A novel method for dim moving target detection of synthetic aperture radar SAR image which is based on the S-transformSTdomain coherent analyzing was proposed in this paper.. Making use
Trang 2Volume 98
Trang 5Lecture Notes in Electrical Engineering ISSN 1876-1100
Library of Congress Control Number: 2011929653
c
2011 Springer-Verlag Berlin Heidelberg
This work is subject to copyright All rights are reserved, whether the whole or part of the material
is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, casting, reproduction on microfilm or in any other way, and storage in data banks Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law
broad-of September 9, 1965, in its current version, and permission for use must always be obtained from Springer Violations are liable to prosecution under the German Copyright Law.
The use of general descriptive names, registered names, trademarks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
Typeset & Cover Design: Scientific Publishing Services Pvt Ltd., Chennai, India.
Printed on acid-free paper
9 8 7 6 5 4 3 2 1
springer.com
Trang 6The present book includes extended and revised versions of a set of selected papers from the International Conference on Electric and Electronics (EEIC 2011) , held on June 20-22 , 2011, which is jointly organized by Nanchang University, Springer, and IEEE IAS Nanchang Chapter
The goal of EEIC 2011 is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Electric and Electronics
Being crucial for the development of Electric and Electronics, our conference encompasses a large number of research topics and applications: from Circuits and Systems to Computers and Information Technology; from Communication Systems to Signal Processing and other related topics are included in the scope of this conference In order to ensure high-quality of our international conference, we have high-quality reviewing course, our reviewing experts are from home and abroad and low-quality papers have been refused All accepted papers will be published by Lecture Notes in Electrical Engineering (Springer)
EEIC 2011 is sponsored by Nanchang University, China Nanchang University is a comprehensive university which characterized by "Penetration of Arts, Science, Engineering and Medicine subjects, Combination of studying, research and production" It is one of the national "211" Project key universities that jointly constructed by the People's Government of Jiangxi Province and the Ministry of Education It is also an important base of talents cultivation, scientific researching and transferring of the researching accomplishment into practical use for both Jiangxi Province and the country
Welcome to Nanchang, China Nanchang is a beautiful city with the Gan River, the mother river of local people, traversing through the whole city Water is her soul or in other words water carries all her beauty Lakes and rivers in or around Nanchang bring a special kind of charm to the city Nanchang is honored as 'a green pearl in the southern part of China' thanks to its clear water, fresh air and great inner city virescence Long and splendid history endows Nanchang with many cultural relics, among which the Tengwang Pavilion is the most famous It is no exaggeration to say that Tengwang Pavilion is the pride of all the locals in Nanchang Many men of letters left their handwritings here which tremendously enhance its classical charm
Noting can be done without the help of the program chairs, organization staff, and the members of the program committees Thank you
EEIC 2011 will be the most comprehensive Conference focused on the various aspects of advances in Electric and Electronics Our Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Electric and Electronics We are confident that the conference program will give you detailed insight into the new trends, and we are looking forward to meeting you at this world-class event in Nanchang
Trang 8Honor Chairs
Scholarship Committee Chairs
Scholarship Committee Co-chairs
Organizing Co-chairs
Program Committee Chairs
Publication Chairs
Trang 10Targets Detection in SAR Image Used Coherence Analysis
Based on S-Transform 1
Tao Tao, Zhenming Peng, Chaonan Yang, Fang Wei, Lihong Liu
A Community Detecting Algorithm in Directed Weighted
Networks 11
Hongtao Liu, Xiao Qin, Hongfeng Yun, Yu Wu
Autonomous Rule-Generated Fuzzy Systems Designs through
Bacterial Foraging Particle Swarm Optimization Algorithm 19
Hsuan-Ming Feng
Evolutionary Learning Mobile Robot Fuzzy Systems Design 29
Hua-Ching Chen, Hsuan-Ming Feng, Dong-hui Guo
Radar Waveform Design for Low Power Monostatic
Backscattering Ionosonde 37
Ming Yao, Zhengyu Zhao, Bo Bai, Xiaohua Deng, Gang Chen,
Shipeng Li, Fanfan Su
Space –Time Wireless Channel Characteristic Simulations
Based on 3GPP SCM for Smart Antenna Systems 45
Junpeng Chen, Xiaorong Jing, Qiang Li, Zufan Zhang, Yongjie Zhang
Knowledge Reduction of Numerical Value Information System
Based on Neighborhood Granulation 53
Yu Hua
Effects of HV Conductor Aging Surface Elements, on Corona
Characteristics 61
Nick A Tsoligkas
Trang 11Energy Efficiency Methods in Electrified Railways Based on
Recovery of Regenerated Power 69
M Shafighy, S.Y Khoo, A.Z Kouzani
Prediction of Transitive Co-expressed Genes Function by
Shortest-Path Algorithm 79
Huang JiFeng
Fast Implementation of Rainbow Signatures via Efficient
Arithmetic over a Finite Field 89
Haibo Yi, Shaohua Tang, Huan Chen, Guomin Chen
Novel Resonant-Type Composite Right/Left Handed
Transmission Line Based on Cascaded Complementary Single
Split Ring Resonator 97
He-Xiu Xu, Guang-Ming Wang, Qing Peng
Design of Network Gateway Based on the ITS 105
Zhu Jinfang, Fan Yiming
The Research of Improved Grey-Markov Algorithm 109
Geng Yu-shui, Du Xin-wu
Vehicle Mass Estimation for Four In-Wheel-Motor Drive
Vehicle 117
Zhuoping Yu, Yuan Feng, Lu Xiong, Xiaopeng Wu
A Method of State Diagnosis for Rolling Bearing Using
Support Vector Machine and BP Neural Network 127
Jin Guan, Guofu Li, Guangqing Liu
RLM-AVF: Towards Visual Features Based Ranking Learning
Model for Image Search 135
Xia Li, Jianjun Yu, Jing Li
Design and Implement of Intelligent Water Meter Remote
Monitor System Based on WCF 141
Lilong Jiang, Jianjiang Cui, Junjie Li, Zhijie Lu
Protection of Solar Electric Car DC Motor with PIC
Controller 149
Ahmed M.A Haidar, Ramdan Razali, Ahmed Abdalla,
Hazizulden Abdul Aziz, Khaled M.G Noman,
Rashad A Al-Jawfi
Parameter Design and FEM Analysis on a Bearingless
Synchronous Reluctance Motor 163
Yuanfei Li, Xiaodong Sun, Huangqiu Zhu
Trang 12A Hybrid and Hierarchy Modeling Approach to Model-Based
Diagnosis 173
Dong Wang, Wenquan Feng, Jingwen Li
A New Codebook Design Algorithm of Vector Quantization
Based on Hadamard Transform 181
Shanxue Chen, Jiaguo Wang, Fangwei Li
Studies on Channel Encoding and Decoding of TETRA2
Digital Trunked System 189
Xiaohui Zeng, Huanglin Zeng, Shunling Chen
Selective Block Size Decision Algorithm for Intra Prediction
in Video Coding and Learning Website 195
Wei-Chun Hsu, Yuan-Chen Liu, Dong-Syuan Jiang, Tsung-Han Tsai,
Wan-Chun Lee
Layer Simulation on Welding Robot Model 203
Guo-hong Ma, Cong Wang
Welding Seam Information Acquisition and Transmission
Method of Welding Robot 209
Guo-hong Ma, Bao-zhou Du, Cong Wang
Search Pattern Based on Multi-Direction Motion Vector
Prediction Algorithm in H.264 and Learning Website 217
Tsung-Han Tsai, Wei-Chun Hsu, Yuan-Chen Liu, Wan-Chun Lee
The Formation and Evolution Tendency of Management
Philosophy 225
Wu Xiaojun, Si Hui
Mobility and Handover Analysis of Existing Network and
Advanced Testbed Network for 3G/B3G Systems 231
Li Chen, Xiaohang Chen, Bin Wang, Xin Zhang, Lijun Zhao,
Peng Dong, Yingnan Liu, Jia Kong
High-Layer Traffic Analysis of Existing Network and Advanced
Testbed Network for 3G/B3G Systems 239
Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, Lijun Zhao,
Peng Dong, Yingnan Liu, Jia Kong
Analysis of Cased Hole Resistivity Logging Signal Frequency
Effect on Detection 247
Yinchuan Wu, Jiatian Zhang, Zhengguo Yan
Communication Software Reliability Design of Satelliteborne 253
Shuang Dai, Huai Wang
Trang 13A Moving Objects Detection Method Based on a Combination
of Improved Local Binary Pattern Texture and Hue 261
Guo-wu Yuan, Yun Gao, Dan Xu, Mu-rong Jiang
Stationary Properties of the Stochastic System Driven by
the Cross-Correlation between a White Noise and a Colored
Noise 269
Yun Gao, Shi-Bo Chen, Hai Yang
Improved Power Cell Designed for Medium Voltage Cascade
Converter 281
Liang Zhang, Guodong Chen, Xu Cai
GIS in the Cloud: Implementing a Web Coverage Service on
Amazon Cloud Computing Platform 289
Yuanzheng Shao, Liping Di, Jianya Gong, Yuqi bai, Peisheng Zhao
The Influence of Humidity on Setting of DC Bus in Converter
Station 297
Guo Zhihong, Xu Mingming, Li Kejun, Niu Lin
Design and Study of Professional PWM Core Based on
FPGA 305
Guihong Tian, Zhongning Guo, Yuanbo Li, Wei Liu
Ancient Ceramics Classification Based on Case-Based
Reasoning 313
Wenzhi Yu, Lingjun Yan
Distributed Power Control Algorithms for Wireless Sensor
Networks 319
Yourong Chen, Yunwei Lu, Juhua Cheng, Banteng Liu, Yaolin Liu
System Framework and Standards of Ground Control Station
of Unmanned Aircraft System 327
Jia Zeng
Stabilization of Positive Continuous-Time Interval Systems 335
Tsung-Ting Li, Shen-Lung Tung, Yau-Tarng Juang
Influencing Factor Analysis and Simulation of Resonance
Mechanism Low-Frequency Oscillation 343
Yang Xue-tao, Song Dun-wen, Ding Qiao-lin, Ma Shi-ying, Li Bai-qing,
Zhao Xiao-tong
Trang 14Real-Time Control Techniques Research of Low-Frequency
Oscillation in Large-Scale Power System Based on WAMS
and EMS 351
Song Dun-wen, Ma Shi-ying, Li Bai-qing, Zhao Xiao-tong,
Yang Xue-tao, Hu Yang-yu, Wang Ying-tao, Du San-en
Two Methods of Processing System Time Offset in
Multi-constellation Integrated System 359
Longxia Xu, Xiaohui Li, Yanrong Xue
Quick Response System for Logistics Pallets Pooling Service
Supply Chain Based on XML Data Sharing 367
Nan Zhao
Research on the Aplication of HACCP System to Gas Control
in Coal Mine Production 375
Wang Yanrong, Wang Han, Liu Yu
Application of Adaptive Annealing Genetic Algorithm for
Wavelet Denoising 385
Huang Yijun, Zeng Xianlin
Secure Group Key Exchange Protocol 391
Lihong He
Application of Wavelet Packet Analysis in the Fault Diagnosis
for Flight Control Systems 401
Jiang xiaosong
Design of Intelligent Carbon Monoxide Concentration
Monitoring and Controller System 407
Zou Tao, Xu Hengcheng, Zeng Xianlin
The Design of Intelligent Check Instrument for Airplane
Voice Warning System 415
Zeng Xianlin, Xu Hengcheng, Li Lizhen
Design of a Relaxation Oscillator with Low Power-Sensitivity
and High Temperature-Stability 421
Qi Yu, Zhentao Xu, Ning Ning, Yunchao Guan, Bijiang Chen
Automatic Parameters Calculation of Controllers for
Photovoltaic dc/dc Converters 431
E Arango, C.A Ramos-Paja, D Gonzalez, S Serna, G Petrone
Modeling and Control of ´Cuk Converter Operating in DCM 441
E Arango, C.A Ramos-Paja, R Giral, S Serna, G Petrone
Trang 15Comparative Analysis of Neural and Non-neural Approach of
Syllable Segmentation in Marathi TTS 451
S.P Kawachale, J.S Chitode
Predictive Control Simulation on Binocular Visual Servo
Seam Tracking System 461
YiBo Deng, Hua Zhang, GuoHong Ma
The Application of Savitzky-Golay Filter on Optical
Measurement of Atmospheric Compositions 469
Wenjun Li
Dark Current Suppression for Optical Measurement of
Atmospheric Compositions 481
Wenjun Li
Research on Topology Control Based on Partition Node
Elimination in Ad Hoc Networks 491
Jun Liu, Jing Jiang, Ning Ye, Weiyan Ren
Reaserch on Characteristic of the Flywheel Energy Storage
Based on the Rotating Electromagnetic Voltage Converter 499
Baoquan Kou, Haichuan Cao, Jiwei Cao, Xuzhen Huang
Study of Traffic Flow Short-Time Prediction Based on
Wavelet Neural Network 509
Yan Ge, Guijia Wang
A Novel Knowledge Protection Technique Base on Support
Vector Machine Model for Anti-classification 517
Tung-Shou Chen, Jeanne Chen, Yung-Ching Lin, Ying-Chih Tsai,
Yuan-Hung Kao, Keshou Wu
A DAWP Technique for Audio Authentication 525
Tung-Shou Chen, Jeanne Chen, Jiun-Lin Tang, Keshou Wu
PV Array Model with Maximum Power Point Tracking Based
on Immunity Optimization Algorithm 535
Ruidong Xu, Xiaoyan Sun, Hao Liu
Ground Clutter Analysis and Suppression of Airborne
Weather Radar 543
Shuai Zhang, Jian-xin He, Zhao Shi
Research on Mobile Internet Services Personalization
Principles 551
Anliang Ning, Xiaojing Li, Chunxian Wang, Ping Wang, Pengfei Song
Trang 16A Specialized Random Multi-parent Crossover Operator
Embedded into a Genetic Algorithm for Gene Selection and
Classification Problems 559
Roberto Morales-Caporal
A New Method Based on Genetic-Dynamic Programming
Technique for Multiple DNA Sequence Alignment 567
Roberto Morales-Caporal
Digital Image Processing Used for Zero-Order Image
Elimination in Digital Holography 575
Wenwen Liu, Yunhai Du, Xiaoyuan He
The Preliminary Research of Pressure Control System
Danymic Simulation for Ap1000 Pressurizer Based on
Parameter Adaptive Fuzzy Pid Control Algorithm 583
Wei Zhou, Xinli Zhang
A Diffused and Emerging Clustering Algorithm 593
Yun-fei Jiang, Chun-yan Yu, Nan Shen
A Fast Method for Calculating the Node Load Equivalent
Impedance Module 599
Wang Jing-Li
The Design and Implementation of Anti-interference System
in Neural Electrophysiological Experiments 605
Hong Wan, Xin-Yu Liu, Xiao-Ke Niu, Shu-Li Chen, Zhi-Zhong Wang,
Li Shi
System Design of a Kind of Nodes in Wireless Sensor Network
for Environmental Monitoring 613
Ying Zhang, Xiaohu Zhao
A Non-blind Robust Watermarking Scheme for 3D Models in
Spatial Domain 621
Xinyu Wang, Yongzhao zhan, Shun Du
Infrared Image Segmentation Algorithm Based on Fusion of
Multi-feature 629
Qiao Kun, Guo Chaoyong, Shi Jinwei
Adaptive Terminal Sliding Mode Projective Synchronization
of Chaotic Systems 635
Minxiu Yan, Liping Fan
Trang 17A Detailed Analysis of the Ant Colony Optimization Enhanced
Particle Filters 641
Junpei Zhong, Yu-fai Fung
A Compact Dual-Band Microstrip Bandpass Filter Using
Meandering Stepped Impedance Resonators 649
Kai Ye, Yu-Liang Dong
Research on Self-adaptive Sleeping Schedule for WSN 655
Mingxin Liu, Qian Yu, Tengfei Xu
Design and Application of a New Sun Sensor Based on Optical
Fiber 661
Zhou Wang, Li Ye, Li Dan
A 12-b 100-MSps Pipelined ADC 669
Xiangzhan Wang, Bijiang Chen, Jun Niu, Wen Luo, Yunchao Guan,
Jun Zhang, Kejun Wu
Analogue Implementation of Wavelet Transform Using
Discrete Time Switched-Current Filters 677
Mu Li, Yigang He, Ying Long
A 2D Barcode Recognition System Based on Image
Processing 683
Changnian Zhang, Ling Ma, Dong Mao
The Research of CNC Communication Based on Industrial
Ethernet 689
Jianqiao Xiong, Xiaosong Xiong, Xue Li, Bin Yu
An Efficient Speech Enhancement Algorithm Using Conjugate
Symmetry of DFT 695
S.D Apte, Shridhar
A Look-Ahead Road Grade Determination Method for
HEVs 703
Behnam Ganji, Abbas Z Kouzani
A New Method for Analyze Pharmacodynamic Effect of
Traditional Chinese Medicine 713
Bin Nie, JianQiang Du, RiYue Yu, GuoLiang Xu, YueSheng Wang,
YuHui Liu, LiPing Huang
Application of the Case-Based Learning Based on KD-Tree in
Unmanned Helicopter Control 721
Daohui Zhang, Xingang Zhao, Yang Chen
Trang 18An Average Performance and Scalability Model of Xen
System under Computing-Intensive Workload 731
Jianhua Che, Dawei Huang, Hongtao Li, Wei Yao
Research on Fuel Flow Control Method Based on Micro
Pressure Difference of Orifice Measuring Section 739
Jianguo Xu, Tianhong Zhang
Dynamic Modeling and Simulation of UPFC 749
Jieying Song, Fei Zhou, Hailong Bao, Jun Liu
Microturbine Power Generator 757
Martin Novak, Jaroslav Novak, Ondrej Stanke, Jan Chysky
A Heuristic Magic Square Algorithm for Optimization of
Pixel Pair Modification 765
Jeanne Chen, Tung-Shou Chen, Yung-Ming Hsu, Keshou Wu
A New Data Hiding Method Combining LSB Substitution
and Chessboard Prediction 773
Keshou Wu, Zhiqiang Zhu, Tung-Shou Chen, Jeanne Chen
Data Mining the Significance of the TCM Prescription for
Pharmacodynamic Effect Indexs Based on ANN 781
Bin Nie, JianQiang Du, RiYue Yu, YuHui Liu, GuoLiang Xu,
YueSheng Wang, LiPing Huang
Design of Compact Dual-Mode Dual-Band Bandpass Filter
for Wlan Communication System 787
Yang Deng, Mengxia Yu, Zhenzhen Shi
AMOS: A New Tool for Management Innovation in IT
Industry 793
Shujun Tang, Liuzhan Jia
A Research on the Application of Physiological Status
Information to Productivity Enhancement 801
Qingguo Ma, Qian Shang, Jun Bian, Huijian Fu
The Impact of Procedural Justice on Collective Action and
the Mediation Effect of Anger 809
Jia Liuzhan, Ma Hongyu
Autonomous Pointing Avoidance of Spacecraft Attitude
Maneuver Using Backstepping Control Method 817
Rui Xu, Xiaojun Cheng, Hutao Cui
Trang 19Based on TSP Problem the Research of Improved Ant Colony
Algorithms 827
Zhigang Zhang, Xiaojing Li
An Achievement of a Shortest Path Arithmetic’
Improvement 835
Zhigang Zhang, Xiaojing Li, Zhongbing Liu
Energy Management Strategy for Hybrid Electric Tracked
Vehicle Based on Dynamic Programming 843
Rui Chen, Yuan Zou, Shi-jie Hou
SISO/MIMO-OFDM Based Power Line Communication
Using MRC 853
Jeonghwa Yoo, Sangho Choe, Nazcar Pine
Fault Diagnosis of Mine Hoist Based on Multi-dimension
Phase Space Reconstruction 861
Qiang Niu, Xiaoming Liu
Bistatic SAR through Wall Imaging Using Back-Projection
Algorithm 869
Xin Li, Xiao-tao Huang, Shi-rui Peng, Yi-chun Pan
A Fully-Integrated High Stable Broadband Amplifier MMICs
Employing Simple Pre-matching/Stabilizing Circuits 879
Jang-Hyeon Jeong, Young-Bae Park, Bo-Ra Jung, Jeong-Gab Ju,
Eui-Hoon Jang, Young-Yun
High Attenuation Tunable Microwave Band-Stop Filters
Using Ferromagnetic Resonance 887
Baolin Zhao, Xiaojun Liu, Zetao He, Yu Shi
Constraint Satisfaction Solution for Target Segmentation
under Complex Background 893
Liqin Fu, Changjiang Wang, Yongmei Zhang
The Integrated Test System of OLED Optical Performance 901
Yu-jie Zhang, Wenlong Zhang, Yuanyuan Zhang
Application of Strong Tracking Kalman Filter in Dead
Reckoning of Underwater Vehicle 909
Ye Li, Yongjie Pang, Yanqing Jiang, Pengyun Chen
The High-Performance and Low-Power CMOS Output Driver
Design 917
Ching-Tsan Cheng, Chi-Hsiung Wang, Pei-Hsuan Liao, Wei-Bin Yang,
Yu-Lung Lo
Trang 20Circularly Polarized Stacked Circular Microstrip Antenna
with an Arc Feeding Network 927
Sitao Chen, Xiaolin Yang, Haiping Sun
Modeling the Employment Using Distributed Agenciesand
Data Mining 933
Robust Player Tracking and Motion Trajectory Refinement
for Broadcast Tennis Videos 941
Min-Yuan Fang, Chi-Kao Chang, Nai-Chung Yang, I-Chang Jou,
Md Rajibur Rahaman Khan, Modar Safir Shbat, Vyacheslav Tuzlukov
Research of Super Capacitors SOC Algorithms 967
Hao Guoliang, Liu Jun, Li Yansong, Zhang Qiong, Guo Shifan
The Survey of Information System Security Classified
Protection 975
Zhihong Tian, Bailing Wang, Zhiwei Ye, Hongli Zhang
Optimization of a Fuzzy PID Controller 981
Dongxu Liu, Kai Zhang, Jinping Dong
Study on the Application of Data Mining Technique in
Intrusion Detection 989
Hongxia Wang, Tao Guan, Yan Wang
Fault Recovery Based on Parallel Recomputing in
Transactional Memory System 995
Wei Song, Jia Jia
Forecast of Hourly Average Wind Speed Using ARMA Model
with Discrete Probability Transformation 1003
Trang 21Multi-Layer Methodology Applied to Multi-period and
Multi-Objective Design of Power Distribution Systems 1011
Dynamics of Land Cover and Land Use Change in Quanzhou
City of SE China from Landsat Observations 1019
Weihua Pan, Hanqiu Xu, Hui Chen, Chungui Zhang, Jiajin Chen
A SOA-Based Model for Unified Retrieval System 1029
Hui Li, Li Wang
Clinical Sign-Based Fish Disease Diagnosis Aid System 1039
Chang-Min Han, Soo-Yung Yang, Heeteak Ceong, Jeong-Seon Park
A Fully-Integrated Amplifier MMIC Employing a
CAD-Oriented MIM Shunt Capacitor 1047
Young Yun, Jang-Hyeon Jeong, Young-Bae Park, Bo-Ra Jung,
Jeong-Gab Ju, Eui-Hoon Jang
A Design of Adaptive Optical Current Transducer Digital
Interface Based on IEC61850 1055
Zhang Qiong, Li Yansong, Liu Jun, Hao Guoliang
Performance Analysis of DSR for Manets in Discrete Time
Markov Chain Model with N -Spatial Reuse 1063
Xi Hu, Guilin Lu, Hanxing Wang
Equivalent Circuit Model of Comb-Type Capacitive
Transmission Line on MMIC for Application to the
RF Component Design in Millimeter-Wave Wireless
Communication System 1071
Eui-Hoon Jang, Young-Bae Park, Bo-Ra Jung, Jang-Hyeon Jeong,
Jeong-Gab Ju, Young Yun
Author Index 1079
Trang 22M Zhu (Ed.): Electrical Engineering and Control, LNEE 98, pp 1–9
springerlink.com © Springer-Verlag Berlin Heidelberg 2011
Analysis Based on S-Transform
Tao Tao, Zhenming Peng, Chaonan Yang, Fang Wei, and Lihong Liu
School of Opto-Electronic Information, University of Electronic Science and Technology
of China, Chengdu 610054, China tt19870419@163.com, zmpeng@uestc.edu.cn
Abstract A novel method for dim moving target detection of synthetic aperture
radar (SAR) image which is based on the S-transform(ST)domain coherent analyzing was proposed in this paper Firstly, the paper describes the basic principle of ST; and analyzes the mechanism of the second generation of coherent algorithm On the basis of these algorithms, the coherent formula was obtained which was used in this paper Making use of the difference between S-
Transform domain and background of moving target in SAR image with the same scene, coherent image could be constructed by coherent values which were calculated by the proposed coherent formula In the coherent image, target can be detected by compare the coherent values Experiments showed that the proposed method could detect the dim target
Keywords: S-transform, SAR image, coherence analysis, targets detection
1 Introduction
The interpretation of SAR images, to which target detection, occupying an important position especially in target identification system, is the key, has been a focus for researchers The research in this respect attracts considerable attention Classical target detection is based on CFAR, which is to establish threshold on the foundation
of the correctly estimating noise and heterogeneous wave, to detect After the efforts
of numerous scholars, many new methods of target detection have emerged today, such as the improved constant false alarm rate (CFAR), two-parameter CFAR detection, and transform domain-based target detection method [1], etc Dim target detection has been a hot research, too As the dim target in the image only occupies a tiny part of pixels, which has no texture, no shape or other information, it’s hard to be detected for classical target detection methods, and some special preprocessing must
be done to the image in order to better detect the interesting dim target
SAR image is a kind of complex non-stationary signal, and it can be accurately described using only appropriate method of time-frequency analysis [2] Traditional Fourier-Transform only does single frequency decomposition to signal, although frequency resolution of that method can achieve the desired level, it loses time resolution, and lacks the function of positioning the signal’s time and frequency at the same time, and can’t effectively analyze the local properties of the signal, and the
Trang 23transformed frequency spectrum can only represent the overall effect of signal frequency changing, so it’s hard to express the non-stationary changes with time of signal statistical properties Signal’s local property can be accurately described using two-dimensional co-expressed of time domain and frequency domain S-Transform with a good performance of time-frequency analysis is a new developed method of time-frequency analysis [3-4] Compared with wavelet-transform, both have good local features and direct relation to Fourier spectrum of signal, therefore it can effectively characterize weak signal’s characteristics
A novel dim moving target detection method of SAR image which is based on the S-Transform domain coherent analyzing is proposed in this paper Firstly, the paper describes the basic principle of S-Transform, and analyzes the mechanism of the second generation of coherent algorithm On the basis of these algorithms, the coherent formula is obtained which is used in this paper Making use of the difference between S-transform domain and background of moving target in SAR image with the same scene, coherent image can be constructed by coherent values which are calculated by the proposed coherent formulas In the coherent image, target can be detected by comparing coherent values Experiments show that the proposed method can detect the dim target
2 Basic Principle of S-Transform
S-transform(ST)first proposed by Stockwell (1996)[5] is a new linear time-frequency representation method, time-frequency resolution of which changes with frequency It
is an extension of the continuous wavelet transform, which takes Morlet wavelet as the basic wavelet ST has a good performance of time-frequency analysis[6], whose time-frequency window has adjustable nature, with good time resolution properties in the high frequency, while good frequency resolution properties in the low frequency Here are the basic transform formulas of ST[7]
For a two-dimensional imageh x y( , ), ( ,τ1 f1)is defined asx, ( ,τ2 f2)asy, then the transformation formula of two-dimensional ST is as follows:
Trang 243 Coherent Analyzing in S-Transform Domain
The basic idea of the method in this paper: carry on ST for two SAR images under the same background and the target location with displacement and coherent analysis of the two images in ST domain, make use of energy spectrum feature difference in S domain between the target on image and the background to get coherent values to construct coherent image, and establish threshold to detect targets Having integrated the advantages of short time-window Fourier transform and wavelet transform, ST provides joint function of time and frequency, describes the signal energy density or signal intensity with variables of time and frequency ST, with high time-frequency resolution [8], does not have the impact of cross terms Due to the advantages of ST in time-frequency analysis, when the image is transformed to the S domain, the energy spectrum
of the background for the two images in S domain is basically the same But when the targets of the two images move the target energy spectrum also moves accordingly in S domain and the position corresponding to the target energy spectrum changes
Trang 25Coherence technique is very sensitive to mutation of signals [9], which highlights the similarity of signals using mathematical method and then achieves a new technology to detect weak signals and reflect unusual characteristics The coherent technique is divided into three generations: the first generation algorithm is based on cross-correlation, which has better resolution in the case of high signal-to-noise ratio of data, but bad anti-noise ability relatively; the second generation algorithm is based on the similarity, better for computing coherence compared with the first-generation algorithm and higher resolution, whose coherent processing results, to some extent, are influenced by the data quality still, though; the third-generation algorithm is based on the feature structure
According to coherence technique in two-dimensional image processing features, the second generation coherent algorithm, proposed by K.J Marfurt et.al [10] in
1997 They gave the formula of the second generation algorithm in his article,
2 1
2 1
J u k t px qy x y
τ τ
+
=− = +
The numerator can be expressed as the sum of all elements of the following matrix A
which is defined as,
Trang 261 1 2
2 1
reverse sequence sum and one group’s positive sequence sum, for u im According to sorting inequality theory, it can be noted that J1 2
It can be supposed from the above analysis that the second generation coherent algorithm can be improved if the incoherency of image data is needed to be emphasized and the algorithm to the sensitivity of incoherency is further improved by using the positive sequence sum divided by the reverse sequence sum instead of all sequences sum divided by J times the positive sequence sum According to the idea of the second generation coherent algorithm, coherent formula can be defined as:
2 1
2 1
Trang 27sequence sum, known from the properties of sequencing inequality The numerator in equation (11) is the chaotic sequence sum of arrays constituted by the absolute value
of (u m−v m), and the denominator is N times the positive sequence sum, therefore the coherent coefficient c is less than or equal to 1
When the image is transformed to S domain, the energy spectrum of the position where the target corresponds to is bigger in two energy images of S domain The target is moving, namely that the target position is different in energy images of S domain, so the corresponding difference (u m−v m) is bigger when the computational elements include target elements Relatively, (u m −v m) is smaller when changes in background of two images are smaller Thereby larger c expresses higher image similarity; lower, contrarily So, the calculated c is smaller when the computational elements include target elements, which shows a mutation of signal in S domain, where the target exists According to the above analysis the position of image target can be exposed by calculating coherent coefficients, thereby target detection is achieved by using simple threshold segmentation
Steps of the algorithm of target detection:
Step 1: implement ST separately for two SAR images u x y( , ) andv x y( , ) with the same scene to get the energy feature images S u( ,τ τ1 2, ,f f1 2) and S v( ,τ τ1 2, ,f f1 2)in
ST domain;
Step 2: use appropriate window size (such as: 3 3× or 5 5× ) to get the elements in the same position of energy feature images in ST domain in turn, and use equation (11) to calculate coherent coefficients, then construct coherent images by coherent coefficients;
Step 3: set threshold κ for coherent images, and generally κ takes the empirical value μσ , where μ is a mean value of elements about coherent images and σ is variance, and then carry on target detection
The flow of the proposed algorithm is shown in figure 1
Fig 1. Algorithm flow about target detection
Trang 284 Stimulation of the Algorithm
To test the validity of the method, SAR image of moving target with the same scene is stimulated in the paper Fig.2 (a) and (b) show two SAR images with the same scene, where there is a moving point target The two images are detected in accordance with the method proposed in the last section of the paper Fig.3 (a) shows the coherent image obtained from formula (11) in S domain after ST of the two images Through coherent image can target location be implemented using relatively simple method, shown as fig.3 (b) Because the position, where the target exists, corresponds to small coherent value, correspondingly the coherent image calculated in S domain corresponds to the low power position, seen from coherent image, the color of the target position is blue which denotes low power
Known from formula (4), discrete two-dimensional ST has four parameter variables: jT1,kT2,u MT/ 1,v NT/ 2 In order to improve computational efficiency, when calculating discrete two-dimensional ST, fix the value of vto get S domain image The calculated result is that the resolution is higher in the vertical direction than that in the horizontal direction, as shown in fig.3 (a) Hence the detection result
is that the target point was stretched in the horizontal direction, as shown in fig.3 (b) After the segmentation of original image target, calculate the center-of-mass coordinate, then the center-of-mass coordinate of the target point in fig.2 (a) is (78.915, 101.35) The detected result shows that the center-of-mass coordinate of the target point in fig.3 (b) is (79, 101) By comparing the target’s center-of-mass coordinate of detection result with that of original image, it can be seen that the method in this paper allows more accurate positioning, as shown in table 1 100 groups of SAR images with the same scene are simulated using the method proposed
in this paper, as a result, there are 8 targets and FAR is 8% Experiments prove the validity of the method
Table 1 Performance analysisof algorithm Target’s Real
Coordinate
Target’s Detection Coordinate
Detection Error
Trang 29Acknowledgements This work is supported by National Natural Science Foundation
of China (40874066, 40839905), The Key Laboratory Fund of Beam Control, Chinese Academy of Sciences (2010LBC001)
3 Yong, Y., Yang, X.F., Wang, B.X., et al.: A Small Target Detection Method Based on Generalized S-Transform In: International conference on Apperceiving Computing and Intelligence Analysis, ICACIA 2008, pp 189–192 IEEE Press, Los Alamitos (2008), doi:10.1109/ICACIA.2008.4770002
4 Peng, Z., Zhang, J., Meng, F., et al.: Time-frequency Analysis of SAR Image Based on Generalized S-transform In: International Conference on Measuring Technology and Mechatronics Automation (ICMTMA 2009),, Zhangjiajie, Apl, vol 1, pp 556–559 (2009)
5 Stockwell, R.G., Mansinha, L., Lowe, R.L.: Localization of the Complex Spectrum: the S-transform [J] IEEE Transactions on Signal Processing 17(4), 998–1001 (1996)
6 Zhang, J., Peng, Z., Zhang, Q., et al.: Dim Target Detection Based on Image Features Analysis in Generalized S-transform Domain In: Proc IEEE International Conference on Intelligent Computation Technology and Automation (ICICTA 2010), Changsha, China,
pp 122–125 (2010)
Trang 307 Mansiha, L., Stockwell, R.G., Lowe, R.P.: Pattern Analysis with Two Dimensional Spectral Localization: Application of Two Dimensional S-transform Physic A 239(3), 286–295 (1997)
8 Schimmel, M., Gallart, J.: The Inverse S-transform in Filter with Time-frequency localization IEEE Transactions on Signal Processing 53(11), 4417–4422 (2005)
9 Lee, I.W., Dash, P.K.: S-transform-based Intelligent System for Classification of Power Quality Disturbance Signals IEEE Transactions on Industrial Electronics 50(4), 800–805 (2003)
10 Marfurt, K.J., Sudhakar, V., Gersztenkorn, A., Crawford, K.D., Nissen, S.E.: Coherency Calculations in the Presence of Structural Dip In: 67th Annual International Meeting Society of Exploration Geophysicists, Expanded Abstracts, pp 566–569 (1997)
Trang 32M Zhu (Ed.): Electrical Engineering and Control, LNEE 98, pp 11–17
springerlink.com © Springer-Verlag Berlin Heidelberg 2011
Directed Weighted Networks
Hongtao Liu1,*, Xiao Qin, Hongfeng Yun, and Yu Wu
Institute of Web Intelligence, Chongqing University of Posts and Telecommunications,
Chongqing, 400065, China Liuht@cqupt.edu.cn, qxiaomm@163.com, yunhongfeng@163.com,
wuyu@cqupt.edu.cn
Abstract In this paper, the impact factors of in-degree and out-degree are
introduced into community detection, and the directed weighted degree is used to measure the importance of the node Based on the core nodes, a community detecting algorithm for directed and weighted networks is proposed Then the community detection on the blog site of Sciencenet is conducted with standard structure entropy as a measure Experimental results demonstrate that in directed and weighted networks, the proposed algorithm is efficient with shorter execution time By comparing with the classical algorithm, the detecting results
of our algorithm meet the trend of standard entropy better It means the algorithm proposed is improved to some extent
Keywords: Directed and Weighted Networks, Community Detection, Standard
Structure Entropy
1 Introduction
Properties of complex networks often excite many researchers’ interesting, such as small-world property, scale-free property, rich-club phenomenon and etc Community structure is one of the most important properties of complex networks, which has become a focus in recent years by Newman and Girvan's research [1]
There are many classical algorithms, such as K-L algorithm[2], Spectral bisection method[3] and GN algorithm[4] In K-L algorithm and spectral bisection method, the number of communities needs to be pre-determined which is often unrealistic GN algorithm avoids the defect but the computational complexity is higher relatively In our previous work, we have studied the evolution of virtual community in BBS by calculating the structure entropy[5] Since core nodes play an important role in networks,Liping Xiao proposed an algorithm to evaluate importance of the nodes in networks using data field theory[6] Duanbing Chen[7] proposed a local detecting algorithm in weighted networks based on the core nodes Since modularity Q was
*
Hongtao Liu(1974- ), Associate Professor, Ph.D., Research: Emergent Computation, Network Intelligence; Xiao Qin(1985- ), Postgraduate, Research: Network Intelligence; Hongfeng Yun(1987- ), Postgraduate, Research: Network Intelligence; Yu Wu(1970- ), Professor, Ph.D., Research: Emergent Computation, Network Intelligence
Trang 33proposed by Newman[1], there was an accepted standard for the results of community detection Currently, community detection is measured by Q value and computational complexity basically
From above we find most detecting algorithms view the networks as undirected edges Thus they lose some useful information, and only conduct a quantitative analysis
on the detecting results In this paper, we consider the direction of edges, and propose a new algorithm with standard structure entropy as a measure
The rest of this paper is organized as follows Section 2 gives the previous work Section 3 describes our algorithm in detail The algorithm is simulated and analyzed in Section 4 At last, Section 5 concludes our paper and discusses the future work
2 Previous Work
2.1 Structure Entropy
Entropy is a measure of energy distribution in complex systems It can reflect the stability and change direction of the system Entropy has become an important metric to study complex systems, and gains more and more attention
The network structure entropy is defined as:
1ln
2.2 A Local Detecting Algorithm in Weighted Networks
Duanbing Chenproposed a local detecting algorithm in weighted networks[7] In this
algorithm, the key aspect was selection of node v which had the largest node strength
Throughfinding all neighbors of node v, an initial community was composed Then
making some adjustment to the initial community, a final community was obtained Repeated the above steps we could find all communities in the network
Experimental results demonstrated that the algorithm was rather efficient for detecting communities in weighted networks However, it ignored the direction of edges and lost some information
3 A Community Detecting Algorithm in Directed Weighted
Networks
3.1 A Novel Model Based on Directed Networks
As we know, if an individual has a lot of direct contacts with others in complex systems, it is more important and has great “power” Under the guidance of this idea, an
Trang 34algorithm(D-W algorithm) for detecting communities in directed and weighted networks is proposed Duanbing Chen[7] defined node strength as:
where ωuv denotes the weight of the edge which links node u and v In the blog
networks, if a user responds to others frequently but obtains few responses, the user can not be a core node It means direction of the edges have different influences on the importance of nodes Thus we measure the importance of a node with directed weighted degree Firstly some reasonable assumptions are presented
Assumption 1: The in-degree and out-degree of a node make different influence on the importance of the node;
Assumption 2: A node has a broad range of communication in a network if there are more edges which connect with it;
Assumption 3: It means the two nodes have a closer relationship if the edge between them has a greater weight
Together with the above three assumptions, we give the definition of in-weighted
degree D ip and out-weighted degree D op of node p
where ω(v q ,v p) denotes the weight of the directed edge and < v vq, p >∈ E denotes the
directed edge from q to p
Therefore, directed weighted degree of node P is defined as:
Step1: Detecting the initial community
A Calculate the directed weighted degree D p for each node p with label “F”;
Trang 35B Select a node u with the largest directed weighted degree and find its neighbors marked by label “F” These nodes compose an initial community C i;
Step2: Adjusting the initial community
A For each node v in community C i , if the belonging degree B(v, C i) is less than
0.5(we don’t consider node v to be tight enough with community C i if the
belonging degree is less than 0.5), remove node v from community C i;
B Repeat A until∀ ∈v C i, B(v, C i) is not less than 0.5, and obtain the initial community C i;
Step3: Initial community extended
A Find all neighbors N c of community C i For every node v in N c, calculate the belonging degree B(v, C i);
B For each node v in N c, if the belonging degree B(v, C i) is more than 0.5, add node
v into community C i;
C Repeat B until∀ ∈v N c, B(v, C i) <0.5, then obtain a final community and also be denoted by community C i Marking all nodes in C i with label “T”;
D Return to step1 to mine the next community
4 Algorithm Simulation and Analysis
4.1 Selection of Experimental Object and Parameters
Table 1 Matching ratio based on different parameters
Number Α β Matching Number Matching Ratio
Trang 36The experiment is implemented on Matlab 7.1 We use formula(5) to obtain our Top
30 Bloggers To find out the optimal parameters, we obtain the matching ratio under different parameters by comparing them with the official top 100 ranking of the Sciencenet , as shown in Table 1
As seen in Table 1, the matching ratio reaches 63.30%, the highest value, when α,βare set to 0.9 and 0.1 To validate our result, several more experiments are done with greater amount of data e.g Top 40, Top 50 The results are similar to Top 30
4.2 Experimental Results and Analysis
Experiment 1: Taking standard structure entropy as a measure, detecting results based
on the proposed algorithm and Duanbing Chen’s[7] are compared
In order to exclude the impact of the number of nodes, the network structure entropy
of Sciencenet is normalized, as shown in Fig 1a Based on the analysis in 4.1(2), the parameters α, βare set to 0.9 and 0.1, respectively, in our algorithm Since users in the network interact infrequently in the first four months, community detection is conducted from the 5th month in this paper By removing several communities that have less significant effect, the main communities are obtained And the results based
on two different algorithms are shown in Fig 1b
Fig 1 Results based on different algorithms
As seen in Fig 1a, the network structure tends to be stable after the 30th month The reason is that as the standard structure entropy has little fluctuation, the community structure becomes stable As shown in Fig 1b, the community structure is more stable while adopting the proposed algorithm, compared to Duanbing Chen’s Thus the proposed algorithm is more efficient
Trang 37Experiment 2: Detecting results with different parameters are compared in order to illustrate the rationality of parameters selected in 4.1(2) Here, three circumstances are considered: 1) αis comparatively bigger than β; 2) αis equal to β; 3) αis comparatively smaller than β Since the second situation has been discussed in Experiment 1, only two conditions need to be further explored Hence, the parameters are set to α=0.8, β=0.2
and α=0.1, β=0.9, respectively And the detecting results are shown in Fig 2
Fig 2 Results based on different parameters
As seen in Fig 2, there are large fluctuations in community structure after the 30th month while choosing the above two sets of parameters This is not consistent with the standard structure entropy Meanwhile, experiments with other sets of parameters are also conducted, and the results are similar as above Therefore, the parameters selected
(3) When the network structure is stable at time T (Fig.1a the 30th month), if we need
to detect communities in the network after T, then we can use the data gained at time T (the 30th month) This greatly reduces the costs
Currently, we only research community with the comment data In fact, there are more links such as links between message boards, friends and so on It is expected to gain more data to research community in the next step
Acknowledgements
This paper is supported by National Natural Science Foundation of China (60873079, 61040044), (Key) Natural Science Foundation of Chongqing (2008BB2241, 2009BA2089), Program for New Century Excellent Talents in University (NCET)
Trang 40M Zhu (Ed.): Electrical Engineering and Control, LNEE 98, pp 19–27
springerlink.com © Springer-Verlag Berlin Heidelberg 2011
through Bacterial Foraging Particle Swarm
Optimization Algorithm
Hsuan-Ming Feng Department of Computer Science and Information Engineering, National Quenoy University,
No 1 University, Rd., Kin-Ning Vallage, Kinmen, 892, Taiwan, R.O.C
hmfenghmfeng@gmail.com
Abstract An innovative bacterial-foraging-based swarm intelligent algorithm
called bacterial foraging particle swarm optimization (BFPSO) is applied for the design of fuzzy systems to balance the car-pole platform The BFPSO is an efficient evolutionary learning algorithm to deal with complex and global optimization problems The BFPSO combines the inspired behaviors of bacterial foraging mode and the PSO learning stage to approximate the benefits
of fast convergence ability and lower computational load This paper illustrates the perfect BFPSO algorithm in detail with the simulation to automatically select appropriate parameters of fuzzy systems Computer simulation results on the nonlinear control problems are derived to demonstrate the efficiency of BFPSO
Keywords: Fuzzy rule-based systems, bacterial foraging particle swarm
optimization, evolutionary learning algorithm
1 Introduction
Fuzzy systems with the linguistic rules have been successfully known to put on many
complicated fields, such as high-dimensional functional approximation [1-3] and nonlinear control [4] problems In some case studies, there still have some difficulties
to generate appropriate fuzzy systems One of the main problems in approaching the better fuzzy systems is to acquire the suitable fuzzy rules and regulate the membership functions shapes In traditional search way, the fuzzy rules are determined by the experience oriented way and membership functions are selected by
the trial-and-error procedure The work in obtaining the above-mentioned terms is
time-consuming There are two major approaches to develop the suitable parameters
of fuzzy systems One approach implies that fuzzy rules are tuned by human experts However, these available fuzzy rules are too rough for complex and ill-defined system The other training procedure is that the desired fuzzy rules are often extracted from input-output training-data pairs Traditional trial-and-error and gradient-type learning strategies are difficult for designers when solving nonlinear and complicated problems Thawonmas and Abe [5] developed a learning method to determine fuzzy