A new algorithm is proposed for underwater vehicles multi-path planning. This algorithm is based on fitness sharing genetic algorithm, clustering and evolution of multiple populations, which can keep the diversity of ...A new algorithm is proposed for underwater vehicles multi-path planning. This algorithm is based on fitness sharing genetic algorithm, clustering and evolution of multiple populations, which can keep the diversity of the solution path, and decrease the operating time because of the independent evolution of each subpopulation. The multi-path planning algorithm is demonstrated by a number of two-dimensional path planning problems. The results show that the multi-path planning algorithm has the following characteristics: high searching capability, rapid convergence and high reliability.展开更多
This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of aut...This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a special data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.展开更多
Path planning and formation structure forming are two of the most important problems for autonomous underwater vehicles(AUVs) to collaborate with each other.In this work,a dynamic formation model was proposed,in which...Path planning and formation structure forming are two of the most important problems for autonomous underwater vehicles(AUVs) to collaborate with each other.In this work,a dynamic formation model was proposed,in which several algorithms were developed for the complex underwater environment.Dimension changeable particle swarm algorithm was used to find an optimized path by dynamically adjusting the number and the distribution of the path nodes.Position relationship based obstacle avoidance algorithm was designed to detour along the edges of obstacles.Virtual potential point based formation-keeping algorithm was employed by incorporating dynamic strategies which were decided by the current states of the formation.The virtual potential point was used to keep the formation structure when the AUV or the formation was deviated.Simulation results show that an optimal path can be dynamically planned with fewer path nodes and smaller fitness,even with a concave obstacle.It has been also proven that different formation-keeping strategies can be adaptively selected and the formation can change its structure in a narrow area and restore back after passing the obstacle.展开更多
Minimizing network coding resources of multicast networks,such as the number of coding nodes or links,has been proved to be NP-hard,and taking propagation delay into account makes the problem more complicated. To reso...Minimizing network coding resources of multicast networks,such as the number of coding nodes or links,has been proved to be NP-hard,and taking propagation delay into account makes the problem more complicated. To resolve this optimal problem,an integer encoding routing-based genetic algorithm( REGA) is presented to map the optimization problem into a genetic algorithm( GA)framework. Moreover,to speed up the search process of the algorithm,an efficient local search procedure which can reduce the searching space size is designed for searching the feasible solution.Compared with the binary link state encoding representation genetic algorithm( BLSGA),the chromosome length of REGA is shorter and just depends on the number of sinks. Simulation results show the advantages of the algorithm in terms of getting the optimal solution and algorithmic convergence speed.展开更多
In this paper, the complexity of intra coding is first analyzed so as to achieve a weight of complexity measurement for each intra mode. Then, a new complexity scalable control algorithm for intra coding in H. 264 is ...In this paper, the complexity of intra coding is first analyzed so as to achieve a weight of complexity measurement for each intra mode. Then, a new complexity scalable control algorithm for intra coding in H. 264 is proposed, based on the rearrangement of the order of candidate modes and an efficient complexity allocation and control (CAAC) scheme at the macroblock (MB) level. The candidate modes of each MB are rearranged according to the local-edge information. Experimental results show that our proposed algorithm can make an appropriate cut-off point of the candidate modes sequence adaptively according to the current energy condition of a mobile device, so as to adjust the complexity at any level while maximizing the video quality, which can prolong the operational lifetime of the battery with minimum degradation in video quality.展开更多
In the classical multiprocessor scheduling problems, it is assumed that the problems are considered in off\|line or on\|line environment. But in practice, problems are often not really off\|line or on\|line but someh...In the classical multiprocessor scheduling problems, it is assumed that the problems are considered in off\|line or on\|line environment. But in practice, problems are often not really off\|line or on\|line but somehow in between. This means that, with respect to the on\|line problem, some further information about the tasks is available, which allows the improvement of the performance of the best possible algorithms. Problems of this class are called semi on\|line ones. The authors studied two semi on\|line multiprocessor scheduling problems, in which, the total processing time of all tasks is known in advance, or all processing times lie in a given interval. They proposed approximation algorithms for minimizing the makespan and analyzed their performance guarantee. The algorithms improve the known results for 3 or more processor cases in the literature.展开更多
Behavior-based flocking has got remarkable attention in the recent past. The flocking algorithms can have inherent properties like organizing,healing and re-configuring for a distributed system. In this research we pr...Behavior-based flocking has got remarkable attention in the recent past. The flocking algorithms can have inherent properties like organizing,healing and re-configuring for a distributed system. In this research we presented the emergent flocking behavior-based control. We defined the basis behavior and with variety of combination, and obtained a complex group behavior flocking. Unlike classical flocking, we implemented additional rules obstacle avoidance,formation and seek target which results in V-formation flocking while avoiding obstacles. We performed the visual simulation of our flocking algorithm using MATLAB. The results concluded that the multi-boid flock could successfully navigate to the target while avoiding collisions. This can be applied to areas where we need to maximize the coverage of sensors or minimize the risk of combative attack,both in military and civilian scenarios.展开更多
The goal of this paper is to improve human visual perceptual quality as well as coding efficiency of H. 264 video at low bit rate conditions by adaptively adjusting the number of skipped frames. The encoding frames ar...The goal of this paper is to improve human visual perceptual quality as well as coding efficiency of H. 264 video at low bit rate conditions by adaptively adjusting the number of skipped frames. The encoding frames are selected according to the motion activity of each frame and the motion accumulation of successive frames. The motion activity analysis is based on the statistics of motion vectors and with consider- ation of the characteristics of H. 264 coding standard. A prediction model of motion accumulation is pro- posed to reduce complex computation of motion estimation. The dynamic encoding frame rate control algorithm is applied to both the frame level and the GOB (Group of Macroblocks ) level. Simulation is done to compare the performance of JM76 with the proposed frame level scheme and GOB level scheme.展开更多
In this paper, a new method to approximate the compensation term in the Jacobian logarithm used by the MAP decoder is proposed. Using the proposed approximation, the complex functions In(.) and exp(.) in the Exact...In this paper, a new method to approximate the compensation term in the Jacobian logarithm used by the MAP decoder is proposed. Using the proposed approximation, the complex functions In(.) and exp(.) in the Exact-log-MAP algorithm can be estimated with high accuracy and lower computational complexity. The efficacy of the proposed approximation is investigated and demonstrated by applying it to iteratively decoded BICM (Bit Interleaved Coded Modulation).展开更多
This paper proposes a novel mapping scheme for bit-interleaved coded modulation with iterative decoding(BICM-ID).The symbol mapping is composed of two QPSK with different radiuses and phases,called cross equalization-...This paper proposes a novel mapping scheme for bit-interleaved coded modulation with iterative decoding(BICM-ID).The symbol mapping is composed of two QPSK with different radiuses and phases,called cross equalization-8PSK-quasi-semi set partitioning(CE-8PSK-Quasi-SSP).Providing the same average power,the proposed scheme can increase the minimum squared Euclidean distance(MSED)and then improve the receiving performance of BICM-ID compared with conventional symbol mapping schemes.Simultaneously,a modified iteration decoding algorithm is proposed in this paper.In the process of iteration decoding,different proportion of the extrinsic information to the systematic observations results in distinct decoding performance.At high SNR(4~9dB),the observation information plays a more important role than the extrinsic information.Simulation results show that the proportion set at 1.2 is more suitable for the novel mapping in BICM-ID.When the BER is 10^(-4),more than 0.9dB coding gain over Rayleigh channels can be achieved for the improved mapping and decoding scheme.展开更多
In this paper, a new quantum images encoding scheme is proposed. The proposed scheme mainly consists of four different encoding algorithms. The idea behind of the scheme is a binary key generated randomly for each pix...In this paper, a new quantum images encoding scheme is proposed. The proposed scheme mainly consists of four different encoding algorithms. The idea behind of the scheme is a binary key generated randomly for each pixel of the original image. Afterwards, the employed encoding algorithm is selected corresponding to the qubit pair of the generated randomized binary key. The security analysis of the proposed scheme proved its enhancement through both randomization of the generated binary image key and altering the gray-scale value of the image pixels using the qubits of randomized binary key. The simulation of the proposed scheme assures that the final encoded image could not be recognized visually. Moreover, the histogram diagram of encoded image is flatter than the originM one. The Shannon entropies of the final encoded images are significantly higher than the original one, which indicates that the attacker can not gain any information about the encoded images.展开更多
文摘A new algorithm is proposed for underwater vehicles multi-path planning. This algorithm is based on fitness sharing genetic algorithm, clustering and evolution of multiple populations, which can keep the diversity of the solution path, and decrease the operating time because of the independent evolution of each subpopulation. The multi-path planning algorithm is demonstrated by a number of two-dimensional path planning problems. The results show that the multi-path planning algorithm has the following characteristics: high searching capability, rapid convergence and high reliability.
基金Funded by the Large-Scale Security SoC Project of Wuhan Science and Technology Bureau of China (No. 20061005119).
文摘This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a special data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.
基金Project(NS2013091)supported by the Basis Research Fund of Nanjing University of Aeronautics and Astronautics,China
文摘Path planning and formation structure forming are two of the most important problems for autonomous underwater vehicles(AUVs) to collaborate with each other.In this work,a dynamic formation model was proposed,in which several algorithms were developed for the complex underwater environment.Dimension changeable particle swarm algorithm was used to find an optimized path by dynamically adjusting the number and the distribution of the path nodes.Position relationship based obstacle avoidance algorithm was designed to detour along the edges of obstacles.Virtual potential point based formation-keeping algorithm was employed by incorporating dynamic strategies which were decided by the current states of the formation.The virtual potential point was used to keep the formation structure when the AUV or the formation was deviated.Simulation results show that an optimal path can be dynamically planned with fewer path nodes and smaller fitness,even with a concave obstacle.It has been also proven that different formation-keeping strategies can be adaptively selected and the formation can change its structure in a narrow area and restore back after passing the obstacle.
基金Supported by the National Natural Science Foundation of China(No.61473179)Shandong Province Higher Educational Science and Technology Program(No.J16LN20)+1 种基金Natural Science Foundation of Shandong Province(No.ZR2016FM18)the Youth Scholars Development Program of Shandong University of Technology
文摘Minimizing network coding resources of multicast networks,such as the number of coding nodes or links,has been proved to be NP-hard,and taking propagation delay into account makes the problem more complicated. To resolve this optimal problem,an integer encoding routing-based genetic algorithm( REGA) is presented to map the optimization problem into a genetic algorithm( GA)framework. Moreover,to speed up the search process of the algorithm,an efficient local search procedure which can reduce the searching space size is designed for searching the feasible solution.Compared with the binary link state encoding representation genetic algorithm( BLSGA),the chromosome length of REGA is shorter and just depends on the number of sinks. Simulation results show the advantages of the algorithm in terms of getting the optimal solution and algorithmic convergence speed.
基金Supported by the National High Technology Research and Development Program of China (2008AA01A313 ), the National Natural Science Foundation of China (60772069), and a Grant from the Centre for Signal Processing of the Hang Kong Polytechnic University (1-BB9c).
文摘In this paper, the complexity of intra coding is first analyzed so as to achieve a weight of complexity measurement for each intra mode. Then, a new complexity scalable control algorithm for intra coding in H. 264 is proposed, based on the rearrangement of the order of candidate modes and an efficient complexity allocation and control (CAAC) scheme at the macroblock (MB) level. The candidate modes of each MB are rearranged according to the local-edge information. Experimental results show that our proposed algorithm can make an appropriate cut-off point of the candidate modes sequence adaptively according to the current energy condition of a mobile device, so as to adjust the complexity at any level while maximizing the video quality, which can prolong the operational lifetime of the battery with minimum degradation in video quality.
文摘In the classical multiprocessor scheduling problems, it is assumed that the problems are considered in off\|line or on\|line environment. But in practice, problems are often not really off\|line or on\|line but somehow in between. This means that, with respect to the on\|line problem, some further information about the tasks is available, which allows the improvement of the performance of the best possible algorithms. Problems of this class are called semi on\|line ones. The authors studied two semi on\|line multiprocessor scheduling problems, in which, the total processing time of all tasks is known in advance, or all processing times lie in a given interval. They proposed approximation algorithms for minimizing the makespan and analyzed their performance guarantee. The algorithms improve the known results for 3 or more processor cases in the literature.
文摘Behavior-based flocking has got remarkable attention in the recent past. The flocking algorithms can have inherent properties like organizing,healing and re-configuring for a distributed system. In this research we presented the emergent flocking behavior-based control. We defined the basis behavior and with variety of combination, and obtained a complex group behavior flocking. Unlike classical flocking, we implemented additional rules obstacle avoidance,formation and seek target which results in V-formation flocking while avoiding obstacles. We performed the visual simulation of our flocking algorithm using MATLAB. The results concluded that the multi-boid flock could successfully navigate to the target while avoiding collisions. This can be applied to areas where we need to maximize the coverage of sensors or minimize the risk of combative attack,both in military and civilian scenarios.
基金Supported by the High Technology. Research and Development Program of China (No. 2005AA103310) and the National Natural Science Foundation of China (No. 60202006).
文摘The goal of this paper is to improve human visual perceptual quality as well as coding efficiency of H. 264 video at low bit rate conditions by adaptively adjusting the number of skipped frames. The encoding frames are selected according to the motion activity of each frame and the motion accumulation of successive frames. The motion activity analysis is based on the statistics of motion vectors and with consider- ation of the characteristics of H. 264 coding standard. A prediction model of motion accumulation is pro- posed to reduce complex computation of motion estimation. The dynamic encoding frame rate control algorithm is applied to both the frame level and the GOB (Group of Macroblocks ) level. Simulation is done to compare the performance of JM76 with the proposed frame level scheme and GOB level scheme.
文摘In this paper, a new method to approximate the compensation term in the Jacobian logarithm used by the MAP decoder is proposed. Using the proposed approximation, the complex functions In(.) and exp(.) in the Exact-log-MAP algorithm can be estimated with high accuracy and lower computational complexity. The efficacy of the proposed approximation is investigated and demonstrated by applying it to iteratively decoded BICM (Bit Interleaved Coded Modulation).
基金Supported by the Key Project of Chinese Ministry of Education(No.106042)the Scientific Research Foundation for the Returned Overseas Chinese Scholars,State Education Ministry(2007[24])
文摘This paper proposes a novel mapping scheme for bit-interleaved coded modulation with iterative decoding(BICM-ID).The symbol mapping is composed of two QPSK with different radiuses and phases,called cross equalization-8PSK-quasi-semi set partitioning(CE-8PSK-Quasi-SSP).Providing the same average power,the proposed scheme can increase the minimum squared Euclidean distance(MSED)and then improve the receiving performance of BICM-ID compared with conventional symbol mapping schemes.Simultaneously,a modified iteration decoding algorithm is proposed in this paper.In the process of iteration decoding,different proportion of the extrinsic information to the systematic observations results in distinct decoding performance.At high SNR(4~9dB),the observation information plays a more important role than the extrinsic information.Simulation results show that the proportion set at 1.2 is more suitable for the novel mapping in BICM-ID.When the BER is 10^(-4),more than 0.9dB coding gain over Rayleigh channels can be achieved for the improved mapping and decoding scheme.
基金Supported by Kermanshah Branch,Islamic Azad University,Kermanshah,IRAN
文摘In this paper, a new quantum images encoding scheme is proposed. The proposed scheme mainly consists of four different encoding algorithms. The idea behind of the scheme is a binary key generated randomly for each pixel of the original image. Afterwards, the employed encoding algorithm is selected corresponding to the qubit pair of the generated randomized binary key. The security analysis of the proposed scheme proved its enhancement through both randomization of the generated binary image key and altering the gray-scale value of the image pixels using the qubits of randomized binary key. The simulation of the proposed scheme assures that the final encoded image could not be recognized visually. Moreover, the histogram diagram of encoded image is flatter than the originM one. The Shannon entropies of the final encoded images are significantly higher than the original one, which indicates that the attacker can not gain any information about the encoded images.