Loading...

Table of Content

    30 November 2016, Volume 34 Issue 6
    Signal and Information Processing
    Hyperspectral and Multi-spectral Data Fusion Based on Constraint CNMF
    LIU Yang, XU Hong-ping, YI Hang, SHI Qing-ping, XIA Wei-qiang, KANG Jian
    2016, 34(6):  651-660.  doi:10.3969/j.issn.0255-8297.2016.06.001
    Asbtract ( 1287 )   PDF (4329KB) ( 861 )  
    References | Related Articles | Metrics

    Hyperspectral images generally have lowspatial resolution due to limitations of the imaging spectrometer. In this paper, VSC-CNMF is designed to produce a fused image from hyperspectral and multi-spectral images. An end-member smallest volume and abundance sparseness constrained NMF (VSC-CNMF) algorithm is proposed based on the physical characteristics of remote sensing images. We match the end-member and abundance of two types of images by spectral and spatial degradations, and get the fused image with high spatial and spectral resolution according to some un-mixing update rules. Simulation results show that fused images with higher spatial and spectral quality can be obtained with VSC-CNMF.

    Linear Spectral Unmixing of Remote Sensing Images Using Bayesian Method and Non-parametric Model
    LI Xi, CHEN Feng-rui, LI Chang
    2016, 34(6):  661-669.  doi:10.3969/j.issn.0255-8297.2016.06.002
    Asbtract ( 881 )   PDF (4110KB) ( 447 )  
    References | Related Articles | Metrics

    To solve the problem of spectral uncertainty in spectral unmixing of remote sensing images, a non-parametric model is proposed to describe the probability distribution of land cover spectrum. A Bayesian method is used to derive a posteriori probability distribution of the proportion of land cover types. Proportions of land cover types are calculated using unbiased estimation and maximum likelihood estimation. Experiment is carried out to map the impervious surface using a Landsat image. The results show that the proposed Bayesian method has higher accuracy than conventional linear spectral unmixing algorithms and the method of hard classification, therefore is effective in solving the spectral uncertainty problem.

    JPEG Steganalysis Based on LSB Detection and Enhanced Features
    ZHENG Guo-hua, FENG Guo-rui, YU Jiang, CHENG Hang, ZHANG Xin-peng
    2016, 34(6):  670-676.  doi:10.3969/j.issn.0255-8297.2016.06.003
    Asbtract ( 833 )   PDF (2545KB) ( 580 )  
    References | Related Articles | Metrics

    A method of feature enhancement based on detection of least significant bits of DCT coefficients is proposed to solve the problem of information loss due to truncation operation in the co-occurrence matrix. The DCT coefficient plane is calculated modulotwo to generate the least significant bit plane. Co-occurrence matrices are used to capture correlated features among neighboring coefficients of the least significant bit plane. To enhance the features for detection, Zigzag scan is used to produce a new DCT coefficient plane, and then a co-occurrence matrix is generated based on the new plane. A feature vector with 508 dimensions is extracted using the LIU method. Experimental results show that performance of the extended features is better than those of previous schemes.

    Optimal Self-Embedding Scheme Based on Recovery-Data Sharing
    WANG Hui-li, QIN Chuan, GAO Li-ping, CHEN Qing-kui
    2016, 34(6):  677-690.  doi:10.3969/j.issn.0255-8297.2016.06.004
    Asbtract ( 717 )   PDF (4888KB) ( 379 )  
    References | Related Articles | Metrics

    This paper proposes a self-embedding fragile watermarking scheme for image tampering detection and recovery based on variable recovery-data sharing. The generated watermark bits in each image block are composed of recovery bits derived from the interleaved, and scrambled MSB bits of original image and authentication bits derived from the recovery bits and MSB bits. Different from the reported methods using a fixed embedding mode, the proposed scheme has two types of embedding modes, i.e., overlapping embedding and overlapping-free embedding, and uses variable numbers of MSB layers and recovery bits. One can choose an optimal embedding mode to achieve better quality of watermarked image and better performance of content recovery. Experimental results show flexibility and superiority of the scheme as compared with other reported methods.

    Robust Image Hashing Based on Content Structure Diagram
    LI Xin-wei, XIA Xiu-zhen
    2016, 34(6):  691-701.  doi:10.3969/j.issn.0255-8297.2016.06.005
    Asbtract ( 1034 )   PDF (3727KB) ( 370 )  
    References | Related Articles | Metrics

    Robust image hashing is proposed for improving robustness and matching efficiency of copy detection system. Gabor transform coefficients of the image are used to construct structure diagrams. They are transformed from the Cartesian coordinates to polar coordinates, and normalized to obtain new diagrams. The weighted sum of their subblock pixels are calculated to obtain feature vectors, which are then quantized to produce the final binary hash codes. The structure diagrams based on Gabor coefficients proposed in this work are robust and distinctive. The distorted hash code fusion and double keys used in quantization further improve robustness, distinctiveness and compactness of the algorithm. The proposed method is compared with several representative image hashing approaches such as the non-negative matrix factorization hashing, radial and angular shape context hashing, ring partition and invariant vector distance hashing using a large image database. The results show that the overall performance of the proposed algorithm is significantly better than the other methods in terms of precision and recall rates, as well as matching efficiency.

    Analysis of Spatial-Temporal Evolution of Vegetation Cover in Loess Plateau in Recent 33 Years Based on AVHRR NDVI and MODIS NDVI
    ZHANG Chun-sen, HU Yan, SHI Xiao-liang
    2016, 34(6):  702-712.  doi:10.3969/j.issn.0255-8297.2016.06.006
    Asbtract ( 720 )   PDF (7880KB) ( 398 )  
    References | Related Articles | Metrics

    Since implementation of the project of returning farmland to forest and grassland in the Loess Plateau, vegetation cover of the region has been greatly changed. To effectively monitor variation of the vegetation cover, this paper constructs a yearly maximum normalized difference vegetation index (NDVI) sequence covering Loess Plateau from 1982 to 2014 using the per-pixel unary linear regression model (LRM). The work is based on AVHRR GIMMS NDVI datasets from 1982 to 2006 and MODIS NDVI datasets from 2001 to 2014. The constructed NDVI has passed consistency check, and is used to analyze spatial-temporal characteristics of vegetation NDVI in the past 33 years. The following results are obtained. The overall vegetation NDVI of the Loess Plateau in the past 33 years has been increasing. Spatial distribution of the vegetation cover in the regions is significantly different. Vegetation cover has slightly degraded in most southern and western parts of the area under study, and that in the central region is almost unchanged. The vegetation cover shows an improving trend in some areas including the border of Inner Mongolia, Lanzhou, Gansu and Yulin region of Shaanxi. Vegetation covers of different slopes are good. Degrees of changes in areas with different slopes are ranked in a descending order as above 28°, 20°~28°, 14°~20°, 9°~14°, 4°~9°. The vegetation cover in sloping fields of middle part of the Loess Plateau is most improved. Slight improvement of the vegetation cover has been found in areas including eastern Gansu, junction of Gansu and Qinghai provinces, southern Shaanxi, and the cities Linfen, Yuncheng and Sanmenxia of Shanxi, showing positive results in controlling loss of water and soil.

    Safety Risk Analysis and Assessment of Climate Change on China's Maritime Energy Channel
    YANG Li-zhi, ZHANG Ren, WU Yan-cheng, GE Shan-shan, LIU Jun
    2016, 34(6):  713-723.  doi:10.3969/j.issn.0255-8297.2016.06.007
    Asbtract ( 830 )   PDF (3611KB) ( 373 )  
    References | Related Articles | Metrics

    Due to the response of marine environment to the climate change, there may be some effect on the safety of maritime energy channel thus causing potential risk. This paper introduces a risk analysis theory and a pattern recognition method for studying the response and risk of marine environment of maritime energy channel. According to the historical data and climate change scenarios available in the fifth report of intergovernmental panel on climate change (IPCC), the paper uses a Bayesian network to establish a model of the present and future safety risk assessment for the maritime energy channel. The paper aims to offer decision-making reference for tackling climate change and securing our energy safety.

    Electronic Engineering
    Efficient Management Mechanism for Configuration Cache of Reconfigurable System for Multimedia Applications
    LIU Bo, GONG Yu, JI Cheng, WANG Xiao-tong, MEI Chen
    2016, 34(6):  724-733.  doi:10.3969/j.issn.0255-8297.2016.06.008
    Asbtract ( 675 )   PDF (6361KB) ( 533 )  
    References | Related Articles | Metrics

    The scheduling process of configuration context severely limits the performance of reconfigurable systems for multimedia applications. This paper proposes a management mechanism for configuration cache based on a hierarchical configuration context organization mechanism. It includes a configuration context prefetching mechanism based on preparsing and a hierarchical replacement strategy based on hybrid priorities. Experimental results show that the design described in this paper can improve configuration information access performance by 4.34 times. The proposed data cache structure has been applied in a reconfigurable system and implemented in a real chip. Processing performance of the reconfigurable system based on the proposed data cache structures is better than that of other reconfigurable architectures by more than 1.8 times.

    Flow of Ionic Liquids under Electromagnetic Drive
    WAN Jing, WU Ling-xun, XUE Feng-lan, ZHANG Ning-lan, HUANG Yi-fu, DUAN Peng-fei, LIANG Zhong-cheng
    2016, 34(6):  734-742.  doi:10.3969/j.issn.0255-8297.2016.06.009
    Asbtract ( 1057 )   PDF (16974KB) ( 280 )  
    References | Related Articles | Metrics

    The emerging ionic liquids can be used in microfluidics due to their good photoelectric properties and non-volatile features. The flow characteristics of ionic liquids under electromagnetic drive are studied with two theoretic methods. The theoretical results are compared with experimental data. It is found that numerical results based on the finite voxel elements agree with the experimental data, while that based on the Poiseuille's law do not. Therefore, the Poiseuille's law is not a good choice in studying electromagnetic drive of ionic liquids. Flow characteristics in differently-shaped channels are investigated by numerical simulation. This research is useful in microfluidic applications of ionic liquids.

    Computer Science and Applications
    Detection and Analysis of Abnormal Service Satisfaction in Contact Center
    LI Jun-xiang, WAN Zheng-tong
    2016, 34(6):  743-753.  doi:10.3969/j.issn.0255-8297.2016.06.010
    Asbtract ( 607 )   PDF (1220KB) ( 371 )  
    References | Related Articles | Metrics

    To ensure service quality of a contact center, an integrated model of statistical process control and fuzzy diagnosis is built for improvement. An identical-different-opposite evaluation model with an analytic hierarchy process is used to calculate overall customer satisfaction. A Shewhart control chart is used to discover abnormality in the contact center. Causes of abnormalities in the contact center are analyzed and identified with fuzzy diagnosis. It is found that one of the causes was regional promotion activity held on that day, which has been confirmed by checking the actual arrangement of the contact center in their serve area. The limited agents were unable to meet the suddenly increasing service demand. It is concluded that the model can find abnormalities and the reasons. The method is useful for improving service quality of contact centers and other fields.

    Search on Cultural Algorithm with Dual Knowledge
    LI Ming, JIANG Le-qi, CHEN Hao
    2016, 34(6):  754-767.  doi:10.3969/j.issn.0255-8297.2016.06.011
    Asbtract ( 682 )   PDF (6718KB) ( 497 )  
    References | Related Articles | Metrics

    The influence of knowledge on the evolution process in traditional cultural algorithms is unified. Evolving to the same direction may lead to premature convergence. A new knowledge named dual knowledge determined by situational knowledge, normative knowledge and the current individual is proposed. When dual knowledge conducts individual evolution, the direction of different individual is decided by the individual dual knowledge. Simulation of complicated functions is performed. The results indicate that this algorithm has abilities of global convergence and good performance in solving highdimensional optimization problems.

    Fast Topology Discovery for Campus Network
    LI Xiao-ge, WANG Hui, ZHANG Bin, QIN Dong-hong
    2016, 34(6):  768-777.  doi:10.3969/j.issn.0255-8297.2016.06.012
    Asbtract ( 623 )   PDF (4737KB) ( 500 )  
    References | Related Articles | Metrics

    To obtain the topology of a network,scan of the entire network is necessary, which is time consuming in practice. The time needed in finding topology is long especially for small-scale campus network where a large number of IP addresses do not respond to the “ping” message. To solve the problem,this paper proposes a fast topology discovery method without scanning the network,but only based on the address forwarding table. Using a hierarchical traversal strategy,the proposed algorithm discovers the topology by searching devices starting from the outer rim to the center. Simulation results show that the proposed method can deduce the connection of a network including up to 80 nodes in one minute. Performance and effectiveness of the method are verified in practical applications.

    Control and System
    Kinematic Analysis of 3RRR Parallel Robot Based on Two-Dimensional Traversal Search
    SHAN Ning, BAN Chao, CHENG Dong-fang, HU Xue-yan
    2016, 34(6):  778-788.  doi:10.3969/j.issn.0255-8297.2016.06.013
    Asbtract ( 825 )   PDF (7541KB) ( 448 )  
    References | Related Articles | Metrics

    By studying characteristics of planar mechanism of a 3RRR parallel robot, a forward kinematics problem is analyzed and solved numerically. At the same time, an analytical method is used to analyze and solve the inverse kinematics problem. With MATLAB for simulation and calculation, the results are built into a corresponding model by Pro/E for verification. Based on inverse kinematics, workspace of the 3RRR parallel mechanism is obtained by using a two-dimensional traversal search method. The conclusion shows that, when the rotation angle of moving platform is 0, the workspace reaches a maximum, and when the rotation angle is π/2, the workspace is a minimum. The method can reduce workload in solving the problem and improve computational efficiency.

    Robust Stabilization Control of Underactuated PAA Robot Based on Torque Transformation
    PAN Chang-zhong, ZHOU Lan, ZHOU Shao-wu, XIAO Xiao-shi
    2016, 34(6):  789-798.  doi:10.3969/j.issn.0255-8297.2016.06.014
    Asbtract ( 773 )   PDF (4979KB) ( 357 )  
    References | Related Articles | Metrics

    Robust stabilization control based on torque transform is proposed for an underactuated three-link manipulator, named a passive-active-active (PAA) robot. It is equipped with only two actuators on the second and third joints. A torque transform,as a function of control input of the second joint and state of the robot,is used for the control input of the third joint. The robot dynamics is transformed to a simpler form,where the influence of control input of the third joint is explicitly eliminated. An energy-based swingup control law is then designed. In the balancing area,an uncertain model is obtained by treating velocities of the first and second links around the unstable equilibrium as uncertainties. A robust stabilizing state feedback control law is derived to reach a large balancing region based on a technique of linear matrix inequality (LMI). Simulation results show that the proposed approach has advantages of short settling time and small control torques.