Current Issue |
|
|||
August 30,2013 Volume 6,Issue 16 Pages - Subject Area:Control Theory,Algorithm Theory,Computer Software,Computer Information Management System,Data Security and Computer Security,Computer Image Processing,Computer Applications,Computer Network |
||||
Title: An ant colony algorithm for permutation flow shop problem | ||||
Authors: SHANG Ke, FENG Zuren, KE Liangjun PP: 1576-1582 Abstract: In this paper, the permutation flow shop problem (PFSP) with the objective to minimize makespan or maximum completion time was studied, and it was a well-known NP-hard combinatorial optimization problem. An algorithm, called finite grade ant colony optimization (FGACO), was proposed to solve permutation flow shop problem. The main characteristic of this algorithm was that the updated quantities of pheromone trails were independent of objective function values, and an effective heuristic information was adopted. Furthermore, based on traveling salesman problem (TSP) method, the original PFSP was transformed into TSP, then the TSP was solved by the proposed algorithm. The developed algorithm had been applied to the benchmark problems. Comparison results demonstrated that the performance of the proposed algorithm was promising. Keywords: systems engineering; ant colony algorithm; finite grade pheromone; permutation flow shop problem |
||||
Title: H∞ state feedback control of piezoelectric actuator based on LMI | ||||
Authors: LIU Xiangdong, CAI Chunxia PP: 1569-1575 Abstract: In this paper, a hysteresis observer was established to compensate the hysteresis of Bouc-Wen model of the piezoelectric actuators. Then regarding the observation error and reference input as system disturbance, the H∞ state feedback controller was devised to achieve closed-loop control of the piezoelectric actuators based on linear matrix inequality (LMI). The feedforward compensation opened-loop control and H∞ control simulation were conducted in the piezoelectric actuator nano positioning platform. The simulation results showed that the state feedback closed-loop control could achevie high precision and good robustness. Keywords: control theory; piezoelectric actuator; Bouc-Wen model; feedforward compensation; H∞ control |
||||
Title: Bi-directional intelligent optimizing model for the spinning process based on an immune neural network | ||||
Authors: LIANG Xiao, DING Yongsheng, HAO Kuangrong, WANG Huaping PP: 1558-1568 Abstract: In this paper, a bi-directional intelligent optimizing model for the spinning process was proposed based on an artificial immunity mechanism (AIM), along with the expert system in which the proposed model was embedded. The bi-directional optimizing mechanism was formed by analyzing large numbers of data in production. With such a mechanism, the reasonable plans for the parameter configuration of the spinning production line could be acquired, and the performance of the fibers could also be predicted and evaluated. Simulation results showed that the proposed model had the ability to establish the bi-directional model between the production configuration and the fiber quality indices, which outperformed the conventional neural network-based model. The proposed model can not only reveal the internal connections between the manufacturing process of fiber and its corresponding quality indices, but provide a useful tool for the manufacturing personnel on the development and design of fiber products as well. Keywords: control theory; bi-directional intelligent optimizing model; immune neural network; artificial immune systems; spinning process |
||||
Title: Traffic detection algorithm based on virtual wireframe | ||||
Authors: LIU Tengfei, HUANG Zhangcan PP: 1550-1557 Abstract: This paper proposed a traffic statistical algorithm based on virtual line box, and the target vehicle occlusion was detected by the split virtual line box target connected domain tracking and matching through splitting virtual line box. In order to solve the problems of target vehicle differential binarized hollow and the distal large body connected domain splitting, this article used a series of morphological algorithm processing to treat differential binarization connected domain in the virtual line box, and suggested that using proximal virtual line box vehicle traffic to correct the remote line box statistical error, which improved the accuracy of the traffic flow statistics algorithm. Keywords: algorithm theory; virtual wireframe; traffic flow; detect; connected domain |
||||
Title: A blog gender classification model based on sentiment topic | ||||
Authors: WANG Hao, YANG Liang, LIN Hongfei PP: 1542-1549 Abstract: This paper provided a blog gender classification model based on sentiment topic. Firstly, the model provided a sentiment extension method based on latent Dirichlet allocation (LDA). Then, sentiment topics of men and women were proposed using WordNet-Affect sentiment extension, and a selecting method was also proposed to get the useful topic through LDA. At last, the blog gender classification model was provided by mixing sentiment topic and inside dictionary. The experiment results showed that sentiment topic was useful to advance the blog gender classification result. Keywords: natrual language processing; blog gender classification; sentiment topic; latent Dirichlet allocation model |
||||
Title: Implement of subspace Gaussian mixture models in Chinese speech recognition system | ||||
Authors: XIAO Yunpeng, ZHU Weibin PP: 1537-1541 Abstract: Hidden Markov model (HMM) currently serves as the basic acoustic model of speech recognition system. However, the number of model parameters has a dramatic increase after taking account of context. Due to the limitation of training speech, the parameters of classic model may not be fully trained. This paper introduced a new framework which was named subspace Gaussian mixture model (SGMM). Different from the traditional HMM structure, this model was defined by vectors associated with each state with a less dimension, together with a global mapping from this vector space to the space of parameters of SGMM. The results showed that this SGMM approach gave better results than the conventional HHM, with word error rate decreasing 6.44% absolutely (from 23.43% to 16.82%) and 28% relatively. Besides, this new method was compatible with exiting model refine method such as discriminative training, feature transformation and speaker adaptation. Keywords: pattern recognition; speech recognition; hidden Markov model; subspace Gaussian mixture model |
||||
Title: Distributed session management model and implement based on the zookeeper | ||||
Authors: WEN Xiong, LIU Xiaohong PP: 1530-1536 Abstract: With the development of the Internet, more and more J2EE applications are deployed to the distributed environment, which make the existing distributed session management difficult to meet the demand in distributed environment. This paper presented an improved distributed session management model based on the zookeeper, and designed data name-space of the new model after study of the structure, load-balance and cache strategy of tomcat delta session manager, and analysis of the zookeeper as a storage system. Finally, theoretical analysis and experimental results showed that this model had a better performance in throughput and load capacity with a better scalability and reliability. Keywords: computer software; session management model; zookeeper; distributed coordination system |
||||
Title: Design and implementation of the order inspection system based on JMS | ||||
Authors: KUANG Rongjie, YANG Huidong PP: 1526-1529 Abstract: This design was implemented by Eclipse development platform in jdk1.6 development environment. The design of datasheet was based on MySQL. This system was designed by producer-consumer design patterns, and was divided into two parts, the two parts was connected by Java message service (JMS) and could run independently. This design had done the optimization on configuring system information and controlling processing thread. System information was saved in the datasheet of background database, so that it was easy to extract for the system, and improved feasibility to achieve the function of managing the system information by the form of windows. On the other hand, this design reduced the number of consumer threads to two by reflex mechanism of Java under the premise of unaffecting the processing speed. Meanwhile, it made sure that the system needn’t add new code when manager added new system information, so that the extensibility of system was improved. After testing this system, the running results proved that this system could find out the wrong orders immediately and do the corresponding treatment. When manager added new information into the system, it also could work normally, and get a correct result. Keywords: computer information management system; Java message service; MySQL; payment platform; producer; consumer |
||||
Title: Lossless digital watermarking algorithm of image maps based on band superimposition | ||||
Authors: SUN Jianguo, ZHANG Guoyin PP: 1516-1525 Abstract: To realize the invasion identification and copyright authentication, a novel digital watermarking algorithm for image maps based on band superimposition was introduced. A band lossless superimposed technology was proposed for the compound images, namely the map owner’s fingerprint was taken as watermarks, and the IMG formatted file of image maps was decomposed. The finger features were defined as watermarking, which could be embedded into the files of the map. Experiments and analysis showed that this algorithm had good stability, besides providing services of copyright protection, the model improved the robustness and anti-converting attacks. Keywords: information security; information hiding; digital watermarking; image map; authentication |
||||
Title: Seed image edge detection based on local pixels similarity | ||||
Authors: LIN Hai, XING Yan, HONG Peilin PP: 1508-1515 Abstract: This paper introduced an edge detection algorithm based on local area pixel similarity, which compares the gray level of the pixel with one of every pixel in its neighborhood, and calculates the local pixels’ similarity. If the similarity is less than a certain threshold, the pixel is identified as an edge point. The principle of the algorithm was elaborated and the selection methods of the template and threshold in the algorithm were discussed. This edge detector was realized in Matlab language. The experimental results showed that this edge detector was superior to traditional edge detection methods for noisy images, and this edge detection algorithm was suitable for noisy images or low-contrast images. Keywords: computer image processing; edge detection; local pixels similarity; gradient operator |
||||
Title: An exploration of drug-drug interaction extraction using biomedical texts | ||||
Authors: ZHAO Jiang, LAN Man, SHI Honglei PP: 1501-1507 Abstract: The first challenge of drug-drug interaction extraction (DDIExtraction) is to determine whether a pair of drugs appearing in a given sentence has interaction information. This challenge is the first attempt at extraction of drug-drug interaction (DDI) information in wide community, which provides an consolidate platform to evaluate different information extraction techniques. In this paper, based on this challenge, we compared and evaluated the effectiveness of different strategies of example generation from texts and different feature types for drug relation extraction. Our comparative results showed that 1) drug-drug interaction classification at drug entity pair level outperformed that at sentence level; 2) simple natural language processing (NLP) output did not improve performance and more advanced way of incorporating NLP output needed to be explored. Keywords: computer application; drug-drug interaction; comparative test; information extraction; natural language processing |
||||
Title: A notification service based on real-time crawling | ||||
Authors: YANG Tongfeng, MA Jun PP: 1494-1500 Abstract: With the explosive growth of the internet information and the increasing dependence of people on web, the traditional model that user browsing web pages actively can not satisfy the real-time and full the demand on information. In this paper, a notification system was proposed: user specified the web page whose information needed to be obtained at first, then the system semi-automatically created the extraction template, and added to user configuration, and the system monitored all the pages that users specified, sended message to users by the way they wanted. This system supported many notification methods such as email, short message, mobile application, and allowed the users to obtain the new information. User’s interest was detected with their history data, and messages of related topics were recommended to them as well. At last, the real-time performance and effectiveness of the system was evaluated. Keywords: computer application; information retrieval; real-time crawling; information extraction |
||||
Title: Enterprise knowledge map building based on Wiki technology | ||||
Authors: JIANG Zeming, ZHANG Lei PP: 1487-1493 Abstract: Based on Wiki technology and a case of the actual situation of a planning and designing institute in telecom, this paper proposed a practical roadmap to build enterprise knowledge map for document intensive enterprises. The roadmap used an iterative methodology to capture organizational knowledge and build the basic structure of knowledge map. Taking Wiki as the core technology and combining with other Web technologies, this knowledge map provided easy manageable and maintainable features. Keywords: computer application; knowledge map; Wiki technology; knowledge management |
||||
Title: An inter-domain routing method based on prefix substitution | ||||
Authors: ZHANG Wei PP: 1481-1486 Abstract: Aiming at the massive address space of IPv6 and the tangible routing scalability problem in a large scale routing system, this paper proposed a method to enhance the route aggregation capacity of the Inter-domain routing of the Internet. This method took advantages of the abundance of the IPv6 address space, and separated the inter-domain-routing-used address space from the customer's provider independent addresses. Autonomous systems should maintain a mapping between these two address spaces, and implement prefixes substitution in the routing and packet forwarding processes. By applying provider aggregateable prefixes for the inter-domain routing, this method suppressed the route table and enhanced the routing scalability of the IPv6 networks, which would relieve the potential routing scalability problem caused by the inflation of the border gateway protocol (BGP) route table. This paper also gave a theoretical analysis on evaluating the proposed method. Keywords: computer network; routing; border gateway protocol; IPv6; scalability |
||||
Title: Layered authentication method and its application in vector network | ||||
Authors: ZHANG Hanshu, LIANG Mangui, LIU He PP: 1473-1480 Abstract: This paper designed a recursive and layered network access authentication method and discussed its practical application in a new data communication network named “vector network”(VN) . Firstly, the paper briefly described the abstract model of VN-identification framework and authentication framework. Then, the thesis improved VN authentication architecture system and proposed a united, recursive and layered authentication mechanism based on the new authentication architecture. With this mechanism, users could access to the network, move between different networks and be charged. Therefore, this method provided basic supports for network management, control, operation, security and QoS. Finally, this paper applied the new mechanism for the actual network. Keywords: computer network; vector network; access authentication; layered; 802.1x |
||||