Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60232-0
Kang-ming JIANG, Xiao-yun ZHANG, Shao-rui LIN
This paper cascades crash analysis and NS2 simulation analysis to study the network system hidden. It is combined with the theory of complex systems from the nodes and links in the network system vulnerability analysis. Firstly, we abstract complex network systems to the node and link network topology. And then we remove key nodes and link vulnerability analysis center between lines metrics to analyze the effect of the network functionality caused by node crashes or link crashes. Secondly, we construct a cascade collapse model, using NS2 simulation to study outside deliberate attack and simulation system failure analysis; and give the embodiment of cascading breakdown on the network function.
{"title":"Safety defect analysis and method study of data network","authors":"Kang-ming JIANG, Xiao-yun ZHANG, Shao-rui LIN","doi":"10.1016/S1005-8885(13)60232-0","DOIUrl":"10.1016/S1005-8885(13)60232-0","url":null,"abstract":"<div><p>This paper cascades crash analysis and NS2 simulation analysis to study the network system hidden. It is combined with the theory of complex systems from the nodes and links in the network system vulnerability analysis. Firstly, we abstract complex network systems to the node and link network topology. And then we remove key nodes and link vulnerability analysis center between lines metrics to analyze the effect of the network functionality caused by node crashes or link crashes. Secondly, we construct a cascade collapse model, using NS2 simulation to study outside deliberate attack and simulation system failure analysis; and give the embodiment of cascading breakdown on the network function.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 131-135"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60232-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82688935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The virtual community has emerged as a state-of-the-art technology, grouping the user with the common interest and providing a feasible solution for large-scale deployment of resource sharing services. Efficient sharing for video resources and low maintenance cost of overlay topology are key factors in MP2P video on demand systems. In this paper, a novel virtual community-based video resource sharing (VCVRS) solution in MANETs is proposed. VCVRS design a virtual community construction strategy to group the nodes with the common playback behavior and a flexible community maintenance mechanism so as to obtain the fast supplier discovery and low maintenance overhead. Simulation results show how VCVRS achieves higher lookup success rate, lower server stress, lower node load and less overlay maintenance overhead, in comparison with another state of the art solution.
{"title":"Virtual community-based video resource sharing solution in MANETs","authors":"Shi-jie JIA , Xi-hu ZHI , Chang-qiao XU , Jian-feng GUAN , Jun-qiang LU , Hong-ke ZHANG","doi":"10.1016/S1005-8885(13)60241-1","DOIUrl":"10.1016/S1005-8885(13)60241-1","url":null,"abstract":"<div><p>The virtual community has emerged as a state-of-the-art technology, grouping the user with the common interest and providing a feasible solution for large-scale deployment of resource sharing services. Efficient sharing for video resources and low maintenance cost of overlay topology are key factors in MP2P video on demand systems. In this paper, a novel virtual community-based video resource sharing (VCVRS) solution in MANETs is proposed. VCVRS design a virtual community construction strategy to group the nodes with the common playback behavior and a flexible community maintenance mechanism so as to obtain the fast supplier discovery and low maintenance overhead. Simulation results show how VCVRS achieves higher lookup success rate, lower server stress, lower node load and less overlay maintenance overhead, in comparison with another state of the art solution.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 91-95, 135"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60241-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83392963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Traffic guidance is a promise approach of traffic congestion alleviation, and the travel time is one of the most important basic data for the reasonable and effective route planning which is the core of traffic guidance. The traffic intersection is one of the chief components of the whole traffic road networks, so the estimation of travel time of the intersection plays an important role in traffic guidance. This paper pays more attention to the estimation of travel time for left-turning lane connected to an intersection, introduces the features for travel time estimation, and designs an estimator based on the learning vector quantity (LVQ) neural network. A suite of reasonable test shows that the method can effectively estimate the travel time of vehicles at left-turning lane with lower error to the real data.
{"title":"Estimation of left-turning travel time at traffic intersection","authors":"Song BI, Zhi-jian WANG, Cun-wu HAN, De-hui SUN, Wei-feng ZHAI, Zhong-cheng ZHAO","doi":"10.1016/S1005-8885(13)60257-5","DOIUrl":"10.1016/S1005-8885(13)60257-5","url":null,"abstract":"<div><p>Traffic guidance is a promise approach of traffic congestion alleviation, and the travel time is one of the most important basic data for the reasonable and effective route planning which is the core of traffic guidance. The traffic intersection is one of the chief components of the whole traffic road networks, so the estimation of travel time of the intersection plays an important role in traffic guidance. This paper pays more attention to the estimation of travel time for left-turning lane connected to an intersection, introduces the features for travel time estimation, and designs an estimator based on the learning vector quantity (LVQ) neural network. A suite of reasonable test shows that the method can effectively estimate the travel time of vehicles at left-turning lane with lower error to the real data.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 10-14"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60257-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88212945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60256-3
Hao-jin TANG, Dan-feng YAN, Yuan TIAN
The traditional short-text classification's accuracy usually highly relies on statistical feature selection. Owing to the fact that short-text has inherent defects such as short length, weak signal and less features. It is hard to avoid noise words when doing feature extension which will highly influence the accuracy of classification. In order to solve the above problem, this paper proposes a semantic dictionary method for short-text classification. The method builds a set of domain dictionary by analyzing the specific characteristics in certain field. As each word's weight in the dictionary is designed according to the correlation between the word and the category, classification accuracy has improved to some extent. Then, in order to enhance dictionary vocabulary coverage, association rules are utilized to automatically extend semantic dictionary. Finally, an experiment based on micro-blog data is conducted which shows that the method has a good effect.
{"title":"Semantic dictionary based method for short text classification","authors":"Hao-jin TANG, Dan-feng YAN, Yuan TIAN","doi":"10.1016/S1005-8885(13)60256-3","DOIUrl":"10.1016/S1005-8885(13)60256-3","url":null,"abstract":"<div><p>The traditional short-text classification's accuracy usually highly relies on statistical feature selection. Owing to the fact that short-text has inherent defects such as short length, weak signal and less features. It is hard to avoid noise words when doing feature extension which will highly influence the accuracy of classification. In order to solve the above problem, this paper proposes a semantic dictionary method for short-text classification. The method builds a set of domain dictionary by analyzing the specific characteristics in certain field. As each word's weight in the dictionary is designed according to the correlation between the word and the category, classification accuracy has improved to some extent. Then, in order to enhance dictionary vocabulary coverage, association rules are utilized to automatically extend semantic dictionary. Finally, an experiment based on micro-blog data is conducted which shows that the method has a good effect.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 15-19"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60256-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80526150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60255-1
Ya-jie WANG , Hong-kun QIU , Lin-lin WANG , Xiang-bin SHI
An new color image fusion method is presented based on dual-tree complex wavelet transform (DT-CWT) and Lαβ space for visual and infrared night image fusion. The color transfer technology is conducted to colorize the gray-scale visual image based on Lαβ space and the three component values of L, α and β can be gained. The appropriate dynamic range of gray image in Lα β space is proposed, and the reason of oversaturated colors is analyzed. The DT-CWT is applied in gray image fusion processing because of it's properties: shift invariance, directional selectivity, in order to obtaining exact position and clear image presentation. The different fusion rule is used aiming at high and low frequency components. The weighted average method is employed to low frequency part, and the high frequency parts are of selection greater local energy. The component L of colorized visual image is replaced by the gray-scale fused image. And the color fusion image is obtained by from Lα β to RGB(R: red, G: green, B:blue). The experiment results indicate that the proposed algorithm can achieve three requirements: detectability of the target, clear details and natural colors.
{"title":"Research on algorithm of night vision image fusion and coloration","authors":"Ya-jie WANG , Hong-kun QIU , Lin-lin WANG , Xiang-bin SHI","doi":"10.1016/S1005-8885(13)60255-1","DOIUrl":"10.1016/S1005-8885(13)60255-1","url":null,"abstract":"<div><p>An new color image fusion method is presented based on dual-tree complex wavelet transform (DT-CWT) and <em>Lαβ</em> space for visual and infrared night image fusion. The color transfer technology is conducted to colorize the gray-scale visual image based on <em>Lαβ</em> space and the three component values of <em>L, α</em> and <em>β</em> can be gained. The appropriate dynamic range of gray image in <em>Lα β</em> space is proposed, and the reason of oversaturated colors is analyzed. The DT-CWT is applied in gray image fusion processing because of it's properties: shift invariance, directional selectivity, in order to obtaining exact position and clear image presentation. The different fusion rule is used aiming at high and low frequency components. The weighted average method is employed to low frequency part, and the high frequency parts are of selection greater local energy. The component <em>L</em> of colorized visual image is replaced by the gray-scale fused image. And the color fusion image is obtained by from <em>Lα β</em> to RGB(R: red, G: green, B:blue). The experiment results indicate that the proposed algorithm can achieve three requirements: detectability of the target, clear details and natural colors.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 20-24"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60255-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90252883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60252-6
Ming ZHOU, Yan MA
This paper integrated the quality of service (QoS) requirements of Internet of things (IoT) composite services, and put forward effective decomposition and optimization methods of the QoS metrics. The authors break down the complex QoS calculation model into four basic models, and each model is given a computational method. Combined with the QoS technology of the composite service, the authors adopt the algorithm to find the sub-optimal service with an acceptable cost under the QoS constraints. The proposed algorithm can quickly provide QoS computing services than other two algorithms for large-scale IoT compose services.
{"title":"QoS-aware computational method for IoT composite service","authors":"Ming ZHOU, Yan MA","doi":"10.1016/S1005-8885(13)60252-6","DOIUrl":"10.1016/S1005-8885(13)60252-6","url":null,"abstract":"<div><p>This paper integrated the quality of service (QoS) requirements of Internet of things (IoT) composite services, and put forward effective decomposition and optimization methods of the QoS metrics. The authors break down the complex QoS calculation model into four basic models, and each model is given a computational method. Combined with the QoS technology of the composite service, the authors adopt the algorithm to find the sub-optimal service with an acceptable cost under the QoS constraints. The proposed algorithm can quickly provide QoS computing services than other two algorithms for large-scale IoT compose services.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 35-39"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60252-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76263999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60248-4
Ren-wei MAO, Min RAO, Li-ming LUO, Xu-ren WANG, Xiang-yang HUANG
This paper presents a real-time communication framework for massive multiplayer online games (MMOG), which is to ensure the efficiency of communication and software readability at the same time. Firstly, we compare the current mainstream serialization technologies and demonstrate the significance of custom protocol through analysis of those technical limitations. Then, the paper puts forward the concept of protocol-bean innovatively. By this means, we implement an object-oriented custom protocol method, which has higher performance and more readability. Finally, through the comparison of data bandwidth and real-time response time, experimental data shows this framework could ensure the lowest data bandwidth without destroying software structure. And compared with real-time server Red5, response time is improved by 40 times.
{"title":"Communication framework for MMOG based on custom protocol","authors":"Ren-wei MAO, Min RAO, Li-ming LUO, Xu-ren WANG, Xiang-yang HUANG","doi":"10.1016/S1005-8885(13)60248-4","DOIUrl":"10.1016/S1005-8885(13)60248-4","url":null,"abstract":"<div><p>This paper presents a real-time communication framework for massive multiplayer online games (MMOG), which is to ensure the efficiency of communication and software readability at the same time. Firstly, we compare the current mainstream serialization technologies and demonstrate the significance of custom protocol through analysis of those technical limitations. Then, the paper puts forward the concept of protocol-bean innovatively. By this means, we implement an object-oriented custom protocol method, which has higher performance and more readability. Finally, through the comparison of data bandwidth and real-time response time, experimental data shows this framework could ensure the lowest data bandwidth without destroying software structure. And compared with real-time server Red5, response time is improved by 40 times.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 55-58, 80"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60248-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86028220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60249-6
Ming-zhe YU
Enterprise service bus (ESB) plays the part as intermediate hubs in enterprise service integration frameworks, and it is to implement the communications of shared contents in different systems. These contents are heterogeneous and message conversion protocols make rule of the transformation among them. This article studies about designing on enterprise service bus message conversion protocol based on extensible stylesheet language transformations (XSLT). It includes three parts of design of the ESB: message conversion frame, message conversion optimization and heterogeneous message integration. The first part introduces the process of service request and response using simple object access protocol (SOAP) in ESB and makes analysis about XSLT file elements. The second part sets up multiple-request message pattern by XSLT processor and ESB pre-defined request message content format based on Schema. The third part optimizes intelligent message conversion in ESB by automatic Schema mapping rule. All the functions help to develop the intelligent message conversion in ESB and improve the efficiency of the conversion.
{"title":"Design on enterprise service bus message conversion protocol based on XSLT","authors":"Ming-zhe YU","doi":"10.1016/S1005-8885(13)60249-6","DOIUrl":"10.1016/S1005-8885(13)60249-6","url":null,"abstract":"<div><p>Enterprise service bus (ESB) plays the part as intermediate hubs in enterprise service integration frameworks, and it is to implement the communications of shared contents in different systems. These contents are heterogeneous and message conversion protocols make rule of the transformation among them. This article studies about designing on enterprise service bus message conversion protocol based on extensible stylesheet language transformations (XSLT). It includes three parts of design of the ESB: message conversion frame, message conversion optimization and heterogeneous message integration. The first part introduces the process of service request and response using simple object access protocol (SOAP) in ESB and makes analysis about XSLT file elements. The second part sets up multiple-request message pattern by XSLT processor and ESB pre-defined request message content format based on Schema. The third part optimizes intelligent message conversion in ESB by automatic Schema mapping rule. All the functions help to develop the intelligent message conversion in ESB and improve the efficiency of the conversion.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 50-54"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60249-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86767090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60244-7
Chen-hui DU , yue MA , Li WANG , Mei SONG , Yi-hai XING
Physical layer security is attracting more and more attention due to its inherent channel properties, while the increasing computing ability is not the obstacle for the traditional encryption any longer. In this paper, we study the base station (BS) and relay station (RS) placement problem in a cooperative secure communication system. Moreover, the system energy consumption problem also has been considered, and an energy-aware infrastructure placement for secure communications (EIPSC) scheme is proposed. Based on the analysis results of different candidate position of the security performance, location of the BS is determined and some imperative RSs are placed to guarantee the eavesdropped subscribers' secure communication. To decrease the system energy consumption, we propose a conception of sharing set of RS in order to place the RS as few as possible. During the BS and RS placing as well as adjusting procedure, renewable energy is also been considered to reduce dirty-energy consumption. Through computational experiments, we show our proposed algorithm can get better performance than the traditional placement algorithm not only at the system security guarantee but also at the system energy saving.
{"title":"Energy-aware infrastructure placement for secure communication","authors":"Chen-hui DU , yue MA , Li WANG , Mei SONG , Yi-hai XING","doi":"10.1016/S1005-8885(13)60244-7","DOIUrl":"10.1016/S1005-8885(13)60244-7","url":null,"abstract":"<div><p>Physical layer security is attracting more and more attention due to its inherent channel properties, while the increasing computing ability is not the obstacle for the traditional encryption any longer. In this paper, we study the base station (BS) and relay station (RS) placement problem in a cooperative secure communication system. Moreover, the system energy consumption problem also has been considered, and an energy-aware infrastructure placement for secure communications (EIPSC) scheme is proposed. Based on the analysis results of different candidate position of the security performance, location of the BS is determined and some imperative RSs are placed to guarantee the eavesdropped subscribers' secure communication. To decrease the system energy consumption, we propose a conception of sharing set of RS in order to place the RS as few as possible. During the BS and RS placing as well as adjusting procedure, renewable energy is also been considered to reduce dirty-energy consumption. Through computational experiments, we show our proposed algorithm can get better performance than the traditional placement algorithm not only at the system security guarantee but also at the system energy saving.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 75-80"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60244-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88298111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60260-5
yan PENG , Tian ZHOU , Shao-peng WANG , Du CHENG
Driver fatigue severely affects driver's alertness and ability to drive safely. There are vital problems related to drivers fatigue on driving of trains, vehicles and airplanes. Therefore, the driver fatigue research is important. In this paper, we first study the impact of eye locations on face recognition accuracy, with Haar-like feature and AdaBoost classifier, face and eye area can be detected quickly and accurately. In the part of eye tracking, cam-shift based mean-shift algorithm is used to track the eyes. This method could automatically adjust the size of tracking window according to the different posture of driver. The performance of our eye detection method is validated by using image database with more than 6000 pictures. In addition, our real-time eye tracking system has been tested on railway line segment (China). There are 5 train drivers involved in the experiment. The validation shows that our eye detector has an overall 93% eye detection rate.
{"title":"Design and implementation of a real-time eye tracking system","authors":"yan PENG , Tian ZHOU , Shao-peng WANG , Du CHENG","doi":"10.1016/S1005-8885(13)60260-5","DOIUrl":"10.1016/S1005-8885(13)60260-5","url":null,"abstract":"<div><p>Driver fatigue severely affects driver's alertness and ability to drive safely. There are vital problems related to drivers fatigue on driving of trains, vehicles and airplanes. Therefore, the driver fatigue research is important. In this paper, we first study the impact of eye locations on face recognition accuracy, with Haar-like feature and AdaBoost classifier, face and eye area can be detected quickly and accurately. In the part of eye tracking, cam-shift based mean-shift algorithm is used to track the eyes. This method could automatically adjust the size of tracking window according to the different posture of driver. The performance of our eye detection method is validated by using image database with more than 6000 pictures. In addition, our real-time eye tracking system has been tested on railway line segment (China). There are 5 train drivers involved in the experiment. The validation shows that our eye detector has an overall 93% eye detection rate.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60260-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88591855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}