Jun 2018, Volume 19 Issue 4
    

  • Select all
  • Orginal Article
    Ji-jun TONG, Peng ZHANG, Yu-xiang WENG, Dan-hua ZHU

    The segmentation of brain tumor plays an important role in diagnosis, treatment planning, and surgical simulation. The precise segmentation of brain tumor can help clinicians obtain its location, size, and shape information. We propose a fully automatic brain tumor segmentation method based on kernel sparse coding. It is validated with 3D multiple-modality magnetic resonance imaging (MRI). In this method, MRI images are pre-processed first to reduce the noise, and then kernel dictionary learning is used to extract the nonlinear features to construct five adaptive dictionaries for healthy tissues, necrosis, edema, non-enhancing tumor, and enhancing tumor tissues. Sparse coding is performed on the feature vectors extracted from the original MRI images, which are a patch of m×m×m around the voxel. A kernel-clustering algorithm based on dictionary learning is developed to code the voxels. In the end, morphological filtering is used to fill in the area among multiple connected components to improve the segmentation quality. To assess the segmentation performance, the segmentation results are uploaded to the online evaluation system where the evaluation metrics dice score, positive predictive value (PPV), sensitivity, and kappa are used. The results demonstrate that the proposed method has good performance on the complete tumor region (dice: 0.83; PPV: 0.84; sensitivity: 0.82), while slightly worse performance on the tumor core (dice: 0.69; PPV: 0.76; sensitivity: 0.80) and enhancing tumor (dice: 0.58; PPV: 0.60; sensitivity: 0.65). It is competitive to the other groups in the brain tumor segmentation challenge. Therefore, it is a potential method in differentiation of healthy and pathological tissues.

  • Orginal Article
    Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

    In recent years, much attention has been focused on designing provably secure cryptographic primitives in the presence of key leakage. Many constructions of leakage-resilient cryptographic primitives have been proposed. However, for any polynomial time adversary, most existing leakage-resilient cryptographic primitives cannot ensure that their outputs are random, and any polynomial time adversary can obtain a certain amount of leakage on the secret key from the corresponding output of a cryptographic primitive. In this study, to achieve better performance, a new construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificateless public-key encryption scheme is proposed, whose security is proved based on the hardness of the classic decisional Diffie-Hellman assumption. According to our analysis, our method can tolerate leakage attacks on the private key. This method also achieves better performance because polynomial time adversaries cannot achieve leakage on the private key from the corresponding ciphertext, and a key leakage ratio of 1/2 can be achieved. Because of these good features, our method may be significant in practical applications.

  • Orginal Article
    Jia-xin JIANG, Zhi-qiu HUANG, Wei-wei MA, Yan CAO

    Information leak, which can undermine the compliance of web-service-composition business processes for some policies, is one of the major concerns in web service composition. We present an automated and effective approach for the detection of implicit information leaks in business process execution language (BPEL) based on information flow analysis. We introduce an adequate meta-model for BPEL representation based on a Petri net for transformation and analysis. Building on the concept of Petri net place-based noninterference, the core contribution of this paper is the application of a Petri net reachability graph to estimate Petri net interference and thereby to detect implicit information leaks in web service composition. In addition, a case study illustrates the application of the approach on a concrete workflow in BPEL notation.

  • Orginal Article
    Rasha SHOITAN, Zaki NOSSAIR, I. I. IBRAHIM, Ahmed TOBAL

    Sparsity adaptive matching pursuit (SAMP) is a greedy reconstruction algorithm for compressive sensing signals. SAMP reconstructs signals without prior information of sparsity and presents better reconstruction performance for noisy signals compared to other greedy algorithms. However, SAMP still suffers from relatively poor reconstruction quality especially at high compression ratios. In the proposed research, the Wilkinson matrix is used as a sensing matrix to improve the reconstruction quality and to increase the compression ratio of the SAMP technique. Furthermore, the idea of block compressive sensing (BCS) is combined with the SAMP technique to improve the performance of the SAMP technique. Numerous simulations have been conducted to evaluate the proposed BCS-SAMP technique and to compare its results with those of several compressed sensing techniques. Simulation results show that the proposed BCS-SAMP technique improves the reconstruction quality by up to six decibels (dB) relative to the conventional SAMP technique. In addition, the reconstruction quality of the proposed BCS-SAMP is highly comparable to that of iterative techniques. Moreover, the computation time of the proposed BCS-SAMP is less than that of the iterative techniques, especially at lower measurement fractions.

  • Orginal Article
    Yue-peng ZOU, Ji-hong OUYANG, Xi-ming LI

    Supervised topic modeling algorithms have been successfully applied to multi-label document classification tasks. Representative models include labeled latent Dirichlet allocation (L-LDA) and dependency-LDA. However, these models neglect the class frequency information of words (i.e., the number of classes where a word has occurred in the training data), which is significant for classification. To address this, we propose a method, namely the class frequency weight (CF-weight), to weight words by considering the class frequency knowledge. This CF-weight is based on the intuition that a word with higher (lower) class frequency will be less (more) discriminative. In this study, the CF-weight is used to improve L-LDA and dependency-LDA. A number of experiments have been conducted on real-world multi-label datasets. Experimental results demonstrate that CF-weight based algorithms are competitive with the existing supervised topic models.

  • Orginal Article
    Zhong-lin YE, Hai-xing ZHAO

    Most word embedding models have the following problems: (1) In the models based on bag-of-words contexts, the structural relations of sentences are completely neglected; (2) Each word uses a single embedding, which makes the model indiscriminative for polysemous words; (3) Word embedding easily tends to contextual structure similarity of sentences. To solve these problems, we propose an easy-to-use representation algorithm of syntactic word embedding (SWE). The main procedures are: (1) A polysemous tagging algorithm is used for polysemous representation by the latent Dirichlet allocation (LDA) algorithm; (2) Symbols ‘+’ and ‘−’ are adopted to indicate the directions of the dependency syntax; (3) Stopwords and their dependencies are deleted; (4) Dependency skip is applied to connect indirect dependencies; (5) Dependency-based contexts are inputted to a word2vec model. Experimental results show that our model generates desirable word embedding in similarity evaluation tasks. Besides, semantic and syntactic features can be captured from dependency-based syntactic contexts, exhibiting less topical and more syntactic similarity. We conclude that SWE outperforms single embedding learning models.

  • Orginal Article
    Yi-qi XIE, Zhi-guo YU, Yang FENG, Lin-na ZHAO, Xiao-feng GU

    We present a novel standard convolutional symbols generator (SCSG) block for a multi-parameter reconfigurable Viterbi decoder to optimize resource consumption and adaption of multiple parameters. The SCSG block generates all the states and calculates all the possible standard convolutional symbols corresponding to the states using an iterative approach. The architecture of the Viterbi decoder based on the SCSG reduces resource consumption for recalculating the branch metrics and rearranging the correspondence between branch metrics and transition paths. The proposed architecture supports constraint lengths from 3 to 9, code rates of 1/2, 1/3, and 1/4, and fully optional polynomials. The proposed Viterbi decoder has been implemented on the Xilinx XC7VX485T device with a high throughput of about 200 Mbps and a low resource consumption of 162k logic gates.

  • Orginal Article
    Duo ZHANG, Mei-qin LIU, Sen-lin ZHANG, Zhen FAN, Qun-fei ZHANG

    Underwater wireless sensor networks (UWSNs) can provide a promising solution to underwater target tracking. Due to limited energy and bandwidth resources, only a small number of nodes are selected to track a target at each interval. Because all measurements are fused together to provide information in a fusion center, fusion weights of all selected nodes may affect the performance of target tracking. As far as we know, almost all existing tracking schemes neglect this problem. We study a weighted fusion scheme for target tracking in UWSNs. First, because the mutual information (MI) between a node’s measurement and the target state can quantify target information provided by the node, it is calculated to determine proper fusion weights. Second, we design a novel multi-sensor weighted particle filter (MSWPF) using fusion weights determined by MI. Third, we present a local node selection scheme based on posterior Cramer-Rao lower bound (PCRLB) to improve tracking efficiency. Finally, simulation results are presented to verify the performance improvement of our scheme with proper fusion weights.

  • Orginal Article
    Jue WANG, Jun WANG

    The resolution of the multistatic passive radar imaging system (MPRIS) is poor due to the narrow bandwidth of the signal transmitted by illuminators of opportunity. Moreover, the inaccuracies caused by the inaccurate tracking system or the error position measurement of illuminators or receivers can deteriorate the quality of an image. To improve the performance of an MPRIS, an imaging method based on the tomographic imaging principle is presented. Then the compressed sensing technique is extended to the MPRIS to realize high-resolution imaging. Furthermore, a phase correction technique is developed for compen-sating for phase errors in an MPRIS. Phase errors can be estimated by iteratively solving an equation that is derived by minimizing the mean recovery error of the reconstructed image based on the principle of fixed-point iteration technique. The technique is nonparametric and can be used to estimate phase errors of any form. The effectiveness and convergence of the technique are confirmed by numerical simulations.

  • Orginal Article
    Meng WANG, Jia-qiang YANG, Xiang ZHANG, Chang-sheng ZHU

    Properties of the current controller are essential for permanent magnet synchronous machine (PMSM) drives, but the conventional continuous-time current controller cannot fully decouple the cross-coupling terms when applied in the digital processor. Its performance is related closely to the rotational speed. To improve the performance of the current loop, the direct design method in the discrete-time domain is adopted using the accurate discrete-time complex vector model. An integrated accurate hold-equivalent discrete model for PMSM is derived considering the difference between the output of the voltage source inverter and the back electro-motive force. Then an accurate two-degree-of-freedom (2DOF) current controller with a third-order closed-loop transfer function is designed. The 2DOF controller has more freedom in pole placement, and two schemes with a different cancelled pole-zero pair are investigated. Analysis is conducted by the robust root locus method via the complex vector root locus and sensitivity functions, showing properties in disturbance rejection and sensitivity to parameter variation of two schemes. Both schemes have their own advantages. Finally, the dynamic performance and flexibility of the proposed current controller is verified on a 2.5-kW PMSM test bench.

  • Erratum
    Yan-min QIAN, Chao WENG, Xuan-kai CHANG, Shuai WANG, Dong YU