the safety distances for hydrogen stations. The studies were carried out for the leaking holes with diameters of 0.5, 0.7 and 1.0mm and for the release pressures at 100, 200, 300 and 400 bar. Because Froude numbers in these realistic hydrogen leaking conditions are very large, it is reasonable to employ a 2-dimensional axisymmetric approach in the numerical simulations as well as in hydrogen samplings.

Sang Heon Han, Daejun Chang

SIMD Computer Using 16 Processing Elements for Multi-Access Memory System

Improving the speed of image processing is in great demand according to spread of high definition visual media or massive images applications. A Single Instruction Multiple Data (SIMD) computer attached to a host computer can accelerate various image processing and massive data operations. Especially, MAMS (Multi-access Memory System) can not only reduce the access time of the memory but also improve the cost and complexity for the large volume of data demanded in visual media applications. This paper presents implementation of simulator for image processing algorithms and speed comparison of an SIMD architectural multi-access memory system, MAMS-PP16 which consists of MAMS and 16 processing elements (PEs), executed with MAMS-PP4 which consists of MAMS and 4 processing elements(PEs). The newly designed MAMS-PP16 has a 64 bits instruction format and application specific instruction sets. The result of performance analysis verifies performance improvement and the consistent response of MAMS-PP16 through the morphology filter operation in image processing algorithms, comparing with a CISC-based(Intel Processor) Serial Processor.

Jea-Hee Kim, Kyung-Sik Ko, Jong Won Park

Detection of Broken Rotor Bars in Induction Motors Using Unscented Kalman Filters

Determining the number of broken bars due to the failure or the number of ring segments of the rotor cage of the asynchronous motor is the important problem during the operation of such machine. UKF filter, used to achieve this goal, gave exact information: numbers of broken bars and ring segments. For receiving such exact information the filter needed the measurements of the stator currents and currents of the additional one-winding coils placed at stator teeth and loaded by big resistance (~1 kΩ). The measurement of the rotation speed of the rotor and connected with this the angle of the machine shaft rotation was needed also. The method of determining the numbers of broken bars and ring segments of the rotor and the method of detecting only the broken bars of the rotor cage were tested. The presented method can be used for protecting big and expensive asynchronous drives.

Damian Mazur


Weitere Informationen

Premium Partner