Current Issue |
|
|||
April 30,2011 Volume 4,Issue 8 Pages - Subject Area:Basic Subject of Information Science and System Science,Computer Applications,Database,Computer Software,Computer Architecture,Computer Image Processing,Computer Simulation |
||||
Title: An Arnold encryption algorithm based on PN sequence | ||||
Authors: XU Guangxian, JIN Junhong PP: 773-778 Abstract: This paper presents a modified Arnold method, which uses pseudorandom sequence (PN) sequence and secure Hash algorithm (SHA) to generate a random parameter sequence, then divides an image into pieces and carries out Arnold algorithm to the 4 pieces respectively. The Arnold algorithm effectively increases the number of the keys, and overcomes the attack via the exhaustive analysis, which enhances the security. Keywords: information theory; image encryption; pseudorandom sequence; secure Hash algorithm 1; Arnold transformation; matrix transformation |
||||
Title: A topology generator for Gnutella-like peer-to-peer overlay networks | ||||
Authors: HUANG Xinli, QIAN Haifeng, WU Zengde PP: 760-772 Abstract: Objective: Propose FitGnu, a new topology generator, to accurately reproduce advanced topological characteristics of Gnutella-like complex networks. Methods: By introducing into novel techniques like explicitly self-sustaining power-law node degree distributions during topology generating, utilization of both topological and domain-inspired heuristic knowledge, enhancing the effect of the fit-get-richer philosophy, avoidance of the appearance of the winner-takes-all phenomenon, consideration of topology growth and evolution, and allowing local-world preferential attachment and global-world random attachment. Results and conclusion: The FitGnu topology generator has been proved, theoretically and experimentally, to be able to generate topologies that can give a more comprehensive and precise characterization of topologies of real-world Gnutella-like complex networks, with regard to the properties like scale-free degree distribution, small-world, rich-club, degree-degree correlation, and community structure. Keywords: computer network; Gnutella-like networks; complex networks; topology generating; preferential attachment |
||||
Title: An improve linear discriminant analysis method based on regularization | ||||
Authors: GUO Lihua, JIN Lianwen PP: 755-759 Abstract: Based on linear discriminant analysis (LDA) method, this paper proposes an improved LDA (ILDA) method to overcome the multi-model problem of LDA. In the ILDA method, the between-class scatter matrix and within-class scatter matrix are regularized, and some rules are introduced to optimize the Eigen analysis of LDA using matrix trace judgment. Finally, some experimental results show that ILDA method can preserve the ability to choose the discriminant low-dimension subspace, and overcome some multi-model problems. Keywords: image processing; linear discriminant analysis; regularization; multi-model problem |
||||
Title: Design and implementation of privilege management framework based on core RBAC model | ||||
Authors: WU Bo, WANG Jing PP: 749-754 Abstract: With core role based access control (RBAC) and some mainstream selections in jave platform, enterprise edition (JavaEE), this paper designs and implements the privilege management framework which consists of user login modules and a variety of management operations modules that can manage users, roles and privileges. Keywords: computer application; role based access control; Java plantform, enterprise edition; privilege management |
||||
Title: The standardization and automation of MS Word document templates in scientific paper writing | ||||
Authors: LI Zongzhe, WANG Yongxian PP: 743-748 Abstract: In order to reduce heavy workloads for editing current scientific papers template and meet the requirements of data exchange, this paper combines with MS Word's document editing functions with VBA’s automation technology. To achieve standardization of scientific paper writing, the paper designs many strategies, such as windows form for inputting information, user-defined document format and data protection. By implicating this method to Sciencepaper Online, its practicality and effectiveness are verified. Keywords: office automation; visual basic fou application; document template; bookmark; field; document variable |
||||
Title: Abstract view of 3D navigation framework based on XNA | ||||
Authors: ZHANG Tao, SHI Wenyan, XIE Buying PP: 737-742 Abstract: This paper gives an abstract view of 3D navigation framework based on XNA. Basic procedure of XNA program, load of models and its position setting, camera’s position and setting of view frustum were introduced, as well as human-computer interaction of keyboard inputting, immersive sound effects and audio, and collision detection. It was a practical technique route using XNA to develop 3D navigation framework from the effect and efficiency. Keywords: computer simulation; XNA; DirectX; 3D; navigation |
||||
Title: Recommendation algorithm based on graph-model considering user background information | ||||
Authors: TAN Yuwei, WANG Ziqi, ZHANG Ming PP: 732-736 Abstract: This paper proposes a graph-based recommendation algorithm, which uses the user-item-rating data to construct a graph model and improves the model by adding user background information. The random walk with restart algorithm is applied to generate the final recommendation set. The improvement in accuracy on sparse data is illustrated by the experiments on the MovieLens dataset, comparing with the collaborative filtering algorithm. Keywords: data base; personalized recommendation; random walk with restarts; collaborative filtering; user background information |
||||
Title: Intelligent question-answer system based on Web services composition | ||||
Authors: ZENG Cheng, LIU Bo, MA Jingyan, ZENG Qing, LIU Yang, WANG Zhenzhen PP: 724-731 Abstract: This paper transforms the user question to question-answer service requirement based on the requirement meta-description framework rde-goal-process-service(RGPS), which passes through requirement recognition, requirement analysis, requirement verification and so on. Then a local services database constructed by dynamically mining software services in internet is used to generate the intelligent question-answer service, which could answer some similar questions, with services messages composition technology based on services relationship network. The paper develops an intelligent question-answer system(IQAS)Uniponse in the traffic domain which verifies the effectiveness and feasibility of our method. Keywords: computer software; Uniponse; Web services; red-goal-process-service; intelligent question-answer system; ontology |
||||
Title: A parameter particle swarm optimization algorithm for sensor of electrical capacitance tomography | ||||
Authors: LI Yan, ZHU Yandan PP: 718-723 Abstract: Electrical capacitance tomography (ECT) is a process imaging technology based on the mechanism of capacitive sensor. Based on 12 electrode capacitance array sensor ECT system, this paper describes the calculation of sensitivity field, using large-scale ANSYS finite element analysis tool, establishes capacitance sensor structural model, and gets the distribution of sensitivity field between the electrodes, analyzes the capacitance changes of the capacitance sensor under different parameters, in order to avoid oscillation of particle globally and falling of particle into local optimum, proposes the mixed new algorithm of improved PSO and improved chaotic search strategy. For the goal of the system performance of the sensitivity field's overall sensitivity size, optimizes the structure of capacitive sensor, finds out the optimal structural parameters of the sensor. This paper provides a new way of thinking for the electrical capacitance tomography image reconstruction. Keywords: computer system architecture; electrical capacitance tomography; the sensitivity field; sensor; particle swarm optimization |
||||
Title: A new nonlinear diffusion algorithm based on dual-tree complex wavelet for image multiplicative noise removal | ||||
Authors: YIN Shouyao, XIAO Liang, ZHANG Fanbiao PP: 712-717 Abstract: According to the nonlinear difussion mechanism, this paper proposed a new nonlinear difussion algorithm based on dual-tree complex wavelet and total variation. A partial differential equation (PDE) model is proposed using multiplicative noise data fidelity term and divergence term based on dual-tree complex wavelet shrinkage. The numerical scheme is also presented. Experimental results show that this algorithm has better performance comparing with the multiplicative denoising AA algorithm. Keywords: image processing; image denoising; dual-tree complex wavelet; nonlinear diffusion |
||||
Title: An improved local binary pattern face recognition method | ||||
Authors: LIANG Wumin, SONG Jiatao, XIE Gang, XIE Keming, WANG Liang PP: 705-711 Abstract: In the face recognition system, the illumination condition is a very important issue. In this paper, in order to effectively overcome the influence of the illumination change, an improved local binary pattern method is proposed. Firstly, neighborhood mean was used as a threshold to obtain better description of the local texture. Secondly, in order to better describe and reflect the large and complex parts of a face image, meanwhile reduce some redundant patterns, 99% of all occurred patterns of the LBP patterns were used as the final patterns. The original image was processed based on the final patterns, and the improved local binary pattern (ILBP) image was obtained. Finally principal component analysis (PCA) was used for classification. Experiments based on AR and Yale face database show that the ILBP image combined with PCA can significantly improve recognition accuracy and especially have strong robustness to illumination changes. Keywords: image processing; face recognition; local binary pattern; principal component analysis; illumination |
||||
Title: Action detection based on visual attention | ||||
Authors: LIU Shunbin, ZHENG Huicheng PP: 698-704 Abstract: Visual attention in biological vision systems helps to focus processing on salient regions of the visual field. In this paper, visual attention is applied to action detection by combining with a patch-correlation approach. A visual attention model based on intensity, color and motion information is implemented to extract salient spatial-temporal regions in video. During the action detection procedure, only the salient patches or regions are correlated between the query video and the target video, which reduces dramatically the computational cost and improves the robustness. Experimental results of human action detection in video demonstrate the effectiveness of the proposed method. Keywords: computer vision; video analysis; action detection; visual attention |
||||
Title: Metadata model of virtual experiment components based on SVG | ||||
Authors: YU Xingbin, PAN Rongjiang PP: 691-697 Abstract: The paper proposes a metadata model of virtual experiment components, which includes the representation of visual, functional, and multi-state information. The metadata model is based on scalable vector graphics (SVG) standard and has the characteristic of completeness, data independence, extendibility and portability. The proposed metadata model is suitable for designing virtual experiment components used in virtual experiments. Keywords: computer applications; virtual experiment; experiment component; metadata model; scalable vector graphics |
||||
Title: Tower-like master-slave model for parallel artificial immune system | ||||
Authors: QI Yutao, LIU Fang PP: 683-690 Abstract: This paper presents a tower-like master-slave model (TMSM) for parallel artificial immune systems. Based on TMSM, the parallel immune memory clonal selection algorithm (PIMCSA) is also proposed. TMSM is a two level coarse-grained parallel artificial immune model with distributed immune response and distributed immune memory. In PIMCSA, vaccines are extracted and migrated between populations rather than antibodies as has been done in parallel genetic algorithms, it is a good balance between the diversity maintenance of populations and the convergent speed of the algorithm. Experimental results on the function optimization and travelling travelling saleman problems (TSP) show that PIMCSA achieves good performance in terms of both solution quality and computation time. Keywords: pattern recognition; parallel artificial immune system; clone selection; function optimization; travelling saleman problem |
||||
Title: Hierarchical segmentation for identifying activity stops from GPS trajectories | ||||
Authors: ZHANG Zhihua, JI Minhe PP: 673-682 Abstract: In this paper, currently available methods for identifying activity stops from GPS travel trajectories were examined, and their inability to accommodate data noise and lack of computational efficiency were identified. Based on the observation of multi-level activities imbedded within the trajectory, a hierarchical segmentation method was proposed to cope with the issue of varying spatial scales in which different activities take place. By recognizing the interweaving relationship between stops and moves, the new method starts out from generating basic segments from adjacent GPS points, ten combines adjacent segments into state segments according to their duration similarity, and further brings in some other attributes to determine activity stops and trips at different spatial scales. The algorithm was tested with sample GPS track data collected from 11 survey respondents over a week in Shanghai. Results indicated that the multi-level segmentation method could improve both classification accuracy and computational efficiency over the traditional density-based segmentation methods. Keywords: matrix recognition; semantic GPS trajectories; hierarchical segmentation; activity stops |
||||