Pub Date : 2014-04-26DOI: 10.1109/ICIST.2014.6920508
L. N. Zhang, X. Ye, Z. B. Xu, Y. W. Du, Z. Hou, X. Bai, P. Shang
To obtain the morphological measurements of acetabulum for southern Chinese population, 40 volunteers were evaluated by CT scan. The 3D model of pelvis was reconstructed from CT scan images. The AVA, ABA and SID were measured for both sides. The mean AVA, ABA showed no significant difference for sex and both sides. But the SID showed the opposite results. The comparison of these parameters with western data were performed, and it indicated that there was significant different between our results and the data for western population published. This study may provide important reference in designing proper gender- and region- prosthesis for southern Chinese population.
{"title":"Morphological study of acetabulum on 3D model reconstructed from CT scan images for the southern Chinese population","authors":"L. N. Zhang, X. Ye, Z. B. Xu, Y. W. Du, Z. Hou, X. Bai, P. Shang","doi":"10.1109/ICIST.2014.6920508","DOIUrl":"https://doi.org/10.1109/ICIST.2014.6920508","url":null,"abstract":"To obtain the morphological measurements of acetabulum for southern Chinese population, 40 volunteers were evaluated by CT scan. The 3D model of pelvis was reconstructed from CT scan images. The AVA, ABA and SID were measured for both sides. The mean AVA, ABA showed no significant difference for sex and both sides. But the SID showed the opposite results. The comparison of these parameters with western data were performed, and it indicated that there was significant different between our results and the data for western population published. This study may provide important reference in designing proper gender- and region- prosthesis for southern Chinese population.","PeriodicalId":306383,"journal":{"name":"2014 4th IEEE International Conference on Information Science and Technology","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In radio frequency identification (RFID) systems with dense mobile RFID readers, reader collision is one of the main issues of interest. The existing anti-collision method called neighbor-friendly reader anti-collision (NFRA) algorithm is simple and easy to make readers aware of neighbors for minimizing reader collision. However, the simple backoff mechanism impairs the utilization rate of mobile readers. To resolve the aforementioned shortage, this paper attempts to propose an enhanced neighbor-friendly reader anti-collision (ENFRA) algorithm. For the sake of comparison, a series of numerical experiments are arranged. The simulation results demonstrate that the proposed ENFRA algorithm is more efficient in obtaining the utilization rate of mobile readers than the canonical NFRA algorithm.
{"title":"An enhanced neighbor-friendly reader anti-collision algorithm in mobile RFID networks","authors":"Zhonghua Li, Hanpei Yang, Jianming Li, Chunhui He, Jieying Zhou","doi":"10.1109/ICIST.2014.6920374","DOIUrl":"https://doi.org/10.1109/ICIST.2014.6920374","url":null,"abstract":"In radio frequency identification (RFID) systems with dense mobile RFID readers, reader collision is one of the main issues of interest. The existing anti-collision method called neighbor-friendly reader anti-collision (NFRA) algorithm is simple and easy to make readers aware of neighbors for minimizing reader collision. However, the simple backoff mechanism impairs the utilization rate of mobile readers. To resolve the aforementioned shortage, this paper attempts to propose an enhanced neighbor-friendly reader anti-collision (ENFRA) algorithm. For the sake of comparison, a series of numerical experiments are arranged. The simulation results demonstrate that the proposed ENFRA algorithm is more efficient in obtaining the utilization rate of mobile readers than the canonical NFRA algorithm.","PeriodicalId":306383,"journal":{"name":"2014 4th IEEE International Conference on Information Science and Technology","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133730330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-26DOI: 10.1109/ICIST.2014.6920550
Huiyong Wang, Lan Wang, Xunying Liu
Accented speech recognition is more challenging than standard speech recognition due to acoustic and linguistic mismatch between standard and accented data. In this paper, we propose a new framework combining Tandem system to improve the discriminative ability of acoustic features with Multi-level Adaptive Network (MLAN) to incorporate information from standard Mandarin corpus and also to solve the data sparseness problem. Mandarin spoken by Guangzhou speakers is considered as the accented mandarin (accented Putonghua, A-PTH), while spoken by northern area as the standard mandarin (standard Putonghua, S-PTH). Significant character error rate reduction of 13.8% and 24.6% relative are obtained over the baseline GMM-HMM systems trained on mixed corpus including both A-PTH and S-PTH corpus, as well as only the A-PTH corpus respectively.
{"title":"Multi-level adaptive network for accented Mandarin speech recognition","authors":"Huiyong Wang, Lan Wang, Xunying Liu","doi":"10.1109/ICIST.2014.6920550","DOIUrl":"https://doi.org/10.1109/ICIST.2014.6920550","url":null,"abstract":"Accented speech recognition is more challenging than standard speech recognition due to acoustic and linguistic mismatch between standard and accented data. In this paper, we propose a new framework combining Tandem system to improve the discriminative ability of acoustic features with Multi-level Adaptive Network (MLAN) to incorporate information from standard Mandarin corpus and also to solve the data sparseness problem. Mandarin spoken by Guangzhou speakers is considered as the accented mandarin (accented Putonghua, A-PTH), while spoken by northern area as the standard mandarin (standard Putonghua, S-PTH). Significant character error rate reduction of 13.8% and 24.6% relative are obtained over the baseline GMM-HMM systems trained on mixed corpus including both A-PTH and S-PTH corpus, as well as only the A-PTH corpus respectively.","PeriodicalId":306383,"journal":{"name":"2014 4th IEEE International Conference on Information Science and Technology","volume":"1995 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130405175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-26DOI: 10.1109/ICIST.2014.6920352
L. Yin, Z. Bai, Renqing Yang
With the development and popularity of powerful video editing tools, it tends to be increasingly easier to create digital synthesized videos. A novel passive video inter-frame forgery detection method based on nonnegative tensor factorization (NTF) is presented in this work. It is based on the finding that inter-frame forgery will disturb the consistency of time-dimension factor. In this method, the video is factorized by using NTF first and then the time-dimension factor is extracted. By comparing the correlation between the elements of the factor, the video forgery can be detected. According to the experimental results, it shows that the proposed scheme is able to expose frame deletion and insertion forgery effectively.
{"title":"Video forgery detection based on nonnegative tensor factorization","authors":"L. Yin, Z. Bai, Renqing Yang","doi":"10.1109/ICIST.2014.6920352","DOIUrl":"https://doi.org/10.1109/ICIST.2014.6920352","url":null,"abstract":"With the development and popularity of powerful video editing tools, it tends to be increasingly easier to create digital synthesized videos. A novel passive video inter-frame forgery detection method based on nonnegative tensor factorization (NTF) is presented in this work. It is based on the finding that inter-frame forgery will disturb the consistency of time-dimension factor. In this method, the video is factorized by using NTF first and then the time-dimension factor is extracted. By comparing the correlation between the elements of the factor, the video forgery can be detected. According to the experimental results, it shows that the proposed scheme is able to expose frame deletion and insertion forgery effectively.","PeriodicalId":306383,"journal":{"name":"2014 4th IEEE International Conference on Information Science and Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134344194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-26DOI: 10.1109/ICIST.2014.6920393
Qing-feng Lu, Xin-Sheng Ji, Kai-zhi Huang
This paper analyses the nonlinear clipping distortion of asymmetrically clipped optical OFDM (ACO-OFDM) based visible light communications system (VLC) and proposes an optimal power allocation method for reducing the clipping distortion. Firstly, we analyze the LED nonlinear clipping distortion based on the clipping process model that original signal directly added nonlinear clipping distortion components. Then, the effective signal to noise ratio (ESNR) is defined to measure the clipping distortion, and the clipping distortion analysis is converted into ESNR analysis. Finally, the optimal power allocation under optical power constraints base on the principle of ESNR optimum is proposed. Simulation results show that reasonable power allocation can effectively reduce the LED nonlinear clipping distortion and ensure that the bit error rate (BER) is less than 10-3.
{"title":"Clipping distortion analysis and optimal power allocation for ACO-OFDM based visible light communication","authors":"Qing-feng Lu, Xin-Sheng Ji, Kai-zhi Huang","doi":"10.1109/ICIST.2014.6920393","DOIUrl":"https://doi.org/10.1109/ICIST.2014.6920393","url":null,"abstract":"This paper analyses the nonlinear clipping distortion of asymmetrically clipped optical OFDM (ACO-OFDM) based visible light communications system (VLC) and proposes an optimal power allocation method for reducing the clipping distortion. Firstly, we analyze the LED nonlinear clipping distortion based on the clipping process model that original signal directly added nonlinear clipping distortion components. Then, the effective signal to noise ratio (ESNR) is defined to measure the clipping distortion, and the clipping distortion analysis is converted into ESNR analysis. Finally, the optimal power allocation under optical power constraints base on the principle of ESNR optimum is proposed. Simulation results show that reasonable power allocation can effectively reduce the LED nonlinear clipping distortion and ensure that the bit error rate (BER) is less than 10-3.","PeriodicalId":306383,"journal":{"name":"2014 4th IEEE International Conference on Information Science and Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128997188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-26DOI: 10.1109/ICIST.2014.6920324
Jiazhi Dong, Yuwen Wang, Xiaofu Shang, Zhili Wang
In this paper, we briefly analyzed the advantages of passive distance measurement based on Wireless Fidelity (WiFi). Based on the analysis of the principle of traditional interferometer direction finding, we derived the equations which are suitable for indoor distance measurement. Through theoretical analysis and simulation, we prove the correctness of the equations. Finally, we analyze and conclude the conditions of using the method, the scope of distance measurement, and the main influencing parameters of system accuracy.
{"title":"Indoor passive ranging based on WiFi","authors":"Jiazhi Dong, Yuwen Wang, Xiaofu Shang, Zhili Wang","doi":"10.1109/ICIST.2014.6920324","DOIUrl":"https://doi.org/10.1109/ICIST.2014.6920324","url":null,"abstract":"In this paper, we briefly analyzed the advantages of passive distance measurement based on Wireless Fidelity (WiFi). Based on the analysis of the principle of traditional interferometer direction finding, we derived the equations which are suitable for indoor distance measurement. Through theoretical analysis and simulation, we prove the correctness of the equations. Finally, we analyze and conclude the conditions of using the method, the scope of distance measurement, and the main influencing parameters of system accuracy.","PeriodicalId":306383,"journal":{"name":"2014 4th IEEE International Conference on Information Science and Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133825154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-26DOI: 10.1109/ICIST.2014.6920542
Shun Li, Yim-Pan Chui, P. Heng
Drilling of bone, which is an essential part in temporal bone surgeries, is applied for making a tiny surgical entrance(incision) to the target. Because the temporal bone has a remarkable complex anatomy structures responsible for hearing and balance, VR (virtual reality)-based simulator is desirable for the trainee to interactively localize and operate on the target in a virtual space. In the surgical process, vast heat is generated while the drill bit cuts the bone tissue. For the human body, the tolerance of the bone tissue to the temperature is limited and a persistently high temperature may possibly result in thermal necrosis. In this paper, we have proposed a framework to evaluate the thermal damage to bone tissue during the bone drilling process. Heat generation and conduction were both modelled physically in our framework. The profile of temperature distribution in the bone tissue was used to determine the region of thermal necrosis which is treated as one of the metrics to assess the quality of the virtual surgical case.
{"title":"Simulation of thermal damage to bone tissue during bone drilling","authors":"Shun Li, Yim-Pan Chui, P. Heng","doi":"10.1109/ICIST.2014.6920542","DOIUrl":"https://doi.org/10.1109/ICIST.2014.6920542","url":null,"abstract":"Drilling of bone, which is an essential part in temporal bone surgeries, is applied for making a tiny surgical entrance(incision) to the target. Because the temporal bone has a remarkable complex anatomy structures responsible for hearing and balance, VR (virtual reality)-based simulator is desirable for the trainee to interactively localize and operate on the target in a virtual space. In the surgical process, vast heat is generated while the drill bit cuts the bone tissue. For the human body, the tolerance of the bone tissue to the temperature is limited and a persistently high temperature may possibly result in thermal necrosis. In this paper, we have proposed a framework to evaluate the thermal damage to bone tissue during the bone drilling process. Heat generation and conduction were both modelled physically in our framework. The profile of temperature distribution in the bone tissue was used to determine the region of thermal necrosis which is treated as one of the metrics to assess the quality of the virtual surgical case.","PeriodicalId":306383,"journal":{"name":"2014 4th IEEE International Conference on Information Science and Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123925020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-26DOI: 10.1109/ICIST.2014.6920392
Quanlong Feng, J. Gong
Due to differences of each detector's response to the same radiant signal, stripe noise exists in various remotely sensed data, which degrades accuracy of the imagery and brings difficulty in subsequent analysis such as quantitative inversion, terrain classification and object detection. Wavelet shrinkage denoising algorithm can remove the stripe effectively because it suppresses the noise through hard or soft thresholding function. However, the main defect lies in blurred edges of ground objects since it always over reduces the wavelet coefficients. In order to preserve and restore the edges to the full extent, this paper adopted anisotropic diffusion method into wavelet domain. An anisotropic diffusion filtering process was applied to the high frequency wavelet coefficients which eradicated the stripe while preserving the ground object edges. Experimental results showed that the proposed method in this paper outperformed the traditional wavelet shrinkage denoising method both in visual effects and several image quality indexes.
{"title":"Destriping remotely sensed data using anisotropic diffusion in wavelet domain","authors":"Quanlong Feng, J. Gong","doi":"10.1109/ICIST.2014.6920392","DOIUrl":"https://doi.org/10.1109/ICIST.2014.6920392","url":null,"abstract":"Due to differences of each detector's response to the same radiant signal, stripe noise exists in various remotely sensed data, which degrades accuracy of the imagery and brings difficulty in subsequent analysis such as quantitative inversion, terrain classification and object detection. Wavelet shrinkage denoising algorithm can remove the stripe effectively because it suppresses the noise through hard or soft thresholding function. However, the main defect lies in blurred edges of ground objects since it always over reduces the wavelet coefficients. In order to preserve and restore the edges to the full extent, this paper adopted anisotropic diffusion method into wavelet domain. An anisotropic diffusion filtering process was applied to the high frequency wavelet coefficients which eradicated the stripe while preserving the ground object edges. Experimental results showed that the proposed method in this paper outperformed the traditional wavelet shrinkage denoising method both in visual effects and several image quality indexes.","PeriodicalId":306383,"journal":{"name":"2014 4th IEEE International Conference on Information Science and Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128656567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-26DOI: 10.1109/ICIST.2014.6920603
Zhiyu Li, Yi Zhan
The Stochastic Nelder-Mead, a recently developed variant of the classic Nelder-Mead algorithm, is a direct search method for derivative-free, nonlinear and black-box stochastic optimization problem. A key factor that influences its performance is obtaining reasonable rankings on the simplex points with random noise. We propose a new ranking procedure that integrates a selection sorting algorithm with statistical hypothesis testing method. This procedure provides an efficient `fine-granular' re-sampling scheme in which the sample sizes can be estimated more precisely and with more flexibility. A numerical study indicates that the revised algorithm can generally outperform its original in terms of both accuracy and stability.
{"title":"A revised stochastic nelder-mead algorithm for numerical optimization","authors":"Zhiyu Li, Yi Zhan","doi":"10.1109/ICIST.2014.6920603","DOIUrl":"https://doi.org/10.1109/ICIST.2014.6920603","url":null,"abstract":"The Stochastic Nelder-Mead, a recently developed variant of the classic Nelder-Mead algorithm, is a direct search method for derivative-free, nonlinear and black-box stochastic optimization problem. A key factor that influences its performance is obtaining reasonable rankings on the simplex points with random noise. We propose a new ranking procedure that integrates a selection sorting algorithm with statistical hypothesis testing method. This procedure provides an efficient `fine-granular' re-sampling scheme in which the sample sizes can be estimated more precisely and with more flexibility. A numerical study indicates that the revised algorithm can generally outperform its original in terms of both accuracy and stability.","PeriodicalId":306383,"journal":{"name":"2014 4th IEEE International Conference on Information Science and Technology","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-26DOI: 10.1109/ICIST.2014.6920560
Z. Zhou, H. Fang, K. He, Y. Gu, C. Luo, Ya Miao
For the increasing demand of jewelry products, a self-designed multi-axis jewellery lathe is developed, which uses a PC control system based on VC and motion control card. In the process of development of the open CNC control system software, the unconventional ellipse curve and ellipsoidal helix interpolation besides the conventional line and circle interpolation should also be used during the CNC machining process. This paper specially studies the two interpolation algorithms based on the spacial structure of the lathe, and the achievements of the study has been put into practice.
{"title":"Study of ellipse curve and ellipsoidal helix interpolation algorithm for multi-axis jewelry lathe","authors":"Z. Zhou, H. Fang, K. He, Y. Gu, C. Luo, Ya Miao","doi":"10.1109/ICIST.2014.6920560","DOIUrl":"https://doi.org/10.1109/ICIST.2014.6920560","url":null,"abstract":"For the increasing demand of jewelry products, a self-designed multi-axis jewellery lathe is developed, which uses a PC control system based on VC and motion control card. In the process of development of the open CNC control system software, the unconventional ellipse curve and ellipsoidal helix interpolation besides the conventional line and circle interpolation should also be used during the CNC machining process. This paper specially studies the two interpolation algorithms based on the spacial structure of the lathe, and the achievements of the study has been put into practice.","PeriodicalId":306383,"journal":{"name":"2014 4th IEEE International Conference on Information Science and Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116769799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}