1. Trang chủ
  2. » Kỹ Thuật - Công Nghệ

Electrical engineering and control

1,1K 672 24
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Selected Papers from the 2011 International Conference on Electric and Electronics (EEIC 2011)
Tác giả Min Zhu
Trường học Nanchang University
Chuyên ngành Electrical Engineering and Control
Thể loại Lecture notes
Năm xuất bản 2011
Thành phố Nanchang
Định dạng
Số trang 1.104
Dung lượng 20,35 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

A novel method for dim moving target detection of synthetic aperture radar SAR image which is based on the S-transformSTdomain coherent analyzing was proposed in this paper.. Making use

Trang 2

Volume 98

Trang 5

Lecture Notes in Electrical Engineering ISSN 1876-1100

Library of Congress Control Number: 2011929653

c

2011 Springer-Verlag Berlin Heidelberg

This work is subject to copyright All rights are reserved, whether the whole or part of the material

is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, casting, reproduction on microfilm or in any other way, and storage in data banks Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law

broad-of September 9, 1965, in its current version, and permission for use must always be obtained from Springer Violations are liable to prosecution under the German Copyright Law.

The use of general descriptive names, registered names, trademarks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.

Typeset & Cover Design: Scientific Publishing Services Pvt Ltd., Chennai, India.

Printed on acid-free paper

9 8 7 6 5 4 3 2 1

springer.com

Trang 6

The present book includes extended and revised versions of a set of selected papers from the International Conference on Electric and Electronics (EEIC 2011) , held on June 20-22 , 2011, which is jointly organized by Nanchang University, Springer, and IEEE IAS Nanchang Chapter

The goal of EEIC 2011 is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Electric and Electronics

Being crucial for the development of Electric and Electronics, our conference encompasses a large number of research topics and applications: from Circuits and Systems to Computers and Information Technology; from Communication Systems to Signal Processing and other related topics are included in the scope of this conference In order to ensure high-quality of our international conference, we have high-quality reviewing course, our reviewing experts are from home and abroad and low-quality papers have been refused All accepted papers will be published by Lecture Notes in Electrical Engineering (Springer)

EEIC 2011 is sponsored by Nanchang University, China Nanchang University is a comprehensive university which characterized by "Penetration of Arts, Science, Engineering and Medicine subjects, Combination of studying, research and production" It is one of the national "211" Project key universities that jointly constructed by the People's Government of Jiangxi Province and the Ministry of Education It is also an important base of talents cultivation, scientific researching and transferring of the researching accomplishment into practical use for both Jiangxi Province and the country

Welcome to Nanchang, China Nanchang is a beautiful city with the Gan River, the mother river of local people, traversing through the whole city Water is her soul or in other words water carries all her beauty Lakes and rivers in or around Nanchang bring a special kind of charm to the city Nanchang is honored as 'a green pearl in the southern part of China' thanks to its clear water, fresh air and great inner city virescence Long and splendid history endows Nanchang with many cultural relics, among which the Tengwang Pavilion is the most famous It is no exaggeration to say that Tengwang Pavilion is the pride of all the locals in Nanchang Many men of letters left their handwritings here which tremendously enhance its classical charm

Noting can be done without the help of the program chairs, organization staff, and the members of the program committees Thank you

EEIC 2011 will be the most comprehensive Conference focused on the various aspects of advances in Electric and Electronics Our Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Electric and Electronics We are confident that the conference program will give you detailed insight into the new trends, and we are looking forward to meeting you at this world-class event in Nanchang

Trang 8

Honor Chairs

Scholarship Committee Chairs

Scholarship Committee Co-chairs

Organizing Co-chairs

Program Committee Chairs

Publication Chairs

Trang 10

Targets Detection in SAR Image Used Coherence Analysis

Based on S-Transform 1

Tao Tao, Zhenming Peng, Chaonan Yang, Fang Wei, Lihong Liu

A Community Detecting Algorithm in Directed Weighted

Networks 11

Hongtao Liu, Xiao Qin, Hongfeng Yun, Yu Wu

Autonomous Rule-Generated Fuzzy Systems Designs through

Bacterial Foraging Particle Swarm Optimization Algorithm 19

Hsuan-Ming Feng

Evolutionary Learning Mobile Robot Fuzzy Systems Design 29

Hua-Ching Chen, Hsuan-Ming Feng, Dong-hui Guo

Radar Waveform Design for Low Power Monostatic

Backscattering Ionosonde 37

Ming Yao, Zhengyu Zhao, Bo Bai, Xiaohua Deng, Gang Chen,

Shipeng Li, Fanfan Su

Space –Time Wireless Channel Characteristic Simulations

Based on 3GPP SCM for Smart Antenna Systems 45

Junpeng Chen, Xiaorong Jing, Qiang Li, Zufan Zhang, Yongjie Zhang

Knowledge Reduction of Numerical Value Information System

Based on Neighborhood Granulation 53

Yu Hua

Effects of HV Conductor Aging Surface Elements, on Corona

Characteristics 61

Nick A Tsoligkas

Trang 11

Energy Efficiency Methods in Electrified Railways Based on

Recovery of Regenerated Power 69

M Shafighy, S.Y Khoo, A.Z Kouzani

Prediction of Transitive Co-expressed Genes Function by

Shortest-Path Algorithm 79

Huang JiFeng

Fast Implementation of Rainbow Signatures via Efficient

Arithmetic over a Finite Field 89

Haibo Yi, Shaohua Tang, Huan Chen, Guomin Chen

Novel Resonant-Type Composite Right/Left Handed

Transmission Line Based on Cascaded Complementary Single

Split Ring Resonator 97

He-Xiu Xu, Guang-Ming Wang, Qing Peng

Design of Network Gateway Based on the ITS 105

Zhu Jinfang, Fan Yiming

The Research of Improved Grey-Markov Algorithm 109

Geng Yu-shui, Du Xin-wu

Vehicle Mass Estimation for Four In-Wheel-Motor Drive

Vehicle 117

Zhuoping Yu, Yuan Feng, Lu Xiong, Xiaopeng Wu

A Method of State Diagnosis for Rolling Bearing Using

Support Vector Machine and BP Neural Network 127

Jin Guan, Guofu Li, Guangqing Liu

RLM-AVF: Towards Visual Features Based Ranking Learning

Model for Image Search 135

Xia Li, Jianjun Yu, Jing Li

Design and Implement of Intelligent Water Meter Remote

Monitor System Based on WCF 141

Lilong Jiang, Jianjiang Cui, Junjie Li, Zhijie Lu

Protection of Solar Electric Car DC Motor with PIC

Controller 149

Ahmed M.A Haidar, Ramdan Razali, Ahmed Abdalla,

Hazizulden Abdul Aziz, Khaled M.G Noman,

Rashad A Al-Jawfi

Parameter Design and FEM Analysis on a Bearingless

Synchronous Reluctance Motor 163

Yuanfei Li, Xiaodong Sun, Huangqiu Zhu

Trang 12

A Hybrid and Hierarchy Modeling Approach to Model-Based

Diagnosis 173

Dong Wang, Wenquan Feng, Jingwen Li

A New Codebook Design Algorithm of Vector Quantization

Based on Hadamard Transform 181

Shanxue Chen, Jiaguo Wang, Fangwei Li

Studies on Channel Encoding and Decoding of TETRA2

Digital Trunked System 189

Xiaohui Zeng, Huanglin Zeng, Shunling Chen

Selective Block Size Decision Algorithm for Intra Prediction

in Video Coding and Learning Website 195

Wei-Chun Hsu, Yuan-Chen Liu, Dong-Syuan Jiang, Tsung-Han Tsai,

Wan-Chun Lee

Layer Simulation on Welding Robot Model 203

Guo-hong Ma, Cong Wang

Welding Seam Information Acquisition and Transmission

Method of Welding Robot 209

Guo-hong Ma, Bao-zhou Du, Cong Wang

Search Pattern Based on Multi-Direction Motion Vector

Prediction Algorithm in H.264 and Learning Website 217

Tsung-Han Tsai, Wei-Chun Hsu, Yuan-Chen Liu, Wan-Chun Lee

The Formation and Evolution Tendency of Management

Philosophy 225

Wu Xiaojun, Si Hui

Mobility and Handover Analysis of Existing Network and

Advanced Testbed Network for 3G/B3G Systems 231

Li Chen, Xiaohang Chen, Bin Wang, Xin Zhang, Lijun Zhao,

Peng Dong, Yingnan Liu, Jia Kong

High-Layer Traffic Analysis of Existing Network and Advanced

Testbed Network for 3G/B3G Systems 239

Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, Lijun Zhao,

Peng Dong, Yingnan Liu, Jia Kong

Analysis of Cased Hole Resistivity Logging Signal Frequency

Effect on Detection 247

Yinchuan Wu, Jiatian Zhang, Zhengguo Yan

Communication Software Reliability Design of Satelliteborne 253

Shuang Dai, Huai Wang

Trang 13

A Moving Objects Detection Method Based on a Combination

of Improved Local Binary Pattern Texture and Hue 261

Guo-wu Yuan, Yun Gao, Dan Xu, Mu-rong Jiang

Stationary Properties of the Stochastic System Driven by

the Cross-Correlation between a White Noise and a Colored

Noise 269

Yun Gao, Shi-Bo Chen, Hai Yang

Improved Power Cell Designed for Medium Voltage Cascade

Converter 281

Liang Zhang, Guodong Chen, Xu Cai

GIS in the Cloud: Implementing a Web Coverage Service on

Amazon Cloud Computing Platform 289

Yuanzheng Shao, Liping Di, Jianya Gong, Yuqi bai, Peisheng Zhao

The Influence of Humidity on Setting of DC Bus in Converter

Station 297

Guo Zhihong, Xu Mingming, Li Kejun, Niu Lin

Design and Study of Professional PWM Core Based on

FPGA 305

Guihong Tian, Zhongning Guo, Yuanbo Li, Wei Liu

Ancient Ceramics Classification Based on Case-Based

Reasoning 313

Wenzhi Yu, Lingjun Yan

Distributed Power Control Algorithms for Wireless Sensor

Networks 319

Yourong Chen, Yunwei Lu, Juhua Cheng, Banteng Liu, Yaolin Liu

System Framework and Standards of Ground Control Station

of Unmanned Aircraft System 327

Jia Zeng

Stabilization of Positive Continuous-Time Interval Systems 335

Tsung-Ting Li, Shen-Lung Tung, Yau-Tarng Juang

Influencing Factor Analysis and Simulation of Resonance

Mechanism Low-Frequency Oscillation 343

Yang Xue-tao, Song Dun-wen, Ding Qiao-lin, Ma Shi-ying, Li Bai-qing,

Zhao Xiao-tong

Trang 14

Real-Time Control Techniques Research of Low-Frequency

Oscillation in Large-Scale Power System Based on WAMS

and EMS 351

Song Dun-wen, Ma Shi-ying, Li Bai-qing, Zhao Xiao-tong,

Yang Xue-tao, Hu Yang-yu, Wang Ying-tao, Du San-en

Two Methods of Processing System Time Offset in

Multi-constellation Integrated System 359

Longxia Xu, Xiaohui Li, Yanrong Xue

Quick Response System for Logistics Pallets Pooling Service

Supply Chain Based on XML Data Sharing 367

Nan Zhao

Research on the Aplication of HACCP System to Gas Control

in Coal Mine Production 375

Wang Yanrong, Wang Han, Liu Yu

Application of Adaptive Annealing Genetic Algorithm for

Wavelet Denoising 385

Huang Yijun, Zeng Xianlin

Secure Group Key Exchange Protocol 391

Lihong He

Application of Wavelet Packet Analysis in the Fault Diagnosis

for Flight Control Systems 401

Jiang xiaosong

Design of Intelligent Carbon Monoxide Concentration

Monitoring and Controller System 407

Zou Tao, Xu Hengcheng, Zeng Xianlin

The Design of Intelligent Check Instrument for Airplane

Voice Warning System 415

Zeng Xianlin, Xu Hengcheng, Li Lizhen

Design of a Relaxation Oscillator with Low Power-Sensitivity

and High Temperature-Stability 421

Qi Yu, Zhentao Xu, Ning Ning, Yunchao Guan, Bijiang Chen

Automatic Parameters Calculation of Controllers for

Photovoltaic dc/dc Converters 431

E Arango, C.A Ramos-Paja, D Gonzalez, S Serna, G Petrone

Modeling and Control of ´Cuk Converter Operating in DCM 441

E Arango, C.A Ramos-Paja, R Giral, S Serna, G Petrone

Trang 15

Comparative Analysis of Neural and Non-neural Approach of

Syllable Segmentation in Marathi TTS 451

S.P Kawachale, J.S Chitode

Predictive Control Simulation on Binocular Visual Servo

Seam Tracking System 461

YiBo Deng, Hua Zhang, GuoHong Ma

The Application of Savitzky-Golay Filter on Optical

Measurement of Atmospheric Compositions 469

Wenjun Li

Dark Current Suppression for Optical Measurement of

Atmospheric Compositions 481

Wenjun Li

Research on Topology Control Based on Partition Node

Elimination in Ad Hoc Networks 491

Jun Liu, Jing Jiang, Ning Ye, Weiyan Ren

Reaserch on Characteristic of the Flywheel Energy Storage

Based on the Rotating Electromagnetic Voltage Converter 499

Baoquan Kou, Haichuan Cao, Jiwei Cao, Xuzhen Huang

Study of Traffic Flow Short-Time Prediction Based on

Wavelet Neural Network 509

Yan Ge, Guijia Wang

A Novel Knowledge Protection Technique Base on Support

Vector Machine Model for Anti-classification 517

Tung-Shou Chen, Jeanne Chen, Yung-Ching Lin, Ying-Chih Tsai,

Yuan-Hung Kao, Keshou Wu

A DAWP Technique for Audio Authentication 525

Tung-Shou Chen, Jeanne Chen, Jiun-Lin Tang, Keshou Wu

PV Array Model with Maximum Power Point Tracking Based

on Immunity Optimization Algorithm 535

Ruidong Xu, Xiaoyan Sun, Hao Liu

Ground Clutter Analysis and Suppression of Airborne

Weather Radar 543

Shuai Zhang, Jian-xin He, Zhao Shi

Research on Mobile Internet Services Personalization

Principles 551

Anliang Ning, Xiaojing Li, Chunxian Wang, Ping Wang, Pengfei Song

Trang 16

A Specialized Random Multi-parent Crossover Operator

Embedded into a Genetic Algorithm for Gene Selection and

Classification Problems 559

Roberto Morales-Caporal

A New Method Based on Genetic-Dynamic Programming

Technique for Multiple DNA Sequence Alignment 567

Roberto Morales-Caporal

Digital Image Processing Used for Zero-Order Image

Elimination in Digital Holography 575

Wenwen Liu, Yunhai Du, Xiaoyuan He

The Preliminary Research of Pressure Control System

Danymic Simulation for Ap1000 Pressurizer Based on

Parameter Adaptive Fuzzy Pid Control Algorithm 583

Wei Zhou, Xinli Zhang

A Diffused and Emerging Clustering Algorithm 593

Yun-fei Jiang, Chun-yan Yu, Nan Shen

A Fast Method for Calculating the Node Load Equivalent

Impedance Module 599

Wang Jing-Li

The Design and Implementation of Anti-interference System

in Neural Electrophysiological Experiments 605

Hong Wan, Xin-Yu Liu, Xiao-Ke Niu, Shu-Li Chen, Zhi-Zhong Wang,

Li Shi

System Design of a Kind of Nodes in Wireless Sensor Network

for Environmental Monitoring 613

Ying Zhang, Xiaohu Zhao

A Non-blind Robust Watermarking Scheme for 3D Models in

Spatial Domain 621

Xinyu Wang, Yongzhao zhan, Shun Du

Infrared Image Segmentation Algorithm Based on Fusion of

Multi-feature 629

Qiao Kun, Guo Chaoyong, Shi Jinwei

Adaptive Terminal Sliding Mode Projective Synchronization

of Chaotic Systems 635

Minxiu Yan, Liping Fan

Trang 17

A Detailed Analysis of the Ant Colony Optimization Enhanced

Particle Filters 641

Junpei Zhong, Yu-fai Fung

A Compact Dual-Band Microstrip Bandpass Filter Using

Meandering Stepped Impedance Resonators 649

Kai Ye, Yu-Liang Dong

Research on Self-adaptive Sleeping Schedule for WSN 655

Mingxin Liu, Qian Yu, Tengfei Xu

Design and Application of a New Sun Sensor Based on Optical

Fiber 661

Zhou Wang, Li Ye, Li Dan

A 12-b 100-MSps Pipelined ADC 669

Xiangzhan Wang, Bijiang Chen, Jun Niu, Wen Luo, Yunchao Guan,

Jun Zhang, Kejun Wu

Analogue Implementation of Wavelet Transform Using

Discrete Time Switched-Current Filters 677

Mu Li, Yigang He, Ying Long

A 2D Barcode Recognition System Based on Image

Processing 683

Changnian Zhang, Ling Ma, Dong Mao

The Research of CNC Communication Based on Industrial

Ethernet 689

Jianqiao Xiong, Xiaosong Xiong, Xue Li, Bin Yu

An Efficient Speech Enhancement Algorithm Using Conjugate

Symmetry of DFT 695

S.D Apte, Shridhar

A Look-Ahead Road Grade Determination Method for

HEVs 703

Behnam Ganji, Abbas Z Kouzani

A New Method for Analyze Pharmacodynamic Effect of

Traditional Chinese Medicine 713

Bin Nie, JianQiang Du, RiYue Yu, GuoLiang Xu, YueSheng Wang,

YuHui Liu, LiPing Huang

Application of the Case-Based Learning Based on KD-Tree in

Unmanned Helicopter Control 721

Daohui Zhang, Xingang Zhao, Yang Chen

Trang 18

An Average Performance and Scalability Model of Xen

System under Computing-Intensive Workload 731

Jianhua Che, Dawei Huang, Hongtao Li, Wei Yao

Research on Fuel Flow Control Method Based on Micro

Pressure Difference of Orifice Measuring Section 739

Jianguo Xu, Tianhong Zhang

Dynamic Modeling and Simulation of UPFC 749

Jieying Song, Fei Zhou, Hailong Bao, Jun Liu

Microturbine Power Generator 757

Martin Novak, Jaroslav Novak, Ondrej Stanke, Jan Chysky

A Heuristic Magic Square Algorithm for Optimization of

Pixel Pair Modification 765

Jeanne Chen, Tung-Shou Chen, Yung-Ming Hsu, Keshou Wu

A New Data Hiding Method Combining LSB Substitution

and Chessboard Prediction 773

Keshou Wu, Zhiqiang Zhu, Tung-Shou Chen, Jeanne Chen

Data Mining the Significance of the TCM Prescription for

Pharmacodynamic Effect Indexs Based on ANN 781

Bin Nie, JianQiang Du, RiYue Yu, YuHui Liu, GuoLiang Xu,

YueSheng Wang, LiPing Huang

Design of Compact Dual-Mode Dual-Band Bandpass Filter

for Wlan Communication System 787

Yang Deng, Mengxia Yu, Zhenzhen Shi

AMOS: A New Tool for Management Innovation in IT

Industry 793

Shujun Tang, Liuzhan Jia

A Research on the Application of Physiological Status

Information to Productivity Enhancement 801

Qingguo Ma, Qian Shang, Jun Bian, Huijian Fu

The Impact of Procedural Justice on Collective Action and

the Mediation Effect of Anger 809

Jia Liuzhan, Ma Hongyu

Autonomous Pointing Avoidance of Spacecraft Attitude

Maneuver Using Backstepping Control Method 817

Rui Xu, Xiaojun Cheng, Hutao Cui

Trang 19

Based on TSP Problem the Research of Improved Ant Colony

Algorithms 827

Zhigang Zhang, Xiaojing Li

An Achievement of a Shortest Path Arithmetic’

Improvement 835

Zhigang Zhang, Xiaojing Li, Zhongbing Liu

Energy Management Strategy for Hybrid Electric Tracked

Vehicle Based on Dynamic Programming 843

Rui Chen, Yuan Zou, Shi-jie Hou

SISO/MIMO-OFDM Based Power Line Communication

Using MRC 853

Jeonghwa Yoo, Sangho Choe, Nazcar Pine

Fault Diagnosis of Mine Hoist Based on Multi-dimension

Phase Space Reconstruction 861

Qiang Niu, Xiaoming Liu

Bistatic SAR through Wall Imaging Using Back-Projection

Algorithm 869

Xin Li, Xiao-tao Huang, Shi-rui Peng, Yi-chun Pan

A Fully-Integrated High Stable Broadband Amplifier MMICs

Employing Simple Pre-matching/Stabilizing Circuits 879

Jang-Hyeon Jeong, Young-Bae Park, Bo-Ra Jung, Jeong-Gab Ju,

Eui-Hoon Jang, Young-Yun

High Attenuation Tunable Microwave Band-Stop Filters

Using Ferromagnetic Resonance 887

Baolin Zhao, Xiaojun Liu, Zetao He, Yu Shi

Constraint Satisfaction Solution for Target Segmentation

under Complex Background 893

Liqin Fu, Changjiang Wang, Yongmei Zhang

The Integrated Test System of OLED Optical Performance 901

Yu-jie Zhang, Wenlong Zhang, Yuanyuan Zhang

Application of Strong Tracking Kalman Filter in Dead

Reckoning of Underwater Vehicle 909

Ye Li, Yongjie Pang, Yanqing Jiang, Pengyun Chen

The High-Performance and Low-Power CMOS Output Driver

Design 917

Ching-Tsan Cheng, Chi-Hsiung Wang, Pei-Hsuan Liao, Wei-Bin Yang,

Yu-Lung Lo

Trang 20

Circularly Polarized Stacked Circular Microstrip Antenna

with an Arc Feeding Network 927

Sitao Chen, Xiaolin Yang, Haiping Sun

Modeling the Employment Using Distributed Agenciesand

Data Mining 933

Robust Player Tracking and Motion Trajectory Refinement

for Broadcast Tennis Videos 941

Min-Yuan Fang, Chi-Kao Chang, Nai-Chung Yang, I-Chang Jou,

Md Rajibur Rahaman Khan, Modar Safir Shbat, Vyacheslav Tuzlukov

Research of Super Capacitors SOC Algorithms 967

Hao Guoliang, Liu Jun, Li Yansong, Zhang Qiong, Guo Shifan

The Survey of Information System Security Classified

Protection 975

Zhihong Tian, Bailing Wang, Zhiwei Ye, Hongli Zhang

Optimization of a Fuzzy PID Controller 981

Dongxu Liu, Kai Zhang, Jinping Dong

Study on the Application of Data Mining Technique in

Intrusion Detection 989

Hongxia Wang, Tao Guan, Yan Wang

Fault Recovery Based on Parallel Recomputing in

Transactional Memory System 995

Wei Song, Jia Jia

Forecast of Hourly Average Wind Speed Using ARMA Model

with Discrete Probability Transformation 1003

Trang 21

Multi-Layer Methodology Applied to Multi-period and

Multi-Objective Design of Power Distribution Systems 1011

Dynamics of Land Cover and Land Use Change in Quanzhou

City of SE China from Landsat Observations 1019

Weihua Pan, Hanqiu Xu, Hui Chen, Chungui Zhang, Jiajin Chen

A SOA-Based Model for Unified Retrieval System 1029

Hui Li, Li Wang

Clinical Sign-Based Fish Disease Diagnosis Aid System 1039

Chang-Min Han, Soo-Yung Yang, Heeteak Ceong, Jeong-Seon Park

A Fully-Integrated Amplifier MMIC Employing a

CAD-Oriented MIM Shunt Capacitor 1047

Young Yun, Jang-Hyeon Jeong, Young-Bae Park, Bo-Ra Jung,

Jeong-Gab Ju, Eui-Hoon Jang

A Design of Adaptive Optical Current Transducer Digital

Interface Based on IEC61850 1055

Zhang Qiong, Li Yansong, Liu Jun, Hao Guoliang

Performance Analysis of DSR for Manets in Discrete Time

Markov Chain Model with N -Spatial Reuse 1063

Xi Hu, Guilin Lu, Hanxing Wang

Equivalent Circuit Model of Comb-Type Capacitive

Transmission Line on MMIC for Application to the

RF Component Design in Millimeter-Wave Wireless

Communication System 1071

Eui-Hoon Jang, Young-Bae Park, Bo-Ra Jung, Jang-Hyeon Jeong,

Jeong-Gab Ju, Young Yun

Author Index 1079

Trang 22

M Zhu (Ed.): Electrical Engineering and Control, LNEE 98, pp 1–9

springerlink.com © Springer-Verlag Berlin Heidelberg 2011

Analysis Based on S-Transform

Tao Tao, Zhenming Peng, Chaonan Yang, Fang Wei, and Lihong Liu

School of Opto-Electronic Information, University of Electronic Science and Technology

of China, Chengdu 610054, China tt19870419@163.com, zmpeng@uestc.edu.cn

Abstract A novel method for dim moving target detection of synthetic aperture

radar (SAR) image which is based on the S-transform(ST)domain coherent analyzing was proposed in this paper Firstly, the paper describes the basic principle of ST; and analyzes the mechanism of the second generation of coherent algorithm On the basis of these algorithms, the coherent formula was obtained which was used in this paper Making use of the difference between S-

Transform domain and background of moving target in SAR image with the same scene, coherent image could be constructed by coherent values which were calculated by the proposed coherent formula In the coherent image, target can be detected by compare the coherent values Experiments showed that the proposed method could detect the dim target

Keywords: S-transform, SAR image, coherence analysis, targets detection

1 Introduction

The interpretation of SAR images, to which target detection, occupying an important position especially in target identification system, is the key, has been a focus for researchers The research in this respect attracts considerable attention Classical target detection is based on CFAR, which is to establish threshold on the foundation

of the correctly estimating noise and heterogeneous wave, to detect After the efforts

of numerous scholars, many new methods of target detection have emerged today, such as the improved constant false alarm rate (CFAR), two-parameter CFAR detection, and transform domain-based target detection method [1], etc Dim target detection has been a hot research, too As the dim target in the image only occupies a tiny part of pixels, which has no texture, no shape or other information, it’s hard to be detected for classical target detection methods, and some special preprocessing must

be done to the image in order to better detect the interesting dim target

SAR image is a kind of complex non-stationary signal, and it can be accurately described using only appropriate method of time-frequency analysis [2] Traditional Fourier-Transform only does single frequency decomposition to signal, although frequency resolution of that method can achieve the desired level, it loses time resolution, and lacks the function of positioning the signal’s time and frequency at the same time, and can’t effectively analyze the local properties of the signal, and the

Trang 23

transformed frequency spectrum can only represent the overall effect of signal frequency changing, so it’s hard to express the non-stationary changes with time of signal statistical properties Signal’s local property can be accurately described using two-dimensional co-expressed of time domain and frequency domain S-Transform with a good performance of time-frequency analysis is a new developed method of time-frequency analysis [3-4] Compared with wavelet-transform, both have good local features and direct relation to Fourier spectrum of signal, therefore it can effectively characterize weak signal’s characteristics

A novel dim moving target detection method of SAR image which is based on the S-Transform domain coherent analyzing is proposed in this paper Firstly, the paper describes the basic principle of S-Transform, and analyzes the mechanism of the second generation of coherent algorithm On the basis of these algorithms, the coherent formula is obtained which is used in this paper Making use of the difference between S-transform domain and background of moving target in SAR image with the same scene, coherent image can be constructed by coherent values which are calculated by the proposed coherent formulas In the coherent image, target can be detected by comparing coherent values Experiments show that the proposed method can detect the dim target

2 Basic Principle of S-Transform

S-transform(ST)first proposed by Stockwell (1996)[5] is a new linear time-frequency representation method, time-frequency resolution of which changes with frequency It

is an extension of the continuous wavelet transform, which takes Morlet wavelet as the basic wavelet ST has a good performance of time-frequency analysis[6], whose time-frequency window has adjustable nature, with good time resolution properties in the high frequency, while good frequency resolution properties in the low frequency Here are the basic transform formulas of ST[7]

For a two-dimensional imageh x y( , ), ( ,τ1 f1)is defined asx, ( ,τ2 f2)asy, then the transformation formula of two-dimensional ST is as follows:

Trang 24

3 Coherent Analyzing in S-Transform Domain

The basic idea of the method in this paper: carry on ST for two SAR images under the same background and the target location with displacement and coherent analysis of the two images in ST domain, make use of energy spectrum feature difference in S domain between the target on image and the background to get coherent values to construct coherent image, and establish threshold to detect targets Having integrated the advantages of short time-window Fourier transform and wavelet transform, ST provides joint function of time and frequency, describes the signal energy density or signal intensity with variables of time and frequency ST, with high time-frequency resolution [8], does not have the impact of cross terms Due to the advantages of ST in time-frequency analysis, when the image is transformed to the S domain, the energy spectrum

of the background for the two images in S domain is basically the same But when the targets of the two images move the target energy spectrum also moves accordingly in S domain and the position corresponding to the target energy spectrum changes

Trang 25

Coherence technique is very sensitive to mutation of signals [9], which highlights the similarity of signals using mathematical method and then achieves a new technology to detect weak signals and reflect unusual characteristics The coherent technique is divided into three generations: the first generation algorithm is based on cross-correlation, which has better resolution in the case of high signal-to-noise ratio of data, but bad anti-noise ability relatively; the second generation algorithm is based on the similarity, better for computing coherence compared with the first-generation algorithm and higher resolution, whose coherent processing results, to some extent, are influenced by the data quality still, though; the third-generation algorithm is based on the feature structure

According to coherence technique in two-dimensional image processing features, the second generation coherent algorithm, proposed by K.J Marfurt et.al [10] in

1997 They gave the formula of the second generation algorithm in his article,

2 1

2 1

J u k t px qy x y

τ τ

+

=− = +

The numerator can be expressed as the sum of all elements of the following matrix A

which is defined as,

Trang 26

1 1 2

2 1

reverse sequence sum and one group’s positive sequence sum, for u im According to sorting inequality theory, it can be noted that J1 2

It can be supposed from the above analysis that the second generation coherent algorithm can be improved if the incoherency of image data is needed to be emphasized and the algorithm to the sensitivity of incoherency is further improved by using the positive sequence sum divided by the reverse sequence sum instead of all sequences sum divided by J times the positive sequence sum According to the idea of the second generation coherent algorithm, coherent formula can be defined as:

2 1

2 1

Trang 27

sequence sum, known from the properties of sequencing inequality The numerator in equation (11) is the chaotic sequence sum of arrays constituted by the absolute value

of (u mv m), and the denominator is N times the positive sequence sum, therefore the coherent coefficient c is less than or equal to 1

When the image is transformed to S domain, the energy spectrum of the position where the target corresponds to is bigger in two energy images of S domain The target is moving, namely that the target position is different in energy images of S domain, so the corresponding difference (u mv m) is bigger when the computational elements include target elements Relatively, (u mv m) is smaller when changes in background of two images are smaller Thereby larger c expresses higher image similarity; lower, contrarily So, the calculated c is smaller when the computational elements include target elements, which shows a mutation of signal in S domain, where the target exists According to the above analysis the position of image target can be exposed by calculating coherent coefficients, thereby target detection is achieved by using simple threshold segmentation

Steps of the algorithm of target detection:

Step 1: implement ST separately for two SAR images u x y( , ) andv x y( , ) with the same scene to get the energy feature images S u( ,τ τ1 2, ,f f1 2) and S v( ,τ τ1 2, ,f f1 2)in

ST domain;

Step 2: use appropriate window size (such as: 3 3× or 5 5× ) to get the elements in the same position of energy feature images in ST domain in turn, and use equation (11) to calculate coherent coefficients, then construct coherent images by coherent coefficients;

Step 3: set threshold κ for coherent images, and generally κ takes the empirical value μσ , where μ is a mean value of elements about coherent images and σ is variance, and then carry on target detection

The flow of the proposed algorithm is shown in figure 1

Fig 1. Algorithm flow about target detection

Trang 28

4 Stimulation of the Algorithm

To test the validity of the method, SAR image of moving target with the same scene is stimulated in the paper Fig.2 (a) and (b) show two SAR images with the same scene, where there is a moving point target The two images are detected in accordance with the method proposed in the last section of the paper Fig.3 (a) shows the coherent image obtained from formula (11) in S domain after ST of the two images Through coherent image can target location be implemented using relatively simple method, shown as fig.3 (b) Because the position, where the target exists, corresponds to small coherent value, correspondingly the coherent image calculated in S domain corresponds to the low power position, seen from coherent image, the color of the target position is blue which denotes low power

Known from formula (4), discrete two-dimensional ST has four parameter variables: jT1,kT2,u MT/ 1,v NT/ 2 In order to improve computational efficiency, when calculating discrete two-dimensional ST, fix the value of vto get S domain image The calculated result is that the resolution is higher in the vertical direction than that in the horizontal direction, as shown in fig.3 (a) Hence the detection result

is that the target point was stretched in the horizontal direction, as shown in fig.3 (b) After the segmentation of original image target, calculate the center-of-mass coordinate, then the center-of-mass coordinate of the target point in fig.2 (a) is (78.915, 101.35) The detected result shows that the center-of-mass coordinate of the target point in fig.3 (b) is (79, 101) By comparing the target’s center-of-mass coordinate of detection result with that of original image, it can be seen that the method in this paper allows more accurate positioning, as shown in table 1 100 groups of SAR images with the same scene are simulated using the method proposed

in this paper, as a result, there are 8 targets and FAR is 8% Experiments prove the validity of the method

Table 1 Performance analysisof algorithm Target’s Real

Coordinate

Target’s Detection Coordinate

Detection Error

Trang 29

Acknowledgements This work is supported by National Natural Science Foundation

of China (40874066, 40839905), The Key Laboratory Fund of Beam Control, Chinese Academy of Sciences (2010LBC001)

3 Yong, Y., Yang, X.F., Wang, B.X., et al.: A Small Target Detection Method Based on Generalized S-Transform In: International conference on Apperceiving Computing and Intelligence Analysis, ICACIA 2008, pp 189–192 IEEE Press, Los Alamitos (2008), doi:10.1109/ICACIA.2008.4770002

4 Peng, Z., Zhang, J., Meng, F., et al.: Time-frequency Analysis of SAR Image Based on Generalized S-transform In: International Conference on Measuring Technology and Mechatronics Automation (ICMTMA 2009),, Zhangjiajie, Apl, vol 1, pp 556–559 (2009)

5 Stockwell, R.G., Mansinha, L., Lowe, R.L.: Localization of the Complex Spectrum: the S-transform [J] IEEE Transactions on Signal Processing 17(4), 998–1001 (1996)

6 Zhang, J., Peng, Z., Zhang, Q., et al.: Dim Target Detection Based on Image Features Analysis in Generalized S-transform Domain In: Proc IEEE International Conference on Intelligent Computation Technology and Automation (ICICTA 2010), Changsha, China,

pp 122–125 (2010)

Trang 30

7 Mansiha, L., Stockwell, R.G., Lowe, R.P.: Pattern Analysis with Two Dimensional Spectral Localization: Application of Two Dimensional S-transform Physic A 239(3), 286–295 (1997)

8 Schimmel, M., Gallart, J.: The Inverse S-transform in Filter with Time-frequency localization IEEE Transactions on Signal Processing 53(11), 4417–4422 (2005)

9 Lee, I.W., Dash, P.K.: S-transform-based Intelligent System for Classification of Power Quality Disturbance Signals IEEE Transactions on Industrial Electronics 50(4), 800–805 (2003)

10 Marfurt, K.J., Sudhakar, V., Gersztenkorn, A., Crawford, K.D., Nissen, S.E.: Coherency Calculations in the Presence of Structural Dip In: 67th Annual International Meeting Society of Exploration Geophysicists, Expanded Abstracts, pp 566–569 (1997)

Trang 32

M Zhu (Ed.): Electrical Engineering and Control, LNEE 98, pp 11–17

springerlink.com © Springer-Verlag Berlin Heidelberg 2011

Directed Weighted Networks

Hongtao Liu1,*, Xiao Qin, Hongfeng Yun, and Yu Wu

Institute of Web Intelligence, Chongqing University of Posts and Telecommunications,

Chongqing, 400065, China Liuht@cqupt.edu.cn, qxiaomm@163.com, yunhongfeng@163.com,

wuyu@cqupt.edu.cn

Abstract In this paper, the impact factors of in-degree and out-degree are

introduced into community detection, and the directed weighted degree is used to measure the importance of the node Based on the core nodes, a community detecting algorithm for directed and weighted networks is proposed Then the community detection on the blog site of Sciencenet is conducted with standard structure entropy as a measure Experimental results demonstrate that in directed and weighted networks, the proposed algorithm is efficient with shorter execution time By comparing with the classical algorithm, the detecting results

of our algorithm meet the trend of standard entropy better It means the algorithm proposed is improved to some extent

Keywords: Directed and Weighted Networks, Community Detection, Standard

Structure Entropy

1 Introduction

Properties of complex networks often excite many researchers’ interesting, such as small-world property, scale-free property, rich-club phenomenon and etc Community structure is one of the most important properties of complex networks, which has become a focus in recent years by Newman and Girvan's research [1]

There are many classical algorithms, such as K-L algorithm[2], Spectral bisection method[3] and GN algorithm[4] In K-L algorithm and spectral bisection method, the number of communities needs to be pre-determined which is often unrealistic GN algorithm avoids the defect but the computational complexity is higher relatively In our previous work, we have studied the evolution of virtual community in BBS by calculating the structure entropy[5] Since core nodes play an important role in networks,Liping Xiao proposed an algorithm to evaluate importance of the nodes in networks using data field theory[6] Duanbing Chen[7] proposed a local detecting algorithm in weighted networks based on the core nodes Since modularity Q was

*

Hongtao Liu(1974- ), Associate Professor, Ph.D., Research: Emergent Computation, Network Intelligence; Xiao Qin(1985- ), Postgraduate, Research: Network Intelligence; Hongfeng Yun(1987- ), Postgraduate, Research: Network Intelligence; Yu Wu(1970- ), Professor, Ph.D., Research: Emergent Computation, Network Intelligence

Trang 33

proposed by Newman[1], there was an accepted standard for the results of community detection Currently, community detection is measured by Q value and computational complexity basically

From above we find most detecting algorithms view the networks as undirected edges Thus they lose some useful information, and only conduct a quantitative analysis

on the detecting results In this paper, we consider the direction of edges, and propose a new algorithm with standard structure entropy as a measure

The rest of this paper is organized as follows Section 2 gives the previous work Section 3 describes our algorithm in detail The algorithm is simulated and analyzed in Section 4 At last, Section 5 concludes our paper and discusses the future work

2 Previous Work

2.1 Structure Entropy

Entropy is a measure of energy distribution in complex systems It can reflect the stability and change direction of the system Entropy has become an important metric to study complex systems, and gains more and more attention

The network structure entropy is defined as:

1ln

2.2 A Local Detecting Algorithm in Weighted Networks

Duanbing Chenproposed a local detecting algorithm in weighted networks[7] In this

algorithm, the key aspect was selection of node v which had the largest node strength

Throughfinding all neighbors of node v, an initial community was composed Then

making some adjustment to the initial community, a final community was obtained Repeated the above steps we could find all communities in the network

Experimental results demonstrated that the algorithm was rather efficient for detecting communities in weighted networks However, it ignored the direction of edges and lost some information

3 A Community Detecting Algorithm in Directed Weighted

Networks

3.1 A Novel Model Based on Directed Networks

As we know, if an individual has a lot of direct contacts with others in complex systems, it is more important and has great “power” Under the guidance of this idea, an

Trang 34

algorithm(D-W algorithm) for detecting communities in directed and weighted networks is proposed Duanbing Chen[7] defined node strength as:

where ωuv denotes the weight of the edge which links node u and v In the blog

networks, if a user responds to others frequently but obtains few responses, the user can not be a core node It means direction of the edges have different influences on the importance of nodes Thus we measure the importance of a node with directed weighted degree Firstly some reasonable assumptions are presented

Assumption 1: The in-degree and out-degree of a node make different influence on the importance of the node;

Assumption 2: A node has a broad range of communication in a network if there are more edges which connect with it;

Assumption 3: It means the two nodes have a closer relationship if the edge between them has a greater weight

Together with the above three assumptions, we give the definition of in-weighted

degree D ip and out-weighted degree D op of node p

where ω(v q ,v p) denotes the weight of the directed edge and < v vq, p >∈ E denotes the

directed edge from q to p

Therefore, directed weighted degree of node P is defined as:

Step1: Detecting the initial community

A Calculate the directed weighted degree D p for each node p with label “F”;

Trang 35

B Select a node u with the largest directed weighted degree and find its neighbors marked by label “F” These nodes compose an initial community C i;

Step2: Adjusting the initial community

A For each node v in community C i , if the belonging degree B(v, C i) is less than

0.5(we don’t consider node v to be tight enough with community C i if the

belonging degree is less than 0.5), remove node v from community C i;

B Repeat A until∀ ∈v C i, B(v, C i) is not less than 0.5, and obtain the initial community C i;

Step3: Initial community extended

A Find all neighbors N c of community C i For every node v in N c, calculate the belonging degree B(v, C i);

B For each node v in N c, if the belonging degree B(v, C i) is more than 0.5, add node

v into community C i;

C Repeat B until∀ ∈v N c, B(v, C i) <0.5, then obtain a final community and also be denoted by community C i Marking all nodes in C i with label “T”;

D Return to step1 to mine the next community

4 Algorithm Simulation and Analysis

4.1 Selection of Experimental Object and Parameters

Table 1 Matching ratio based on different parameters

Number Α β Matching Number Matching Ratio

Trang 36

The experiment is implemented on Matlab 7.1 We use formula(5) to obtain our Top

30 Bloggers To find out the optimal parameters, we obtain the matching ratio under different parameters by comparing them with the official top 100 ranking of the Sciencenet , as shown in Table 1

As seen in Table 1, the matching ratio reaches 63.30%, the highest value, when α,βare set to 0.9 and 0.1 To validate our result, several more experiments are done with greater amount of data e.g Top 40, Top 50 The results are similar to Top 30

4.2 Experimental Results and Analysis

Experiment 1: Taking standard structure entropy as a measure, detecting results based

on the proposed algorithm and Duanbing Chen’s[7] are compared

In order to exclude the impact of the number of nodes, the network structure entropy

of Sciencenet is normalized, as shown in Fig 1a Based on the analysis in 4.1(2), the parameters α, βare set to 0.9 and 0.1, respectively, in our algorithm Since users in the network interact infrequently in the first four months, community detection is conducted from the 5th month in this paper By removing several communities that have less significant effect, the main communities are obtained And the results based

on two different algorithms are shown in Fig 1b

Fig 1 Results based on different algorithms

As seen in Fig 1a, the network structure tends to be stable after the 30th month The reason is that as the standard structure entropy has little fluctuation, the community structure becomes stable As shown in Fig 1b, the community structure is more stable while adopting the proposed algorithm, compared to Duanbing Chen’s Thus the proposed algorithm is more efficient

Trang 37

Experiment 2: Detecting results with different parameters are compared in order to illustrate the rationality of parameters selected in 4.1(2) Here, three circumstances are considered: 1) αis comparatively bigger than β; 2) αis equal to β; 3) αis comparatively smaller than β Since the second situation has been discussed in Experiment 1, only two conditions need to be further explored Hence, the parameters are set to α=0.8, β=0.2

and α=0.1, β=0.9, respectively And the detecting results are shown in Fig 2

Fig 2 Results based on different parameters

As seen in Fig 2, there are large fluctuations in community structure after the 30th month while choosing the above two sets of parameters This is not consistent with the standard structure entropy Meanwhile, experiments with other sets of parameters are also conducted, and the results are similar as above Therefore, the parameters selected

(3) When the network structure is stable at time T (Fig.1a the 30th month), if we need

to detect communities in the network after T, then we can use the data gained at time T (the 30th month) This greatly reduces the costs

Currently, we only research community with the comment data In fact, there are more links such as links between message boards, friends and so on It is expected to gain more data to research community in the next step

Acknowledgements

This paper is supported by National Natural Science Foundation of China (60873079, 61040044), (Key) Natural Science Foundation of Chongqing (2008BB2241, 2009BA2089), Program for New Century Excellent Talents in University (NCET)

Trang 40

M Zhu (Ed.): Electrical Engineering and Control, LNEE 98, pp 19–27

springerlink.com © Springer-Verlag Berlin Heidelberg 2011

through Bacterial Foraging Particle Swarm

Optimization Algorithm

Hsuan-Ming Feng Department of Computer Science and Information Engineering, National Quenoy University,

No 1 University, Rd., Kin-Ning Vallage, Kinmen, 892, Taiwan, R.O.C

hmfenghmfeng@gmail.com

Abstract An innovative bacterial-foraging-based swarm intelligent algorithm

called bacterial foraging particle swarm optimization (BFPSO) is applied for the design of fuzzy systems to balance the car-pole platform The BFPSO is an efficient evolutionary learning algorithm to deal with complex and global optimization problems The BFPSO combines the inspired behaviors of bacterial foraging mode and the PSO learning stage to approximate the benefits

of fast convergence ability and lower computational load This paper illustrates the perfect BFPSO algorithm in detail with the simulation to automatically select appropriate parameters of fuzzy systems Computer simulation results on the nonlinear control problems are derived to demonstrate the efficiency of BFPSO

Keywords: Fuzzy rule-based systems, bacterial foraging particle swarm

optimization, evolutionary learning algorithm

1 Introduction

Fuzzy systems with the linguistic rules have been successfully known to put on many

complicated fields, such as high-dimensional functional approximation [1-3] and nonlinear control [4] problems In some case studies, there still have some difficulties

to generate appropriate fuzzy systems One of the main problems in approaching the better fuzzy systems is to acquire the suitable fuzzy rules and regulate the membership functions shapes In traditional search way, the fuzzy rules are determined by the experience oriented way and membership functions are selected by

the trial-and-error procedure The work in obtaining the above-mentioned terms is

time-consuming There are two major approaches to develop the suitable parameters

of fuzzy systems One approach implies that fuzzy rules are tuned by human experts However, these available fuzzy rules are too rough for complex and ill-defined system The other training procedure is that the desired fuzzy rules are often extracted from input-output training-data pairs Traditional trial-and-error and gradient-type learning strategies are difficult for designers when solving nonlinear and complicated problems Thawonmas and Abe [5] developed a learning method to determine fuzzy

Ngày đăng: 13/12/2013, 05:17

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
2. Siemens industrial products [EB/OL], http://w1.siemens.com/answers/ cn/zh/index.htm?stc=cnccc020001 Sách, tạp chí
Tiêu đề: Siemens industrial products
1. Editorial committee of Mine hoist breakdown processing and technical reformation. Mine hoist breakdown processing and technical reformation. Mechanical industry press, Beijing (2005) Khác
3. Write, G.S., Zhongzhi, S., Yongquan, L.: Translate. Knowledge engineering and know- ledge management. Mechanical industry press, Beijing (2003) Khác
4. Noy, N.F., Mcguinness, D.L.: Ontology development: guide to creating your first onto- logyER. Stanford University, Stanford (2001) Khác
5. Prichard, D., Theiler, J.: Generating surrogate data for time series with several simulta- neously measured variables. Physical Review Letters 73(7), 951–954 (1994) Khác
6. Rombowts, S.A.R.B., Keunen, R.W.M., Stom, C.: Investigation of nonlinear structure in multichannel EEG. Physics Letter A 202, 352–358 (1995) Khác
7. Jinhu, L., Anju, L., Shihua, C.: Chaos time series analysis and application. Wuhan univer- sity press, Wuhan (2002) Khác
8. Haiyan, W., Shan, L.: Chaos time series analysis and application. Science press, Beijing (2006) Khác
9. Zwelee, G.: Wavelet-Based Neural Network for Power Disturbance Recognition an d Classification. IEEE Tram on Power Delivery 19(4), 1560–1568 (2004) Khác
10. Yanwei, C., Yaocai, W., Tao, Zhijie, W.: Fault Diagnosis of a Mine Hoist Using PCA and SVM Techniques. Journal of China Univ Mining&amp;Technol. 18(3), 0327–0331 (2008) Khác

TỪ KHÓA LIÊN QUAN