Current IssuePrevious Issue   Next Issue

Volume 14 No. 2
20 February 2009

2009, 14(2): 151-156.   doi:10.1016/S1007-0214(09)70023-9
Abstract ( 132 )  ( 35 )   Save
Long duration visual tracking of targets is quite challenging for computer vision, because the environments may be cluttered and distracting. Illumination variations and partial occlusions are two main difficulties in real world visual tracking. Existing methods based on hostile appearance information cannot solve these problems effectively. This paper proposes a feature-based dynamic tracking approach that can track objects with partial occlusions and varying illumination. The method represents...

2009, 14(2): 157-160.   doi:10.1016/S1007-0214(09)70024-0
Abstract ( 149 )  ( 67 )   Save
Two characteristics of Chinese mixed traffic invalidate the conventional queuing delay estimates for western countries. First, the driving characteristics of Chinese drivers lead to different delays even though the other conditions are the same. Second, urban traffic flow in China is often hindered by pedestrians at intersections, such that imported intelligent traffic control systems do not work appropriately. Typical delay estimates for Chinese conditions were obtained from data for over 500 v...

2009, 14(2): 161-169.   doi:10.1016/S1007-0214(09)70025-2
Abstract ( 103 )  ( 50 )   Save
Hierarchical art was used to solve the mixed mode placement for three dimensional (3-D) integrated circuit design. The 3-D placement flow stream includes hierarchical clustering, hierarchical 3-D floorplanning, vertical via mapping, and recursive two dimensional (2-D) global/detailed placement phases. With state-of-the-art clustering and de-clustering phases, the design complexity was reduced to enhance the placement algorithm efficiency and capacity. The 3-D floorplanning phase solved the layer...

2009, 14(2): 170-175.   doi:10.1016/S1007-0214(09)70026-4
Abstract ( 155 )  ( 39 )   Save
In traditional Chinese medicine, the coating on the tongue is considered to be a reflection of various pathologic factors. However, the conventional method to examine the tongue lacks an acceptable standard and does not provide the means for sharing information. This paper describes a segmentation method to extract tongue coatings. First, the tongue body was extracted from the original image using the watershed transform. Then, a threshold method was applied to the image to eliminate the light f...

2009, 14(2): 176-182.   doi:10.1016/S1007-0214(09)70027-6
Abstract ( 135 )  ( 32 )   Save
A networks-on-chip (NoC) cost-effective design method was given based on the globally-asynchronous locally-synchronous (GALS) interconnect structure. In this method, the synchronous mode was used to transmit data among routers, network interface (NI), and intellectual property (IP) via a synchronous circuit. Compared with traditional methods of implementing GALS, this method greatly reduces the transmission latency and is compatible with existing very large scale integration (VLSI) design tools....

2009, 14(2): 183-188.   doi:10.1016/S1007-0214(09)70028-8
Abstract ( 149 )  ( 58 )   Save
An efficient adaptive group of pictures (GOP)-level bit allocation algorithm was developed based on reverse dynamic programming (RDP). The algorithm gives the initial delay and sequence distortion curve with just one iteration of the algorithm. A simple GOP-level rate and distortion model was then developed for two-level constant quality rate control. The initial delay values and the corresponding optimal GOP-level bit allocation scheme can be obtained for video streaming along with the proper i...

2009, 14(2): 189-195.   doi:10.1016/S1007-0214(09)70029-X
Abstract ( 161 )  ( 40 )   Save
In a jamming environment with multiple wideband and narrowband jammers, global positioning system (GPS) receivers can use space-time processing to efficiently suppress the jamming. However, the computational complexity of space-time algorithms restricts their application in practical GPS receivers. This paper describes a reduced-rank multi-stage nested Wiener filter (MSNWF) based on subspace decomposition and Wiener filter (WF) to eliminate the effect of jamming in anti-jamming GPS receivers. A ...

2009, 14(2): 196-205.   doi:10.1016/S1007-0214(09)70030-6
Abstract ( 106 )  ( 27 )   Save
Semantic extraction is essential for semantic interoperability in multi-enterprise business collaboration environments. Although many studies on semantic extraction have been carried out, few have focused on how to precisely and effectively extract semantics from multiple heterogeneous data schemas. This paper presents a semi-automatic semantic extraction method based on a neutral representation format (NRF) for acquiring semantics from heterogeneous data schemas. As a unified syntax-independent...

2009, 14(2): 206-211.   doi:10.1016/S1007-0214(09)70031-8
Abstract ( 144 )  ( 63 )   Save
In orthogonal frequency-division multiplexing (OFDM) systems, the capability to support high mobility is greatly limited by the intercarrier interference (ICI) caused by time-frequency selective fading channels. This paper presents a precoded OFDM system for ICI mitigation. A precoder is introduced to relieve the ICI by transmitting N-point composite information symbols at twice the subcarrier interval. A Hadamard-matrix-like pilot pattern is used to recover the composite information sy...

2009, 14(2): 212-217.   doi:10.1016/S1007-0214(09)70032-X
Abstract ( 184 )  ( 63 )   Save
ARIA is a new block cipher designed as the block cipher standard of South Korea. The current version is 1.0, which is an improvement of version 0.8 with the security using four kinds of S-boxes instead of two and an additional two rounds of encryptions. These improvements are designed to prevent the dedicated linear attack on ARIA version 0.8 by the four different kinds of S-boxes. This paper presents 12 linear approximations of a single round function that succeeds in attackin...

2009, 14(2): 218-224.   doi:10.1016/S1007-0214(09)70033-1
Abstract ( 147 )  ( 37 )   Save
Due to the uncertainty of the market demand in the supply chain, this paper characterized market demand as a fuzzy variable and proposed single-period and long-term contracts to coordinate the two members (supplier and buyer) in the supply chain. Comparison of the effectiveness of the two contracts indicates that a long-term contract is more effective than a single-period contract in improving the profit potential of both the total supply chain and each member in the supply chain. This conclusio...

2009, 14(2): 225-233.   doi:10.1016/S1007-0214(09)70034-3
Abstract ( 150 )  ( 43 )   Save
An on-line method was developed to improve diagnostic accuracy and speed for analyzing running motors on site. On-line pre-measured data was used as the basis for constructing the membership functions used in a fuzzy neural network (FNN) as well as for network training to reduce the effects of various static factors, such as unbalanced input power and asymmetrical motor alignment, to increase accuracy. The preprocessed data and fuzzy logic were used to find the nonlinear mapping relationships be...

2009, 14(2): 234-241.   doi:10.1016/S1007-0214(09)70035-5
Abstract ( 139 )  ( 34 )   Save
Recent development of the peer-to-peer (P2P) live streaming technique has brought unprecedented new momentum to the Internet with the characters of effective, scalable, and low cost. However, before these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the ...

2009, 14(2): 242-251.   doi:10.1016/S1007-0214(09)70036-7
Abstract ( 154 )  ( 27 )   Save
Support vector machines (SVMs) aim to find an optimal separating hyper-plane that maximizes separation between two classes of training examples (more precisely, maximizes the margin between the two classes of examples). The choice of the cost parameter for training the SVM model is always a critical issue. This analysis studies how the cost parameter determines the hyper-plane; especially for classifications using only positive data and unlabeled data. An algorithm is given for the entire soluti...

2009, 14(2): 252-254.   doi:10.1016/S1007-0214(09)70037-9
Abstract ( 164 )  ( 68 )   Save
The modeling of headway/spacing between two consecutive vehicles in a queue has many applications in traffic flow theory and transport practice. Most known approaches have only studied vehicles on freeways. This paper presents a model for the spacing distribution of queuing vehicles at a signalized junction based on random-matrix theory. The spacing distribution of a Gaussian symplectic ensemble (GSE) fits well with recently measured spacing distribution data. These results are also compared wit...

2009, 14(2): 255-263.   doi:10.1016/S1007-0214(09)70038-0
Abstract ( 148 )  ( 30 )   Save
This paper shows that the protocol presented by Goyal et al. can be further simplified for a one-way function, with the simplified protocol being more practical for the decisional Diffie-Hellman assumption. Goyal et al. provided a general transformation from any honest verifier statistical zero-knowledge argument to a concurrent statistical zero-knowledge argument. Their transformation relies only on the existence of one-way functions. For the simplified transformation, the witness indistinguish...

2009, 14(2): 264-270.   doi:10.1016/S1007-0214(09)70039-2
Abstract ( 139 )  ( 28 )   Save
The availability of a good viewpoint space partition is crucial in three dimensional (3-D) object recognition on the approach of aspect graph. There are two important events depicted by the aspect graph approach, edge-edge-edge (EEE) events and edge-vertex (EV) events. This paper presents an algorithm to compute EEE events by characteristic analysis based on conicoid theory, in contrast to current algorithms that focus too much on EV events and often overlook the importance of EEE events. Also, ...

2009, 14(2): 271-280.   doi:10.1016/S1007-0214(09)70040-9
Abstract ( 205 )  ( 46 )   Save
This paper investigates the controllability of two time-scale systems using both the time-scale separation model and the slow-fast order reduction model. This work considers the effect of a singular perturbation parameter on the model transformations to improve the criterion precision. The Maclaurin expansion method and homotopy arithmetic are introduced to obtain ?-dependent controllability criteria. Examples indicate that the ?-dependent controllability criteria are more accu...