Loading...

Table of Content

    31 August 2011, Volume 16 Issue 4 Previous Issue    Next Issue

    Articles
    For Selected: Toggle Thumbnails
    Articles
    Improved algorithm for calculating contributions to D-statistic
    Wu H.; Ye H.; Wan Y.M.
    2011, 16 (4):  385-390.  doi: 10.1007/s12204-011-1170-z
    Abstract ( 10 )   PDF (553KB) ( 22 )  
    D-statistic contribution analysis has been frequently used in practice for fault diagnosis. Existing algorithms for computing contributions to D-statistic tend to distribute cross-term contribution equally between two correlated variables. This leads to increased variance in contribution estimation and hence poor separability of faulty and normal variables. A new method for contribution calculation to D-statistic is proposed here which introduces a weighting scheme capable of distinguishing the contributions of two correlated variables. Simulation examples show that the proposed approach achieves improved resolution for distinguishing faulty and normal conditions. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Automatic product image classification with multiple support vector machine classifiers
    Jia S.-J.; Kong X.-W.; Man H.
    2011, 16 (4):  391-394.  doi: 10.1007/s12204-011-1180-x
    Abstract ( 12 )   PDF (400KB) ( 26 )  
    For the task of visual-based automatic product image classification for e-commerce, this paper constructs a set of support vector machine (SVM) classifiers with different model representations. Each base SVM classifier is trained with either different types of features or different spatial levels. The probability outputs of these SVM classifiers are concatenated into feature vectors for training another SVM classifier with a Gaussian radial basis function (RBF) kernel. This scheme achieves state-of-the-art average accuracy of 86.9% for product image classification on the public product dataset PI 100. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    An information-based color feature representation and its application in detecting adult images
    Wang S.-L.; Liew W.-C.A.
    2011, 16 (4):  395-401.  doi: 10.1007/s12204-011-1167-7
    Abstract ( 16 )   PDF (786KB) ( 24 )  
    For many image classification tasks, color histogram is usually employed as an important "signature" to describe the color distribution of the image and infer the image content. However, most traditional color histograms cannot achieve satisfactory results in many image classification systems. In order to improve the accuracy and reduce the computational complexity of the classification task, an information-based color feature representation is proposed in this paper. The mutual information between the feature and the class label is adopted to evaluate the discriminative power of the feature. A novel quantization scheme is presented, which removes the redundant color components and combines the adjacent components together to generate a new feature to maximize the discriminative ability. An iterative algorithm is performed to derive the color space quantization and color feature generation. In order to illustrate the effectiveness of the proposed color representation, a specific image classification task, i.e., differentiating the adult images from benign ones, is employed. Experimental results show that our color feature achieves better classification performance and better efficiency compared with the traditional color histogram. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Curvature estimation of point set data based on the moving-least square surface
    Qiu Y.-J.; Zhou X.-H.; Yang P.-H.; Qian X.-P.
    2011, 16 (4):  402-411.  doi: 10.1007/s12204-011-1168-6
    Abstract ( 12 )   PDF (1550KB) ( 24 )  
    Curvature estimation is a basic step in many point relative applications such as feature recognition, segmentation, shape analysis and simplification. This paper proposes a moving-least square (MLS) surface based method to evaluate curvatures for unorganized point cloud data. First a variation of the projection based MLS surface is adopted as the underlying representation of the input points. A set of equations for geometric analysis are derived from the implicit definition of the MLS surface. These equations are then used to compute curvatures of the surface. Moreover, an empirical formula for determining the appropriate Gaussian factor is presented to improve the accuracy of curvature estimation. The proposed method is tested on several sets of synthetic and real data. The results demonstrate that the MLS surface based method can faithfully and efficiently estimate curvatures and reflect subtle curvature variations. The comparisons with other curvature computation algorithms also show that the presented method performs well when handling noisy data and dense points with complex shapes. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Color image segmentation by edge linking and region grouping
    Wang N.; Yang J.
    2011, 16 (4):  412-419.  doi: 10.1007/s12204-011-1136-1
    Abstract ( 17 )   PDF (1908KB) ( 24 )  
    A novel method toward color image segmentation is proposed based on edge linking and region grouping. Firstly, the edges extracted by the Canny detector are linked to form regions. Each of the end points of edges is connected by a direct line to the nearest pixel on another edge segment within a sub-window. A new distance is defined based on the feature that the edge tends to preserve its original direction. By sampling the lines to the image, the image is over-segmented to labeled regions. Secondly, the labeled regions are grouped both locally and globally. A decision tree is constructed to decide the importance of properties that affect the merging procedure. Finally, the result is refined by user's selection of regions that compose the desired object. Experiments show that the method can effectively segment the object and is much faster than the state-of-the-art color image segmentation methods. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    3D human motion tracking by using interactive multiple models
    Tong M.-L.; Bian H.-Q.
    2011, 16 (4):  420-428.  doi: 10.1007/s12204-011-1134-3
    Abstract ( 19 )   PDF (1712KB) ( 24 )  
    Of different model-based methods in vision based human tracking, many state of the art works focus on the stochastic optimization method to search in a very high dimensional space and try to find the optimal solution according to a proper likelihood function. Seldom works perform a framework of interactive multiple models (IMM) to track a human for challenging problems, such as uncertainty of motion styles, imprecise detection of feature points and ambiguity of joint location. This paper presents a two-layer filter framework based on IMM to track human motion. First, a method of model based points location is proposed to detect key feature points automatically and the filter in the first layer is performed to estimate the undetected points. Second, multiple models of motion are learned by the prior motion data with ridge regression and the IMM algorithm is used to estimate the quaternion vectors of joints rotation. Finally, experiments using real images sequences, simulation videos and 3D voxel data demonstrate that this human tracking framework is efficient. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Polling algorithm based on traffic burst characteristics of broadband wireless access systems
    Li X.-Y.; Li W.; Wu X.-J.; Zhang Y.-F.
    2011, 16 (4):  429-435.  doi: 10.1007/s12204-011-1169-5
    Abstract ( 13 )   PDF (520KB) ( 24 )  
    In this paper, we propose a novel polling algorithm to decrease the number of idle slots and collission slots during the polling cycle by evaluating the bandwidth request of the subscribe stations (SSs) in the next polling cycle for broadband wireless access (BWA) systems. We firstly analyze the feature of silent time intervals and deduce the Hurst index which symbolizes the degree of self-similarity and long-relative nature. Then we represent the inactive OFF time intervals by the Pareto model and estimate the shape parameter α by the group measured data. Finally we can evaluate the transmission probability of a silent SS before the next polling cycle. By this algorithm, we can find the optimal transmission opportunities for the base station (BS) to achieve the least collision or void timeslots in order to achieve the largest bandwidth efficiency. The theoretical analysis and simulation results show that this polling algorithm can improve the performance for BWA system. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Tool sequence optimization based on three logical modes of robot control via CPLEX optimization
    Sun L.-L.; Liu W.; Chai T.-Y.
    2011, 16 (4):  436-440.  doi: 10.1007/s12204-011-1171-y
    Abstract ( 13 )   PDF (543KB) ( 24 )  
    Cluster tools have advantages of shorter cycle times, faster process development, and better yield for less contamination. The sequence of dual-arm cluster tools is a complex logistics process during the semiconductor production. Efficient use of cluster tools is naturally very significant to competitive fab operations. Generating an optimized sequence in a computationally efficient manner and assessing the quality of the requirements to improve the fab production are the key factors for semiconductor manufacturing productivity. The Petri net modeling is introduced to minimize the makespan of the process for the three different logical modes and select a better mode after comparing the makespan among the three logical modes. The tool sequence optimization problem is formulated as optimization firing transition sequences based on the Petri net and then the formulation is converted to be linearly solved by the branch-and-cut method in the standard commercial solver CPLEX. Special methods for the linear conversion are highlighted. Due to the limited calculation time requirement for the real production and the large scale of the problem, special methods for the efficiency tuning are applied according to the characteristics of the problem. Numerical testing is supported by one of the most advanced semiconductor enterprises and the computational results show significant improvement compared with the traditional manual sequence results. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Implementation of dynamic matrix control on field programmable gate array
    Lan J.; Li D.-W.; Yang N.; Xi Y.-G.
    2011, 16 (4):  441-446.  doi: 10.1007/s12204-010-1086-z
    Abstract ( 12 )   PDF (642KB) ( 24 )  
    High performance computer is often required by model predictive control (MPC) systems due to the heavy online computation burden. To extend MPC to more application cases with low-cost computation facilities, the implementation of MPC controller on field programmable gate array (FPGA) system is studied. For the dynamic matrix control (DMC) algorithm, the main design idea and the implemental strategy of DMC controller are introduced based on a FPGA's embedded system. The performance tests show that both the computation efficiency and the accuracy of the proposed controller can be satisfied due to the parallel computing capability of FPGA. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Human and bicycle detection system using range sensor
    Wu Y.; Kong Q.-J.; Liu Z.-H.; Liu Y.-C.
    2011, 16 (4):  447-451.  doi: 10.1007/s12204-011-1172-x
    Abstract ( 17 )   PDF (578KB) ( 24 )  
    This paper presents a full-scale solution to the detection of the traffic data using laser device. Range images, gathered by a particular laser camera, are used in the multi-threshold segmentation. The multi-threshold segmentation is based on the height of the moving objects. In order to get the precise height of the moving objects, mapping of the original terrain is performed on the first step. On each layer, the clustering algorithm called iteration-self organizing data analysis techniques algorithm (ISODATA) is conducted afterwards. Kalman filtering technique is applied to recognize and track the moving objects. Extensive experiments show that these algorithms are effective in object recognition and tracking, as well as robust in the applications. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Robust buffer management mechanism in quality of service routers
    Wang H.; Cheng M.-J.; Tian Z.-H.
    2011, 16 (4):  452-458.  doi: 10.1007/s12204-011-1173-9
    Abstract ( 23 )   PDF (668KB) ( 24 )  
    Active queue management (AQM) is essentially a router buffer management strategy supporting TCP congestion control. Since existing AQM schemes exhibit poor performance and even instability in time delay uncertain networks, a robust buffer management (RBM) mechanism is proposed to guarantee the quality of service (QoS). RBM consists of a Smith predictor and two independent controllers. The Smith predictor is used to compensate for the round trip time (RTT) delay and to restrain its negative influence on network performance. The main feedback controller and the disturbance rejection controller are designed as proportionalintegral (PI) controller and proportional (P) controller by internal model control (IMC) and frequency-domain analysis respectively. By simulation experiments in Netwrok-Simulator-2 (NS2), it is demonstrated that RBM can effectively manage the buffer occupation around the target value against time delay and system disturbance. Compared with delay compensation-AQM algorithm (DC-AQM), proportional-integral-derivative (PID) algorithm and random exponential marking (REM) algorithm, the RBM scheme exhibits the superiority in terms of stability, responsiveness and robustness. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Simple and efficient password-based authenticated key exchange protocol
    Wang L.-B.; Pan J.-X.; Ma C.-S.
    2011, 16 (4):  459-465.  doi: 10.1007/s12204-011-1174-8
    Abstract ( 12 )   PDF (189KB) ( 24 )  
    Password-based authenticated key exchange (PAKE) protocols are cryptographic primitives which enable two entities, who only share a memorable password, to identify each other and to communicate over a public unreliable network with a secure session key. In this paper, we propose a simple, efficient and provably secure PAKE protocol based on Diffie-Hellman key exchange and cryptographic hash function. Our protocol is secure against dictionary attacks. Its security is proved based on the hardness of the computational Diffie-Hellman problem in the random oracle model. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Object tracking and tracing: Hidden semi-markov model based probabilistic location determination
    Wu J.; Wang D.; Sheng H.-Y.
    2011, 16 (4):  466-473.  doi: 10.1007/s12204-011-1133-4
    Abstract ( 15 )   PDF (368KB) ( 24 )  
    The enhancement of radio frequency identification (RFID) technology to track and trace objects has attracted a lot of attention from the healthcare and the supply chain industry. However, RFID systems do not always function reliably under complex and variable deployment environment. In many cases, RFID systems provide only probabilistic observations of object states. Thus, an approach to predict, record and track real world object states based upon probabilistic RFID observations is required. Hidden Markov model (HMM) has been used in the field of probabilistic location determination. But the inherent duration probability density of a state in HMM is exponential, which may be inappropriate for modeling of object location transitions. Hence, in this paper, we put forward a hidden semi-Markov model (HSMM) based approach for probabilistic location determination. We evaluated its performance comparing with that of the HMM-based approach. The results show that the HSMM-based approach provides a more accurate determination of real world object states based on observation data. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Evaluation and optimization of intersection process between voxelized mesh models and homocentric spheres
    Liu W.; Zhou X.-H.; Niu Q.
    2011, 16 (4):  474-478.  doi: 10.1007/s12204-011-1175-7
    Abstract ( 10 )   PDF (792KB) ( 24 )  
    In the field of 3D model matching and retrieval, an effective method for feature extraction is spherical harmonic or its mutations, and is acted on the spherical images. But the obtainment of spherical images from 3D models is very time-consuming, which greatly restrains the responding speed of such systems. In this paper, we propose a quantitative evaluation of the whole process and give a detailed two-sided analysis based on the comparative size between pixels and voxels. The experiments show that the resultant optimized parameters are fit for the practical application and exhibit a satisfactory performance. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    On real reward testing
    Yang W.-Z.; Deng Y.-X.
    2011, 16 (4):  479-484.  doi: 10.1007/s12204-011-1176-6
    Abstract ( 10 )   PDF (218KB) ( 23 )  
    We extend the traditional nonnegative reward testing with negative rewards. In this new testing framework, may preorder and must preorder are the inverse of each other. More surprisingly, it turns out that the real reward must testing is no more powerful than the nonnegative reward testing, at least for finite processes. In order to prove that result, we exploit an important property of failure simulation about the inclusion of the testing outcomes between two related processes. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Identity-based threshold decryption on access structure
    Qin H.-W.; Zhu X.-H.; Dai Y.-W.
    2011, 16 (4):  485-489.  doi: 10.1007/s12204-011-1177-5
    Abstract ( 15 )   PDF (163KB) ( 24 )  
    For the applied limitation of the existing threshold decryption schemes based on the (t, n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares. The generation and distribution of private key shares, the encryption, the decryption and the combination are introduced in detail. The validity and security of the scheme are proved and analyzed. Comparisons with the existing schemes show that the proposed scheme is more flexible. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Fully secure revocable attribute-based encryption
    Qian J.-L.; Dong X.-L.
    2011, 16 (4):  490-496.  doi: 10.1007/s12204-011-1178-4
    Abstract ( 15 )   PDF (209KB) ( 24 )  
    Distributed information systems require complex access control which depends upon attributes of protected data and access policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users' attributes. According to this mechanism, even though the file server is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions realize revocation of the users' key. This paper presents an ABE scheme that supports revocation and has full security in adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Fault diagnosis for singular stochastic systems
    Hu Z.-H.; Han Z.-Z.; Tian Z.-H.
    2011, 16 (4):  497-501.  doi: 10.1007/s12204-011-1135-2
    Abstract ( 14 )   PDF (221KB) ( 24 )  
    This paper studies the fault diagnosis of singular stochastic systems. The probability distribution of output is measured by probability density functions (PDFs), which are modeled by a square root B-spline expansion. An adaptive nonlinear observer is proposed to estimate the size of the fault occurring in systems. Furthermore, the linear matrix inequality (LMI) approach is applied to establish sufficient conditions for the existence of the observer. Finally, the simulation results are given to indicate the method for diagnosing the fault. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    A low-cost testbed of underwater mobile sensing network
    Shang G.-Y.; Feng Z.-P.; Lian L.
    2011, 16 (4):  502-507.  doi: 10.1007/s12204-010-1084-1
    Abstract ( 14 )   PDF (748KB) ( 24 )  
    Comprised by a swarm of acoustically linked and cooperative autonomous underwater vehicles (AUVs) with onboard sensors, an underwater mobile sensing network (UMSN) will be a complementary means to fixed observatory networks, e.g. seafloor observatory networks and moored buoy arrays. It has obvious advantages over a single large AUV in higher efficiency due to parallel observation, stronger robustness to vehicle failures and lower cost. Although an UMSN can be viewed as a counterpart of wireless mobile sensing networks for air and terrestrial applications, it is much more challenging due to poor performance of underwater acoustic communication, poor performance of underwater positioning and high degree of uncertainty in vehicle dynamics and underwater environment. In order to verify key technologies involved in an UMSN, e.g. cooperation of multi-AUVs based on acoustic communication, a low cost testbed has been developed for experimental study. The design of both hardware and software is introduced. Also the results of a functional test for verification of the effectiveness of the testbed are presented. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics
    Continuous glucose monitoring in the patients with diabetic nephropathy
    Wang F.; Cheng D.-S.; Wang N.-S.; Li W.-H.; Bao Y.-Q.; Zhou J.; Jia W.-P.
    2011, 16 (4):  508-512.  doi: 10.1007/s12204-011-1179-3
    Abstract ( 15 )   PDF (170KB) ( 23 )  
    The aim of this study was to compare the difference of blood glucose (BG) fluctuation in the patients of type-2 diabetes mellitus (DM-2) with and without clinical diagnosed diabetic nephropathy (DN) by the continuous glucose monitoring system (CGMS). Thirty DM-2 patients with clinical diagnosed DN and fifteen DM-2 patients without complication underwent continuous glucose monitoring for 3 days (72 h) by CGMS. The difference of daily glucose fluctuation in both groups was compared by the parameter of CGMS. The 24-h mean blood glucose (MBG), minimal BG (MIN-BG), area under curve of BG over 7.8 (AUC7.8), percentage of time of BG over 7.8 (PT7.8), area under curve of BG over 11.1 (AUC11.1), percentage of time of BG over 11.1 (PT11.1), as well as mean of daily difference (MODD) were significantly increased in the group of DN, compared with those in the group of DM-2 without complication (all statistic probability P <0.05). No statistical significance of mean amplitude of glycaemic excursion (MAGE) was found. In the group of DN, MBG, standard deviation of blood glucose (SDBG), large amplitude of glycaemic excursion (LAGE), AUC7.8, PT7.8, AUC11.1, PT11.1, MAGE and MODD were (10.7±1.9) mmol/L, (2.5±1.3)mmol/L, (9.2±3.9)mmol/L, 3.2±1.7, (81±18)%, 1.2±1.0, (42±24)%, (5.8±2.5)mmol/L and (2.6±1.5)mmol/L, respectively. The study showed that the BG level of the patients with DN fluctuated throughout the day. MBG of the patients with DN was higher than that of the patients of DM-2 without complications, with the characteristics of long-lasting high BG period, dramatic instability during the day and especially high postprandial blood glucose. CGMS is a useful tool for physicians to know the details of the change of BG in the patients with DN. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.
    Related Articles | Metrics