Home > Highlights of Sciencepaper Online > Current Issue

 
 
 
ISSN 1674-2850
CN 11-9150/N5
 
Current Issue
Previous Issue  |  Next Issue
August 30,2013
Volume 6,Issue 16
Pages -
Subject Area:Control Theory,Algorithm Theory,Computer Software,Computer Information Management System,Data Security and Computer Security,Computer Image Processing,Computer Applications,Computer Network
 
Title: An ant colony algorithm for permutation flow shop problem
Authors: SHANG Ke, FENG Zuren, KE Liangjun
PP: 1576-1582
Abstract: In this paper, the permutation flow shop problem (PFSP) with the objective to minimize makespan or maximum completion time was studied, and it was a well-known NP-hard combinatorial optimization problem. An algorithm, called finite grade ant colony optimization (FGACO), was proposed to solve permutation flow shop problem. The main characteristic of this algorithm was that the updated quantities of pheromone trails were independent of objective function values, and an effective heuristic information was adopted. Furthermore, based on traveling salesman problem (TSP) method, the original PFSP was transformed into TSP, then the TSP was solved by the proposed algorithm. The developed algorithm had been applied to the benchmark problems. Comparison results demonstrated that the performance of the proposed algorithm was promising.
Keywords: systems engineering; ant colony algorithm; finite grade pheromone; permutation flow shop problem
 
Title: H∞ state feedback control of piezoelectric actuator based on LMI
Authors: LIU Xiangdong, CAI Chunxia
PP: 1569-1575
Abstract: In this paper, a hysteresis observer was established to compensate the hysteresis of Bouc-Wen model of the piezoelectric actuators. Then regarding the observation error and reference input as system disturbance, the H∞ state feedback controller was devised to achieve closed-loop control of the piezoelectric actuators based on linear matrix inequality (LMI). The feedforward compensation opened-loop control and H∞ control simulation were conducted in the piezoelectric actuator nano positioning platform. The simulation results showed that the state feedback closed-loop control could achevie high precision and good robustness.
Keywords: control theory; piezoelectric actuator; Bouc-Wen model; feedforward compensation; H∞ control
 
Title: Bi-directional intelligent optimizing model for the spinning process based on an immune neural network
Authors: LIANG Xiao, DING Yongsheng, HAO Kuangrong, WANG Huaping
PP: 1558-1568
Abstract: In this paper, a bi-directional intelligent optimizing model for the spinning process was proposed based on an artificial immunity mechanism (AIM), along with the expert system in which the proposed model was embedded. The bi-directional optimizing mechanism was formed by analyzing large numbers of data in production. With such a mechanism, the reasonable plans for the parameter configuration of the spinning production line could be acquired, and the performance of the fibers could also be predicted and evaluated. Simulation results showed that the proposed model had the ability to establish the bi-directional model between the production configuration and the fiber quality indices, which outperformed the conventional neural network-based model. The proposed model can not only reveal the internal connections between the manufacturing process of fiber and its corresponding quality indices, but provide a useful tool for the manufacturing personnel on the development and design of fiber products as well.
Keywords: control theory; bi-directional intelligent optimizing model; immune neural network; artificial immune systems; spinning process
 
Title: Traffic detection algorithm based on virtual wireframe
Authors: LIU Tengfei, HUANG Zhangcan
PP: 1550-1557
Abstract: This paper proposed a traffic statistical algorithm based on virtual line box, and the target vehicle occlusion was detected by the split virtual line box target connected domain tracking and matching through splitting virtual line box. In order to solve the problems of target vehicle differential binarized hollow and the distal large body connected domain splitting, this article used a series of morphological algorithm processing to treat differential binarization connected domain in the virtual line box, and suggested that using proximal virtual line box vehicle traffic to correct the remote line box statistical error, which improved the accuracy of the traffic flow statistics algorithm.
Keywords: algorithm theory; virtual wireframe; traffic flow; detect; connected domain
 
Title: A blog gender classification model based on sentiment topic
Authors: WANG Hao, YANG Liang, LIN Hongfei
PP: 1542-1549
Abstract: This paper provided a blog gender classification model based on sentiment topic. Firstly, the model provided a sentiment extension method based on latent Dirichlet allocation (LDA). Then, sentiment topics of men and women were proposed using WordNet-Affect sentiment extension, and a selecting method was also proposed to get the useful topic through LDA. At last, the blog gender classification model was provided by mixing sentiment topic and inside dictionary. The experiment results showed that sentiment topic was useful to advance the blog gender classification result.
Keywords: natrual language processing; blog gender classification; sentiment topic; latent Dirichlet allocation model
 
Title: Implement of subspace Gaussian mixture models in Chinese speech recognition system
Authors: XIAO Yunpeng, ZHU Weibin
PP: 1537-1541
Abstract: Hidden Markov model (HMM) currently serves as the basic acoustic model of speech recognition system. However, the number of model parameters has a dramatic increase after taking account of context. Due to the limitation of training speech, the parameters of classic model may not be fully trained. This paper introduced a new framework which was named subspace Gaussian mixture model (SGMM). Different from the traditional HMM structure, this model was defined by vectors associated with each state with a less dimension, together with a global mapping from this vector space to the space of parameters of SGMM. The results showed that this SGMM approach gave better results than the conventional HHM, with word error rate decreasing 6.44% absolutely (from 23.43% to 16.82%) and 28% relatively. Besides, this new method was compatible with exiting model refine method such as discriminative training, feature transformation and speaker adaptation.
Keywords: pattern recognition; speech recognition; hidden Markov model; subspace Gaussian mixture model
 
Title: Distributed session management model and implement based on the zookeeper
Authors: WEN Xiong, LIU Xiaohong
PP: 1530-1536
Abstract: With the development of the Internet, more and more J2EE applications are deployed to the distributed environment, which make the existing distributed session management difficult to meet the demand in distributed environment. This paper presented an improved distributed session management model based on the zookeeper, and designed data name-space of the new model after study of the structure, load-balance and cache strategy of tomcat delta session manager, and analysis of the zookeeper as a storage system. Finally, theoretical analysis and experimental results showed that this model had a better performance in throughput and load capacity with a better scalability and reliability.
Keywords: computer software; session management model; zookeeper; distributed coordination system
 
Title: Design and implementation of the order inspection system based on JMS
Authors: KUANG Rongjie, YANG Huidong
PP: 1526-1529
Abstract: This design was implemented by Eclipse development platform in jdk1.6 development environment. The design of datasheet was based on MySQL. This system was designed by producer-consumer design patterns, and was divided into two parts, the two parts was connected by Java message service (JMS) and could run independently. This design had done the optimization on configuring system information and controlling processing thread. System information was saved in the datasheet of background database, so that it was easy to extract for the system, and improved feasibility to achieve the function of managing the system information by the form of windows. On the other hand, this design reduced the number of consumer threads to two by reflex mechanism of Java under the premise of unaffecting the processing speed. Meanwhile, it made sure that the system needn’t add new code when manager added new system information, so that the extensibility of system was improved. After testing this system, the running results proved that this system could find out the wrong orders immediately and do the corresponding treatment. When manager added new information into the system, it also could work normally, and get a correct result.
Keywords: computer information management system; Java message service; MySQL; payment platform; producer; consumer
 
Title: Lossless digital watermarking algorithm of image maps based on band superimposition
Authors: SUN Jianguo, ZHANG Guoyin
PP: 1516-1525
Abstract: To realize the invasion identification and copyright authentication, a novel digital watermarking algorithm for image maps based on band superimposition was introduced. A band lossless superimposed technology was proposed for the compound images, namely the map owner’s fingerprint was taken as watermarks, and the IMG formatted file of image maps was decomposed. The finger features were defined as watermarking, which could be embedded into the files of the map. Experiments and analysis showed that this algorithm had good stability, besides providing services of copyright protection, the model improved the robustness and anti-converting attacks.
Keywords: information security; information hiding; digital watermarking; image map; authentication
 
Title: Seed image edge detection based on local pixels similarity
Authors: LIN Hai, XING Yan, HONG Peilin
PP: 1508-1515
Abstract: This paper introduced an edge detection algorithm based on local area pixel similarity, which compares the gray level of the pixel with one of every pixel in its neighborhood, and calculates the local pixels’ similarity. If the similarity is less than a certain threshold, the pixel is identified as an edge point. The principle of the algorithm was elaborated and the selection methods of the template and threshold in the algorithm were discussed. This edge detector was realized in Matlab language. The experimental results showed that this edge detector was superior to traditional edge detection methods for noisy images, and this edge detection algorithm was suitable for noisy images or low-contrast images.
Keywords: computer image processing; edge detection; local pixels similarity; gradient operator
 
Title: An exploration of drug-drug interaction extraction using biomedical texts
Authors: ZHAO Jiang, LAN Man, SHI Honglei
PP: 1501-1507
Abstract: The first challenge of drug-drug interaction extraction (DDIExtraction) is to determine whether a pair of drugs appearing in a given sentence has interaction information. This challenge is the first attempt at extraction of drug-drug interaction (DDI) information in wide community, which provides an consolidate platform to evaluate different information extraction techniques. In this paper, based on this challenge, we compared and evaluated the effectiveness of different strategies of example generation from texts and different feature types for drug relation extraction. Our comparative results showed that 1) drug-drug interaction classification at drug entity pair level outperformed that at sentence level; 2) simple natural language processing (NLP) output did not improve performance and more advanced way of incorporating NLP output needed to be explored.
Keywords: computer application; drug-drug interaction; comparative test; information extraction; natural language processing
 
Title: A notification service based on real-time crawling
Authors: YANG Tongfeng, MA Jun
PP: 1494-1500
Abstract: With the explosive growth of the internet information and the increasing dependence of people on web, the traditional model that user browsing web pages actively can not satisfy the real-time and full the demand on information. In this paper, a notification system was proposed: user specified the web page whose information needed to be obtained at first, then the system semi-automatically created the extraction template, and added to user configuration, and the system monitored all the pages that users specified, sended message to users by the way they wanted. This system supported many notification methods such as email, short message, mobile application, and allowed the users to obtain the new information. User’s interest was detected with their history data, and messages of related topics were recommended to them as well. At last, the real-time performance and effectiveness of the system was evaluated.
Keywords: computer application; information retrieval; real-time crawling; information extraction
 
Title: Enterprise knowledge map building based on Wiki technology
Authors: JIANG Zeming, ZHANG Lei
PP: 1487-1493
Abstract: Based on Wiki technology and a case of the actual situation of a planning and designing institute in telecom, this paper proposed a practical roadmap to build enterprise knowledge map for document intensive enterprises. The roadmap used an iterative methodology to capture organizational knowledge and build the basic structure of knowledge map. Taking Wiki as the core technology and combining with other Web technologies, this knowledge map provided easy manageable and maintainable features.
Keywords: computer application; knowledge map; Wiki technology; knowledge management
 
Title: An inter-domain routing method based on prefix substitution
Authors: ZHANG Wei
PP: 1481-1486
Abstract: Aiming at the massive address space of IPv6 and the tangible routing scalability problem in a large scale routing system, this paper proposed a method to enhance the route aggregation capacity of the Inter-domain routing of the Internet. This method took advantages of the abundance of the IPv6 address space, and separated the inter-domain-routing-used address space from the customer's provider independent addresses. Autonomous systems should maintain a mapping between these two address spaces, and implement prefixes substitution in the routing and packet forwarding processes. By applying provider aggregateable prefixes for the inter-domain routing, this method suppressed the route table and enhanced the routing scalability of the IPv6 networks, which would relieve the potential routing scalability problem caused by the inflation of the border gateway protocol (BGP) route table. This paper also gave a theoretical analysis on evaluating the proposed method.
Keywords: computer network; routing; border gateway protocol; IPv6; scalability
 
Title: Layered authentication method and its application in vector network
Authors: ZHANG Hanshu, LIANG Mangui, LIU He
PP: 1473-1480
Abstract: This paper designed a recursive and layered network access authentication method and discussed its practical application in a new data communication network named “vector network”(VN) . Firstly, the paper briefly described the abstract model of VN-identification framework and authentication framework. Then, the thesis improved VN authentication architecture system and proposed a united, recursive and layered authentication mechanism based on the new authentication architecture. With this mechanism, users could access to the network, move between different networks and be charged. Therefore, this method provided basic supports for network management, control, operation, security and QoS. Finally, this paper applied the new mechanism for the actual network.
Keywords: computer network; vector network; access authentication; layered; 802.1x