Home > Highlights of Sciencepaper Online > Current Issue

 
 
 
ISSN 1674-2850
CN 11-9150/N5
 
Current Issue
Previous Issue  |  Next Issue
April 30,2011
Volume 4,Issue 8
Pages -
Subject Area:Basic Subject of Information Science and System Science,Computer Applications,Database,Computer Software,Computer Architecture,Computer Image Processing,Computer Simulation
 
Title: An Arnold encryption algorithm based on PN sequence
Authors: XU Guangxian, JIN Junhong
PP: 773-778
Abstract: This paper presents a modified Arnold method, which uses pseudorandom sequence (PN) sequence and secure Hash algorithm (SHA) to generate a random parameter sequence, then divides an image into pieces and carries out Arnold algorithm to the 4 pieces respectively. The Arnold algorithm effectively increases the number of the keys, and overcomes the attack via the exhaustive analysis, which enhances the security.
Keywords: information theory; image encryption; pseudorandom sequence; secure Hash algorithm 1; Arnold transformation; matrix transformation
 
Title: A topology generator for Gnutella-like peer-to-peer overlay networks
Authors: HUANG Xinli, QIAN Haifeng, WU Zengde
PP: 760-772
Abstract: Objective: Propose FitGnu, a new topology generator, to accurately reproduce advanced topological characteristics of Gnutella-like complex networks. Methods: By introducing into novel techniques like explicitly self-sustaining power-law node degree distributions during topology generating, utilization of both topological and domain-inspired heuristic knowledge, enhancing the effect of the fit-get-richer philosophy, avoidance of the appearance of the winner-takes-all phenomenon, consideration of topology growth and evolution, and allowing local-world preferential attachment and global-world random attachment. Results and conclusion: The FitGnu topology generator has been proved, theoretically and experimentally, to be able to generate topologies that can give a more comprehensive and precise characterization of topologies of real-world Gnutella-like complex networks, with regard to the properties like scale-free degree distribution, small-world, rich-club, degree-degree correlation, and community structure.
Keywords: computer network; Gnutella-like networks; complex networks; topology generating; preferential attachment
 
Title: An improve linear discriminant analysis method based on regularization
Authors: GUO Lihua, JIN Lianwen
PP: 755-759
Abstract: Based on linear discriminant analysis (LDA) method, this paper proposes an improved LDA (ILDA) method to overcome the multi-model problem of LDA. In the ILDA method, the between-class scatter matrix and within-class scatter matrix are regularized, and some rules are introduced to optimize the Eigen analysis of LDA using matrix trace judgment. Finally, some experimental results show that ILDA method can preserve the ability to choose the discriminant low-dimension subspace, and overcome some multi-model problems.
Keywords: image processing; linear discriminant analysis; regularization; multi-model problem
 
Title: Design and implementation of privilege management framework based on core RBAC model
Authors: WU Bo, WANG Jing
PP: 749-754
Abstract: With core role based access control (RBAC) and some mainstream selections in jave platform, enterprise edition (JavaEE), this paper designs and implements the privilege management framework which consists of user login modules and a variety of management operations modules that can manage users, roles and privileges.
Keywords: computer application; role based access control; Java plantform, enterprise edition; privilege management
 
Title: The standardization and automation of MS Word document templates in scientific paper writing
Authors: LI Zongzhe, WANG Yongxian
PP: 743-748
Abstract: In order to reduce heavy workloads for editing current scientific papers template and meet the requirements of data exchange, this paper combines with MS Word's document editing functions with VBA’s automation technology. To achieve standardization of scientific paper writing, the paper designs many strategies, such as windows form for inputting information, user-defined document format and data protection. By implicating this method to Sciencepaper Online, its practicality and effectiveness are verified.
Keywords: office automation; visual basic fou application; document template; bookmark; field; document variable
 
Title: Abstract view of 3D navigation framework based on XNA
Authors: ZHANG Tao, SHI Wenyan, XIE Buying
PP: 737-742
Abstract: This paper gives an abstract view of 3D navigation framework based on XNA. Basic procedure of XNA program, load of models and its position setting, camera’s position and setting of view frustum were introduced, as well as human-computer interaction of keyboard inputting, immersive sound effects and audio, and collision detection. It was a practical technique route using XNA to develop 3D navigation framework from the effect and efficiency.
Keywords: computer simulation; XNA; DirectX; 3D; navigation
 
Title: Recommendation algorithm based on graph-model considering user background information
Authors: TAN Yuwei, WANG Ziqi, ZHANG Ming
PP: 732-736
Abstract: This paper proposes a graph-based recommendation algorithm, which uses the user-item-rating data to construct a graph model and improves the model by adding user background information. The random walk with restart algorithm is applied to generate the final recommendation set. The improvement in accuracy on sparse data is illustrated by the experiments on the MovieLens dataset, comparing with the collaborative filtering algorithm.
Keywords: data base; personalized recommendation; random walk with restarts; collaborative filtering; user background information
 
Title: Intelligent question-answer system based on Web services composition
Authors: ZENG Cheng, LIU Bo, MA Jingyan, ZENG Qing, LIU Yang, WANG Zhenzhen
PP: 724-731
Abstract: This paper transforms the user question to question-answer service requirement based on the requirement meta-description framework rde-goal-process-service(RGPS), which passes through requirement recognition, requirement analysis, requirement verification and so on. Then a local services database constructed by dynamically mining software services in internet is used to generate the intelligent question-answer service, which could answer some similar questions, with services messages composition technology based on services relationship network. The paper develops an intelligent question-answer system(IQAS)Uniponse in the traffic domain which verifies the effectiveness and feasibility of our method.
Keywords: computer software; Uniponse; Web services; red-goal-process-service; intelligent question-answer system; ontology
 
Title: A parameter particle swarm optimization algorithm for sensor of electrical capacitance tomography
Authors: LI Yan, ZHU Yandan
PP: 718-723
Abstract: Electrical capacitance tomography (ECT) is a process imaging technology based on the mechanism of capacitive sensor. Based on 12 electrode capacitance array sensor ECT system, this paper describes the calculation of sensitivity field, using large-scale ANSYS finite element analysis tool, establishes capacitance sensor structural model, and gets the distribution of sensitivity field between the electrodes, analyzes the capacitance changes of the capacitance sensor under different parameters, in order to avoid oscillation of particle globally and falling of particle into local optimum, proposes the mixed new algorithm of improved PSO and improved chaotic search strategy. For the goal of the system performance of the sensitivity field's overall sensitivity size, optimizes the structure of capacitive sensor, finds out the optimal structural parameters of the sensor. This paper provides a new way of thinking for the electrical capacitance tomography image reconstruction.
Keywords: computer system architecture; electrical capacitance tomography; the sensitivity field; sensor; particle swarm optimization
 
Title: A new nonlinear diffusion algorithm based on dual-tree complex wavelet for image multiplicative noise removal
Authors: YIN Shouyao, XIAO Liang, ZHANG Fanbiao
PP: 712-717
Abstract: According to the nonlinear difussion mechanism, this paper proposed a new nonlinear difussion algorithm based on dual-tree complex wavelet and total variation. A partial differential equation (PDE) model is proposed using multiplicative noise data fidelity term and divergence term based on dual-tree complex wavelet shrinkage. The numerical scheme is also presented. Experimental results show that this algorithm has better performance comparing with the multiplicative denoising AA algorithm.
Keywords: image processing; image denoising; dual-tree complex wavelet; nonlinear diffusion
 
Title: An improved local binary pattern face recognition method
Authors: LIANG Wumin, SONG Jiatao, XIE Gang, XIE Keming, WANG Liang
PP: 705-711
Abstract: In the face recognition system, the illumination condition is a very important issue. In this paper, in order to effectively overcome the influence of the illumination change, an improved local binary pattern method is proposed. Firstly, neighborhood mean was used as a threshold to obtain better description of the local texture. Secondly, in order to better describe and reflect the large and complex parts of a face image, meanwhile reduce some redundant patterns, 99% of all occurred patterns of the LBP patterns were used as the final patterns. The original image was processed based on the final patterns, and the improved local binary pattern (ILBP) image was obtained. Finally principal component analysis (PCA) was used for classification. Experiments based on AR and Yale face database show that the ILBP image combined with PCA can significantly improve recognition accuracy and especially have strong robustness to illumination changes.
Keywords: image processing; face recognition; local binary pattern; principal component analysis; illumination
 
Title: Action detection based on visual attention
Authors: LIU Shunbin, ZHENG Huicheng
PP: 698-704
Abstract: Visual attention in biological vision systems helps to focus processing on salient regions of the visual field. In this paper, visual attention is applied to action detection by combining with a patch-correlation approach. A visual attention model based on intensity, color and motion information is implemented to extract salient spatial-temporal regions in video. During the action detection procedure, only the salient patches or regions are correlated between the query video and the target video, which reduces dramatically the computational cost and improves the robustness. Experimental results of human action detection in video demonstrate the effectiveness of the proposed method.
Keywords: computer vision; video analysis; action detection; visual attention
 
Title: Metadata model of virtual experiment components based on SVG
Authors: YU Xingbin, PAN Rongjiang
PP: 691-697
Abstract: The paper proposes a metadata model of virtual experiment components, which includes the representation of visual, functional, and multi-state information. The metadata model is based on scalable vector graphics (SVG) standard and has the characteristic of completeness, data independence, extendibility and portability. The proposed metadata model is suitable for designing virtual experiment components used in virtual experiments.
Keywords: computer applications; virtual experiment; experiment component; metadata model; scalable vector graphics
 
Title: Tower-like master-slave model for parallel artificial immune system
Authors: QI Yutao, LIU Fang
PP: 683-690
Abstract: This paper presents a tower-like master-slave model (TMSM) for parallel artificial immune systems. Based on TMSM, the parallel immune memory clonal selection algorithm (PIMCSA) is also proposed. TMSM is a two level coarse-grained parallel artificial immune model with distributed immune response and distributed immune memory. In PIMCSA, vaccines are extracted and migrated between populations rather than antibodies as has been done in parallel genetic algorithms, it is a good balance between the diversity maintenance of populations and the convergent speed of the algorithm. Experimental results on the function optimization and travelling travelling saleman problems (TSP) show that PIMCSA achieves good performance in terms of both solution quality and computation time.
Keywords: pattern recognition; parallel artificial immune system; clone selection; function optimization; travelling saleman problem
 
Title: Hierarchical segmentation for identifying activity stops from GPS trajectories
Authors: ZHANG Zhihua, JI Minhe
PP: 673-682
Abstract: In this paper, currently available methods for identifying activity stops from GPS travel trajectories were examined, and their inability to accommodate data noise and lack of computational efficiency were identified. Based on the observation of multi-level activities imbedded within the trajectory, a hierarchical segmentation method was proposed to cope with the issue of varying spatial scales in which different activities take place. By recognizing the interweaving relationship between stops and moves, the new method starts out from generating basic segments from adjacent GPS points, ten combines adjacent segments into state segments according to their duration similarity, and further brings in some other attributes to determine activity stops and trips at different spatial scales. The algorithm was tested with sample GPS track data collected from 11 survey respondents over a week in Shanghai. Results indicated that the multi-level segmentation method could improve both classification accuracy and computational efficiency over the traditional density-based segmentation methods.
Keywords: matrix recognition; semantic GPS trajectories; hierarchical segmentation; activity stops