2016 Vol. 45, No. 5

Multi-Class Variational Model for Natural Image Segmentation
YANG Yong, GUO Ling, YE Yang-dong, ZHOU Xiao-jia
2016, 45(5) doi: 第45卷 第5期 pp:824-831
Abstract:
Communication and Information Engineering
Segmentation of Polarimetric SAR Images Selectively Using Wishart and K Statistical Description
LIU Xiu-guo, XU Qiao, CHEN Qi-hao, CHEN Qi
2016, 45(5): 713-719. doi: 10.3969/j.issn.1001-0548.2016.05.001
Abstract:
To obtain accurate segmentation of polarimetric SAR images in different heterogeneity areas, a new segmentation method is proposed in this paper which selectively uses Wishart and K statistical description based on the fractal network evolution algorithm (FNEA). Specifically, initial objects are derived by using superpixels efficiently generated by simple linear iterative clustering (SLIC) algorithm. Similarity criterion between adjacent objects is defined by Wishart and K distribution depending on the regional heterogeneity index. Then the segmentation procedure for polarimetric data is realized, which makes full use of Wishart and K statistical description. Moreover, simulated data and real data are used to verify the effectiveness of the proposed method. The experiment result shows it can accurately segment different heterogeneity areas on the whole and get more precise boundary in the local details compared with other algorithms.
A High-efficiency and Low-Delay Data Transmission Algorithm in DTN Based on Decoding Anticipate
YAO Yu-kun, ZHU Li-qing, CHEN Xi, REN Zhi, XU Ya-wei, YU Zhi-long
2016, 45(5): 720-725. doi: 10.3969/j.issn.1001-0548.2016.05.002
Abstract:
A high-efficiency and low-delay data transmission algorithm based on decoding anticipate (HLDA) is proposed to address the problems that there exist large overhead for broadcasting beacon which carrys coding coefficient matrix and the destination nodes wait a long time to decode in the hub-based forwarding using network coding in delay tolerant networks(DTN). The HLDA proposed a new mechanism of anticipating decoding by hub nodes is presented in HLDA to decrease the end-to-end delay and proposed a unicast and broadcast mixing mechanism to decrease the overhead. By decreasing the coding coefficient matrix interaction mechanism to further reduce overhead. Simulation results show that HLDA can reduce the overhead and average end-to-end delay as compared to the Hubcode.
Distributed Method for Joint Power Allocation and Admission Control Based on ADMM Framework
LIN Jing-ran, JIANG Chang-xu, LI Qiang, SHAO Huai-zong, LI Yu-bai
2016, 45(5): 726-731. doi: 10.3969/j.issn.1001-0548.2016.05.003
Abstract:
The traditional green networks are usually achieved by minimizing the transmit power under some quality of service (QoS) constraints. In this paper, admission control is integrated with power allocation to pursue further performance improvement in green communication. This technique enables the network to serve as many users as possible when the network cannot guarantee all the users' QoS requirements. Moreover, it classifies the users and picks out a subset of admissible users whose QoS constraints can be easily satisfied with relatively low power consumption; thus the power efficiency is improved. After approximating the original joint power and admission control problem by a convex sparse optimization problem, an efficient distributed algorithm is developed for the approximated problem by fitting it into the alternating direction method of multipliers (ADMM) framework. Specifically, each iteration of ADMM can be computed in closed form, thus giving it very low complexity. The effectiveness of the proposed algorithm is validated by a series of numerical simulations.
Performance Analysis of M-Dimensions Soft-Demodulation for FH/MFSK Systems in the Presence of Partial-Band Noise Jamming
DU Yang, DONG Bin-hong, TANG Peng, WANG Li
2016, 45(5): 732-737. doi: 10.3969/j.issn.1001-0548.2016.05.004
Abstract:
For frequency hopping/M-ary frequency shift keying (FH/MFSK) Systems, combining convolutional coding, a soft decoding algorithm is proposed by adopting M-dimensions energy information for the soft-demodulation of MFSK signals as soft input of decoder, avoiding the approximate bit logarithm likelihood ratio (LLR) calculation. The theoretical performance of the proposed algorithm is analyzed for FH/MFSK systems in the presence of partial-band noise jamming (PBNJ) over additive white Gaussian noise (AWGN) and Rayleigh fading channels. The upper bound for closed-form expressions of BER performance are derived and validated by computer simulations. The results show that the proposed algorithm obtains obvious anti PBNJ processing gain compared to the approximate bit LLR and hard decision.
Design of D2D Transmission Scheme Based on Complex Field Network Coding
WANG Jing, OUYANG Ming-sheng, LUO Wei, WANG Xin-mei
2016, 45(5): 738-743. doi: 10.3969/j.issn.1001-0548.2016.05.005
Abstract:
Terminal users of device-to-device (D2D) communication inevitably will be interfered by cellular users while using multiplexing cellular network spectrum to improve spectrum efficiency. A D2D transmission scheme based on complex field network coding is proposed in this paper. Specifically, as the D2D user multiplexes cellular downlink spectrum, the cellular base station and D2D sender can be regarded as two independent sources, and meanwhile the cellular user as relay node. Moreover, the cellular user encodes the detected cellular signals and D2D signals by complex field network coding, and the D2D receiver can recover D2D signals by adopting maximum likelihood multiuser detection to eliminate cellular signal interference. Theoretical analysis and simulation results show that, compared with traditional D2D transmission schemes, the proposed scheme can improve system achievable rate evidently and reduce symbol error probability, simultaneously ensuring the elimination of cellular signal interference.
Design and Characteristic Analysis for a Flux-Controlled Meminductor Emulator
YANG Ling, SU Jing, HUANG Lin, PU Zhong-zhu
2016, 45(5): 744-749. doi: 10.3969/j.issn.1001-0548.2016.05.006
Abstract:
The emergence of mem-elements provides a new method for circuit design. In this paper, a mathematical model of a flux-controlled meminductor is proposed directly from the definition of meminductor, and a new floating meminductor emulator which does not contain any memristor is designed with common off-the-shelf components. Then the system-level circuit simulation experiments with different alternating signals and different parameters are presented based on Multisim and Matlab simulation platform. The results show that the current-flux characteristic of the designed flux-controlled meminductor is a frequency-dependent pinched loop, this means that the proposed device is a kind of nonlinear inductor with memory and accords with the concept of meminductor and therefore it provides a device simulation entity for producing new application circuits in the field of electronics.
A Single Event Multiple Upset Tolerant Hardening Latch with Triple Interlock
HUANG Zheng-feng, NI Tao, OUYANG Yi-ming, LIANG Hua-guo
2016, 45(5): 750-756. doi: 10.3969/j.issn.1001-0548.2016.05.007
Abstract:
In nanometer process, a single event induced multiple upset cannot be ignored. A novel triple interlock hardening latch is proposed for tolerating single event multiple upset. The proposed latch employs code word state preserving (CWSP) cell which has the filtering function to compose triple interlock. At the end of latch, the CWSP cell is also exploited to tolerate single event multiple upset. The simulation results of HSPICE suggest that compared to triple modular redundancy (TMR) latch and DNCS-SEU latch, the power delay product of the proposed latch is reduced by 58.93% and 41.56% respectively. Meanwhile, the proposed latch has less sensitiveness to process variations.
Study the Methods of Processing Electromagnetic Pulses Generated by the Intense Laser Interacting Solid Targets
LI Ting-shuai, YANG Jin-wen, LIU Xi-yun, YANG Ming, YI Tao, WANG Chuan-ke, WANG Rui, GAO Zhan-zhong, LIU Shen-ye, DING Yong-kun, JIANG Shao-en
2016, 45(5): 757-762. doi: 10.3969/j.issn.1001-0548.2016.05.008
Abstract:
Massive electromagnetic pulses can be generated by the interactions between intensive laser and solid targets in inertial confinement fusion (ICF), which will lead to malfunction of the diagnostic setups and inaccuracy of experimental data. In order to deeply grasp the physical mechanism of electromagnetic pulses and make well preparations for further electromagnetic shielding, it is significant to correctly collect and treat the pulse signals. Due to various interferences, the captured voltage signal is distortion, which needs to be properly treated. The transfer function, derived by deduction and simulation, is deemed as a bridge to interconnect the voltage signal and electric field. Nevertheless, an ill-posed issue in low frequency ranges will be aroused when using the transfer function to obtain electric field. Therefore, we use a Tikhonov regularization method with an L-curve parameter optimization to eliminate the ill-posed issue that is expected to bring about massive noise. To achieve the final electric field, the L-curve diagram is created to optimize the related parameters. The results indicate the L-curve technique can not only resolve the ill-posed problem, but it can also enhance the anti-interference ability.
A High Precision Drive and Detection Method for Projected Capacitive Touch Panel
ZHANG Jin-fang, CHEN Hou-jin, ZHANG Li-da
2016, 45(5): 763-766. doi: 10.3969/j.issn.1001-0548.2016.05.009
Abstract:
Anti-noise performance is a key issue for the implementation of the projected capacitive touch-panel detection circuit. Based on an analysis of driving and sensing methods, a high-precision drive and detection method for projected capacitive touch panel is presented in this paper. Combining both the multiple electrode drive and the IQ(in-phase quadrature) demodulation method for touch sensing, an appropriately selected driving matrix can be designed to significantly reduce the noise aroused by the touch sensor system. In addition, the IQ demodulation method can be used to eliminate completely the phase delays caused by transmission paths. The results indicate that the proposed method can be used to design a high-performance controller chip for capacitive touch-panel detection circuit with a low cost.
Automation Techniques
Kalman Filter Algorithm Based on Backward Differentiation Formula of Delta Operator with Simulation
SONG Zhao-Qing, WANG Kang
2016, 45(5): 767-771. doi: 10.3969/j.issn.1001-0548.2016.05.010
Abstract:
In the high-speed sampling, the parameters of the discrete model based on delta operator tend to the original continuous-time model, and the system has a better digital characteristic when delta operator achieves, which can improve the problem of filtering divergence of discrete Kalman filters based on traditional shift operator. This article uses orthogonal projection approach to derive the Kalman filter equation of stochastic linear discrete systems based on delta operator. The recursive Kalman filter algorithm based on delta operator is given. The simulation results show that in the high-speed sampling, the convergence performance of the derived Kalman filter based on backward differentiation formula of delta operator is better than the traditional Kalman filters.
Kalman Filter Algorithm Based on Backward Differentiation Formula of Delta Operator with Simulation
WANG Hong-bin, ZENG Xing-xing, ZHAO Hong, XIONG Xiao-fu, OUYANG Jin-xin, ZHANG You-qiang, CHEN Tao
2016, 45(5): 772-777. doi: 10.3969/j.issn.1001-0548.2016.05.011
Abstract:
The relay protection based on the current principle is the most widely-used main-protection devices in power systems, its measurement circuit abnormity will directly lead to incorrect tripping or missoperation of protection equipment, which is the high-risk incident that power systems should be vigorously prevented. Polarity is an important characteristic in current measurement circuits of protection secondary systems, but its existing detection methods are still cumbersome and complex, and often bring wrong or leakage inspection events, which will seriously affect the safety and reliability of power systems. Therefore, it is necessary to research more simple and reliable polarity detection measures to ensure the correctness of polarity of current measurement circuits. So this paper defines the generalized ratio, and establishes a polarity diagnosis model of protection current measurement circuits, and analyzes the influence of comprehensive error of measurement circuits to the diagnosis of the polarity faults, and finally obtains the polarity fault criteria of current measurement circuits. Simulation analysis demonstrates the effectiveness of the proposed method.
Extreme Fisher Information Approach for Measurement Uncertainty Evaluation
XIE Xuan, GAO Le, LÜ Jue, LI Xi-feng, XIE San-shan, XIE Yong-le
2016, 45(5): 778-784. doi: 10.3969/j.issn.1001-0548.2016.05.012
Abstract:
The extreme Fisher information (EFI) is originally a measure within the theory of extreme physical information (EPI). In measurement activities, it is hard to accurately and efficiently identify and compensate every effect in measurement and evaluate the incompleteness of the measurement results. So we propose to employ the probability density functions (PDFs) derived from the EFI for estimating the boundary information of the measurement results, that is, the associated measurement uncertainty. The proposed method can characterize the measurement uncertainty more dynamically, with considering the different behaviors of the uncertainty effects and the law governing the system under measurement at the same time. The proposed approach yields the possible distribution of the measurement result in a more practical way rather than the pure mathematical approach, which is more applicable. Finally, the effectiveness of the proposed EFI method is demonstrated by the numerical results of two practical instances.
Multiple Layers Backscatter Model of Wheat for S Band
HE Lei, TONG Ling, CHEN Yan, LI Yu-xia
2016, 45(5): 785-790. doi: 10.3969/j.issn.1001-0548.2016.05.013
Abstract:
The paper presents a multiple layers backscatter model of wheat for S-band based on vector radiative transfer (VRT) theory, which focuses on the microwave character of wheat at the growth stage that wheat ears appeared. The scattered, absorbed and transferred electromagnetic intensity is analyzed based on the law of energy conservation of VRT, and the wheat canopy is divided into three layers, the ears layer, the stem and leaf layer and the soil layer. Furthermore, the total backscatter is composed by using five back-scattering contributions. An advanced integral equation model (AIEM) is applied to simulate the soil backscatter. The extinction and phase matrices are used to compute the scattering intensity decayed and transferred. In addition, Mueller matrix is used to obtain the backscatter values. The backscatter of S-band, which was measured at the West Sichuan Experiment Location in 2011, is applied to analyze and verify the model. The results show the simulated values agreed well with the measured data, and the wheat ears should be taken into account in modeling as a separate element for its influence to backscatter.
Computer Engineering and Applications
A Simplified Table Lookup Decoding Algorithm for Binary QR Codes
BAO Xiao-min, QU Yun-yun, WU Deng-jie, YUAN Zhi-hua, LIU Xu, LI Mei
2016, 45(5): 791-795. doi: 10.3969/j.issn.1001-0548.2016.05.014
Abstract:
A new simplified table lookup algorithm for decoding binary QR codes is presented. The algorithm is based on the properties of QR codes and the weights of syndromes. The decoding table is composed of the vectors of the form ( e,eH ), where e is an error pattern, of which the error bits are located only in the information part and the number of errors is no more than half of the error-correcting capability of the code, and eH is the syndrome of e . The algorithm can be applied to decoding any binary QR code. Moreover, the number of rows of the lookup table in this algorithm is the smallest one among all known lookup table decoding algorithms for binary QR codes. So this algorithm not only has certain theoretical significance, but also has certain practical value.
Provable Cloud Data Possession Scheme via Third-Party Proxy Dynamic Operations
ZHAO Yang, REN Hua-qiang, XIONG Hu, CHEN Yang
2016, 45(5): 796-801. doi: 10.3969/j.issn.1001-0548.2016.05.015
Abstract:
In the traditional cloud storage system which supports dynamic operations, the computing and communication cost derived from the dynamic operations to the file is undertaken by the user completely. It brings user the corresponding pressure on computation and communication. In order to solve this problem, we design a provable data possession scheme via third-party proxy dynamic operations in clouds. In this scheme we bring in a powerful third-party auditor, the users can delegate it to perform the audit and fulfill the dynamic operations. In this processing, the system can ensure the user's data privacy in the third party auditor. Finally, the security and performance analysis show that our scheme can complete the audit task efficiently and securely.
The Method of Model Checking Policy of Multi-Agent Interaction
ZHANG Tao, XIE Hong, HUANG Shao-bin
2016, 45(5): 802-807. doi: 10.3969/j.issn.1001-0548.2016.05.016
Abstract:
A verification method of multi-agent interaction policy is proposed based on model checking. The model of system is specified with obligation policy language and it is converted to the input model of model checker NuSMV based on its operational semantics, the properties of system depending on different types of policy conflicts are represented with temporal logic, and the violations of properties are detected by using NuSMV model checker, which can provide the counterexample and trace it back to the errors in interaction policy. The result shows that the method can improve the efficiency of verifying interaction policy, and it ensures the correctness of the design of Multi-Agent systems.
A Secure Computation Scheme of Inner Product Based on Fully Homomorphic Encryption
DENG Jiang, XU Chun-xiang, YANG Hao-miao
2016, 45(5): 808-811. doi: 10.3969/j.issn.1001-0548.2016.05.017
Abstract:
Among many approaches to solve the problem of top-k retrieval over encrypted cloud data, we focus on an approach with homomorphic encryption, which is public key encryption supporting some operations on encrypted data. In top-k retrieval of encrypted data, the inner product is often used as a metric to compute the similarity between the file feature vector and the query vector. In this paper, we propose an efficient scheme to compute the inner product on encrypted data using the homomorphic encryption based on the learning with errors over ring (RLWE) problem, in which batch and packing techniques are adopted to achieve lower computation and communication cost.
Certificateless Partially-Blind Signature Scheme with Provable Security
ZHAO Zhen-guo
2016, 45(5): 812-818. doi: 10.3969/j.issn.1001-0548.2016.05.018
Abstract:
The high computation costs are required in existing certificateless partially-blind signature (CLPBS) schemes. In this paper, we first analyze the security of Shao et al.'s CLPBS scheme and then present a new CLPBS scheme based on the elliptic curve cryptography (ECC). The security analysis indicates that the proposed CLPBS scheme is provably secure in the random oracle model. Detailed analysis shows that the proposed CLPBS scheme not only addresses security weaknesses with previous schemes, but also has better performance.
Research on SMT Solder Segmentation Based on MRF Frame
SONG Qiang, RU Bei, LIU Ling-xia
2016, 45(5): 819-823. doi: 10.3969/j.issn.1001-0548.2016.05.019
Abstract:
Based on Markov random field (MRF) image segmentation frame, this paper presents a better partitioning algorithm for surface mount technology (SMT) solder segmentation which is the simulated annealing algorithm based on Gibbs sampling, and discusses the main factors which affect the segmentation effect. Finally this algorithm is compared with the traditional Gibbs algorithm and simulated annealing algorithm. It is shown from the experiment that the proposed algorithm only needs a few artificial interactions to reduce the sample dimensions and decrease the optimization and convergence time, and it has the fastest convergence speed to obtain the global optimization, with high segmentation success rate and accurate result. The segmentation result provides the guarantee for the further quality analysis of solder joints.
Research on Respiratory and Local Field Potential of Brain
GUO Zhen, LI Hui, WU Wei
2016, 45(5): 832-838. doi: 10.3969/j.issn.1001-0548.2016.05.021
Abstract:
Electroencephalogram (EEG) signals are made up of innumerable nerve discharges, so it is full of challenges to study the relationship between brain and physiological stimulus. According to the mechanism characteristics of EEG signals and breathing, the theory of wavelet transformation is used in this paper to decompose and reconstruct the main components of local potential signals. This paper analyzes the major component of EEG signals related to breathing by the application of main composition analytic means, and shows the associated relationships and the periodic relationship between sub-bands and breathing. The radial basis function (RBF) neural networks method is introduced to identify the relational models of the breathing of brain system and local potential signals.
Complexity Sciences
Unknown Words Recognition Based on Context-Sensitive Algorithm
XIA Hu, HUANG Wen-qian
2016, 45(5): 839-844. doi: 10.3969/j.issn.1001-0548.2016.05.022
Abstract:
Existing unknown words recognition methods mainly focus on unknown words with some specific structure, such as names, places and organizations. However, with the booming of e-commerce and social networking, more and more unknown entity words with uncertain structures appear in specific areas. In order to handle this problem, this paper presents two algorithms of unknown words recognition based on context-sensitive method. We first calculate correlations between any two words in sequence to get support of any potential combination, then filter out wrong combinations by filtering module, and achieve the recognition aiming at the non-deterministic structure of unknown words. Experiment results indicate that two algorithms can achieve a high accuracy. Besides, they can adapt to different application scenarios by adjusting the parameters.
Application of Abnormal Links Analysis in Restoring Power Networks
GUO Ting-ting, ZHAO Cheng-ye
2016, 45(5): 854-859. doi: 10.3969/j.issn.1001-0548.2016.05.024
Abstract:
Some special links in the power system networks play a key role under the restoration process of large area breakout. This paper proposes a network reconfiguration strategy based on the analysis of the abnormal links. By ranking the abnormalities of these real links through link prediction algorithms, we establish a Skeleton-network recovery strategy, aiming at prioritizing restoring of nodes with high abnormalities, and then recover another links according to their significance. The strategy not only can connect the power generator quickly but also restore important routes timely, showing potential significance in practice.
Bioelectronics
The Study of Mentality Facticity Identification Based on Approximate Entropy of Event Related Potentia
ZHAO Min, ZHAO Chun-lin
2016, 45(5): 860-864. doi: 10.3969/j.issn.1001-0548.2016.05.025
Abstract:
The present study focuses on the identifying subject's mentality facticity during concealed information test (CIT). Total 15 subjects were tested in CIT paradigm and the Event Related Potential (ERP) evoked by three categories stimuli was obtained simultaneously. The results show that the Approximate Entropy (ApEn) of ERPs decrease as stimulus appears and increase as stimulus over. Meanwhile, decreasing percentage of ApEn was employed as quantitive parameter, it is found that the parameter of ERPs corresponding to irrelevant stimulus is significantly larger than that of probe and target stimulus (p<0.001). The findings indicate that decreasing percentage of ApEn could be used as an additional feature parameter to identify subject's concealed information effectively.
Analysis Method of the Aging Property of Electric Field Influence on Seeds and Its Application
BAO Siqin-gaowa, MA Zhan-xin, DING Chang-jiang
2016, 45(5): 865-872. doi: 10.3969/j.issn.1001-0548.2016.05.026
Abstract:
It is a very difficult problem on how to determine the weights between the biological indexes in comprehensive evaluation of biological information. In this paper, we apply the non-parametric generalized data envelopment analysis method to form a comprehensive evaluation method for analyzing the aging property of electric field influence on plant seeds. This method can not only give the individual information of seeds, but also overcome the difficulties of determining index weigh. Then, we analyze the aging property of influence of electric field on wheat seeds by using this method. The results show that the seedling morphological indicators of wheat seeds present oscillatory changes with the increase of electric field intensity when the scope of field strength is 0.5kV/cm~6.0kV/cm, and the significant effects gradually disappear with the extension of storage time.