Aug 2016, Volume 17 Issue 8
    

  • Select all
  • Article
    Tian-qi WU,Min YAO,Jian-hua YANG

    By adopting the distributed problem-solving strategy, swarm intelligence algorithms have been successfully applied to many optimization problems that are difficult to deal with using traditional methods. At present, there are many well-implemented algorithms, such as particle swarm optimization, genetic algorithm, artificial bee colony algorithm, and ant colony optimization. These algorithms have already shown favorable performances. However, with the objects becoming increasingly complex, it is becoming gradually more difficult for these algorithms to meet human’s demand in terms of accuracy and time. Designing a new algorithm to seek better solutions for optimization problems is becoming increasingly essential. Dolphins have many noteworthy biological characteristics and living habits such as echolocation, information exchanges, cooperation, and division of labor. Combining these biological characteristics and living habits with swarm intelligence and bringing them into optimization problems, we propose a brand new algorithm named the ‘dolphin swarm algorithm’ in this paper. We also provide the definitions of the algorithm and specific descriptions of the four pivotal phases in the algorithm, which are the search phase, call phase, reception phase, and predation phase. Ten benchmark functions with different properties are tested using the dolphin swarm algorithm, particle swarm optimization, genetic algorithm, and artificial bee colony algorithm. The convergence rates and benchmark function results of these four algorithms are compared to testify the effect of the dolphin swarm algorithm. The results show that in most cases, the dolphin swarm algorithm performs better. The dolphin swarm algorithm possesses some great features, such as first-slow-then-fast convergence, periodic convergence, local-optimum-free, and no specific demand on benchmark functions. Moreover, the dolphin swarm algorithm is particularly appropriate to optimization problems, with more calls of fitness functions and fewer individuals.

  • Article
    Gaetano C. LA DELFA,Salvatore MONTELEONE,Vincenzo CATANIA,Juan F. DE PAZ,Javier BAJO

    The massive diffusion of smartphones, the growing interest in wearable devices and the Internet of Things, and the exponential rise of location based services (LBSs) have made the problem of localization and navigation inside buildings one of the most important technological challenges of recent years. Indoor positioning systems have a huge market in the retail sector and contextual advertising; in addition, they can be fundamental to increasing the quality of life for citizens if deployed inside public buildings such as hospitals, airports, and museums. Sometimes, in emergency situations, they can make the difference between life and death. Various approaches have been proposed in the literature. Recently, thanks to the high performance of smartphones’ cameras, marker-less and marker-based computer vision approaches have been investigated. In a previous paper, we proposed a technique for indoor localization and navigation using both Bluetooth low energy (BLE) and a 2D visual marker system deployed into the floor. In this paper, we presented a qualitative performance evaluation of three 2D visual markers, Vuforia, ArUco marker, and AprilTag, which are suitable for real-time applications. Our analysis focused on specific case study of visual markers placed onto the tiles, to improve the efficiency of our indoor localization and navigation approach by choosing the best visual marker system.

  • Article
    Jia-yin SONG,Wen-long SONG,Jian-ping HUANG,Liang-kuan ZHU

    Analysis of forest canopy hemisphere images is one of the most important methods for measuring forest canopy structure parameters. In this study, our main focus was on using circular image region segmentation, which is the basis of forest canopy hemispherical photography. The boundary of a forest canopy hemisphere image was analyzed via histogram, rectangle, and Fourier descriptors. The image boundary characteristics were defined and obtained based on the following: (1) an edge model that contains three parts, i.e., step, ramp, and roof; (2) boundary points of discontinuity; (3) an edge that has a linear distribution of scattering points. On this basis, we proposed a segmentation method for the circular region in a forest canopy hemisphere image, fitting the circular boundary and computing the center and radius by the least squares method. The method was unrelated to the parameters of the image acquisition device. Hence, this study lays a foundation for automatically adjusting the parameters of high-performance image acquisition devices used in forest canopy hemispherical photography.

  • Article
    Saif Ur Rehman KHAN,Sai Peck LEE,Mohammad DABBAGH1,Muhammad TAHIR,Muzafar KHAN,Muhammad ARIF

    The standard software development life cycle heavily depends on requirements elicited from stakeholders. Based on those requirements, software development is planned and managed from its inception phase to closure. Due to time and resource constraints, it is imperative to identify the high-priority requirements that need to be considered first during the software development process. Moreover, existing prioritization frameworks lack a store of historical data useful for selecting the most suitable prioritization technique of any similar project domain. In this paper, we propose a framework for prioritization of software requirements, called RePizer, to be used in conjunction with a selected prioritization technique to rank software requirements based on defined criteria such as implementation cost. RePizer assists requirements engineers in a decision-making process by retrieving historical data from a requirements repository. RePizer also provides a panoramic view of the entire project to ensure the judicious use of software development resources. We compared the performance of RePizer in terms of expected accuracy and ease of use while separately adopting two different prioritization techniques, planning game (PG) and analytical hierarchy process (AHP). The results showed that RePizer performed better when used in conjunction with the PG technique.

  • Article
    Yun-xiang ZHAO,Wan-xin ZHANG,Dong-sheng LI,Zhen HUANG,Min-ne LI,Xi-cheng LU

    Fingerprint has been widely used in a variety of biometric identification systems in the past several years due to its uniqueness and immutability. With the rapid development of fingerprint identification techniques, many fingerprint identification systems are in urgent need to deal with large-scale fingerprint storage and high concurrent recognition queries, which bring huge challenges to the system. In this circumstance, we design and implement a distributed and load-balancing fingerprint identification system named Pegasus, which includes a distributed feature extraction subsystem and a distributed feature storage subsystem. The feature extraction procedure combines the Hadoop Image Processing Interface (HIPI) library to enhance its overall processing speed; the feature storage subsystem optimizes MongoDB’s default load balance strategy to improve the efficiency and robustness of Pegasus. Experiments and simulations are carried out, and results show that Pegasus can reduce the time cost by 70% during the feature extraction procedure. Pegasus also balances the difference of access load among front-end mongos nodes to less than 5%. Additionally, Pegasus reduces over 40% of data migration among back-end data shards to obtain a more reasonable data distribution based on the operation load (insertion, deletion, update, and query) of each shard.

  • Article
    Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

    Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption (HIBE) scheme in the standard model whose public key size is only (dm2+ mn) log q bits and whose message-ciphertext expansion factor is only log q, where d is the maximum hierarchical depth and (n,m, q) are public parameters. In our construction, a novel public key assignment rule is used to averagely assign one random and public matrix to two identity bits, which implies that d random public matrices are enough to build the proposed HIBE scheme in the standard model, compared with the case in which 2d such public matrices are needed in the scheme proposed at Crypto 2010 whose public key size is (2dm2+ mn+m) log q. To reduce the message-ciphertext expansion factor of the proposed scheme to log q, the encryption algorithm of this scheme is built based on Gentry’s encryption scheme, by which m2 bits of plaintext are encrypted into m2 log q bits of ciphertext by a one time encryption operation. Hence, the presented scheme has some advantages with respect to not only the public key size but also the message-ciphertext expansion factor. Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity and chosen plaintext attacks.

  • Article
    Wei YANG,Can-jun YANG,Ting XU

    We propose a new method for the customized design of hip exoskeletons based on the optimization of the humanmachine physical interface to improve user comfort. The approach is based on mechanisms designed to follow the natural trajectories of the human hip as the flexion angle varies during motion. The motions of the hip joint center with variation of the flexion angle were measured and the resulting trajectory was modeled. An exoskeleton mechanism capable to follow the hip center’s movement was designed to cover the full motion ranges of flexion and abduction angles, and was adopted in a lower extremity assistive exoskeleton. The resulting design can reduce human-machine interaction forces by 24.1% and 76.0% during hip flexion and abduction, respectively, leading to a more ergonomic and comfortable-to-wear exoskeleton system. The humanexoskeleton model was analyzed to further validate the decrease of the hip joint internal force during hip joint flexion or abduction by applying the resulting design.

  • Article
    Bing TIAN,Qun-tao AN,Li SUN,Dong-yang SUN,Jian-dong DUAN

    A novel nonlinear model for surface permanent magnet synchronous motors (SPMSMs) is adopted to estimate the initial rotor position for hybrid electric vehicles (HEVs). Usually, the accuracy of initial rotor position estimation for SPMSMs relies on magnetic saturation. To verify the saturation effect, the transient finite element analysis (FEA) model is presented first. Hybrid injection of a static voltage vector (SVV) superimposed with a high-frequency rotating voltage is proposed. The magnetic polarity is roughly identified with the aid of the saturation evaluation function, based on which an estimation of the position is performed. During this procedure, a special demodulation is suggested to extract signals of iron core saturation and rotor position. A Simulink/MATLAB platform for SPMSMs at standstill is constituted, and the effectiveness of the proposed strategy is verified. The proposed method is also validated by experimental results of an SPMSM drive.

  • Article
    He HAO,Wei-zhong FEI,Dong-min MIAO,Meng-jia JIN,Jian-xin SHEN

    In this study, we investigated the torque characteristics of large low-speed direct-drive permanent magnet synchronous generators with stator radial ventilating air ducts for offshore wind power applications. Magnet shape optimization was used first to improve the torque characteristics using two-dimensional finite element analysis (FEA) in a permanent magnet synchronous generator with a common stator. The rotor step skewing technique was then employed to suppress the impacts of mechanical tolerances and defects, which further improved the torque quality of the machine. Comprehensive three-dimensional FEA was used to evaluate accurately the overall effects of stator radial ventilating air ducts and rotor step skewing on torque features. The influences of the radial ventilating ducts in the stator on torque characteristics, such as torque pulsation and average torque in the machine with and without rotor step skewing techniques, were comprehensively investigated using three-dimensional FEA. The results showed that stator radial ventilating air ducts could not only reduce the average torque but also increase the torque ripple in the machine. Furthermore, the torque ripple of the machine under certain load conditions may even be increased by rotor step skewing despite a reduction in cogging torque.

  • Article
    Ning DU,Fa-sheng LIU

    In cellular networks, users communicate with each other through their respective base stations (BSs). Conventionally, users are assumed to be in different cells. BSs serve as decode-and-forward (DF) relay nodes to users. In addition to this type of conventional user, we recognize that there are scenarios users who want to communicate with each other are located in the same cell. This gives rise to the scenario of intra-cell communication. In this case, a BS can behave as a two-way relay to achieve information exchange instead of using conventional DF relay. We consider a multi-cell orthogonal frequency division multiple access (OFDMA) network that comprises these two types of users. We are interested in resource allocation between them. Specifically, we jointly optimize subcarrier assignment, subcarrier pairing, and power allocation to maximize the weighted sum rate. We consider the resource allocation problem at BSs when the end users’ power is fixed. We solve the problem approximately through Lagrange dual decomposition. Simulation results show that the proposed schemes outperform other existing schemes.

  • Article
    Xiao-ming GOU,Zhi-wen LIU,Wei LIU,You-gen XU

    A new model for three-dimensional processes based on the trinion algebra is introduced for the first time. Compared to the pure quaternion model, the trinion model is more compact and computationally more efficient, while having similar or comparable performance in terms of adaptive linear filtering. Moreover, the trinion model can effectively represent the general relationship of state evolution in Kalman filtering, where the pure quaternion model fails. Simulations on real-world wind recordings and synthetic data sets are provided to demonstrate the potential of this new modeling method.