Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747536
Shijun Wang, Ruifeng Ding
This paper decomposes a controlled autoregressive autoregressive moving average (CARARMA) system into two subsystems, uses the data filtering technique to drive a multi-innovation stochastic gradient algorithm for identifying the parameters of each subsystems. The basic idea is to replace the unknown variables in the information vectors with their corresponding estimates. The simulation example shows that the proposed algorithms can work well.
{"title":"A multi-innovation stochastic gradient parameter estimation algorithm for controlled autoregressive ARMA systems based on the data filtering","authors":"Shijun Wang, Ruifeng Ding","doi":"10.1109/ICIST.2013.6747536","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747536","url":null,"abstract":"This paper decomposes a controlled autoregressive autoregressive moving average (CARARMA) system into two subsystems, uses the data filtering technique to drive a multi-innovation stochastic gradient algorithm for identifying the parameters of each subsystems. The basic idea is to replace the unknown variables in the information vectors with their corresponding estimates. The simulation example shows that the proposed algorithms can work well.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130623223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747494
Su-zhen Liu, Huifang Yang, Longzheng Tong, Weifang Liu
In the present study, a voxel-based morphometry (VBM) and three dimensional texture analysis were used to detect brain structural changes of AD subjects in preclinical phase. Three groups of T1-weighed MRI data were selected from Open Access Series of Imaging Studies (OASIS) database, including 13 converted subjects (CS) who were cognitively healthy at baseline, 13 non-demented subjects (NS) remained cognitively healthy, and 64 demented subjects (DS) for control study. Results showed grey matter (GM) atrophy in bilateral occipital lobe, superior temporal gyrus, and left inferior temporal lobe in CS (p< 0.001); textural features of the largest cluster significantly differed from that of NS, with the classification accuracy of 88.5% through cross validation, which may highlight the key role of these regions in prediction of the disease. Morphometric measurement plus texture analysis presents feasible in detecting preclinical AD.
本研究采用基于体素的形态测量(VBM)和三维纹理分析方法检测阿尔茨海默病受试者临床前阶段的脑结构变化。从Open Access Series Imaging Studies (OASIS)数据库中选择三组t1加权MRI数据,包括13例基线认知健康的转换受试者(CS)、13例认知健康的非痴呆受试者(NS)和64例痴呆受试者(DS)作为对照研究。结果CS患者双侧枕叶、颞上回、左侧颞下叶灰质萎缩(p< 0.001);最大聚类的纹理特征与NS存在显著差异,交叉验证的分类准确率为88.5%,这可能突出了这些区域在疾病预测中的关键作用。形态学测量加织构分析在临床前AD检测中是可行的。
{"title":"Detecting grey matter changes in preclinical phase of Alzheimer's disease by voxel-based morphometric and textural features: A preliminary study","authors":"Su-zhen Liu, Huifang Yang, Longzheng Tong, Weifang Liu","doi":"10.1109/ICIST.2013.6747494","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747494","url":null,"abstract":"In the present study, a voxel-based morphometry (VBM) and three dimensional texture analysis were used to detect brain structural changes of AD subjects in preclinical phase. Three groups of T1-weighed MRI data were selected from Open Access Series of Imaging Studies (OASIS) database, including 13 converted subjects (CS) who were cognitively healthy at baseline, 13 non-demented subjects (NS) remained cognitively healthy, and 64 demented subjects (DS) for control study. Results showed grey matter (GM) atrophy in bilateral occipital lobe, superior temporal gyrus, and left inferior temporal lobe in CS (p< 0.001); textural features of the largest cluster significantly differed from that of NS, with the classification accuracy of 88.5% through cross validation, which may highlight the key role of these regions in prediction of the disease. Morphometric measurement plus texture analysis presents feasible in detecting preclinical AD.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130273569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747764
Lei Fang, Yu Zhang, Jun Zhu, Jianxin Yang
RS(255,223) code is used in concatenated code system for its strong error-correcting ability for burst error. The most important problem of the design of RS decoder is the key equation solution (KES). In this paper, BM iterative decoding algorithms for KES is introduced, and its implementation structure is also described. Simulation shows that the designed RS(255,223) has suffi ciently met the requirement of throughput in the concatenated decoder.
{"title":"Research on RS(255,223) code in concatenated decoder system","authors":"Lei Fang, Yu Zhang, Jun Zhu, Jianxin Yang","doi":"10.1109/ICIST.2013.6747764","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747764","url":null,"abstract":"RS(255,223) code is used in concatenated code system for its strong error-correcting ability for burst error. The most important problem of the design of RS decoder is the key equation solution (KES). In this paper, BM iterative decoding algorithms for KES is introduced, and its implementation structure is also described. Simulation shows that the designed RS(255,223) has suffi ciently met the requirement of throughput in the concatenated decoder.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128453782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
How to design a practical, low-cost voice signal processing system has been paid more attention since voice signal processing plays a significant role for information exchange in our highly developed information society. The paper firstly introduces the function block diagram of the voice signal processing system and its processing method; then expatiates the hardware design based on DSP (Digital Signal Processor), offers key reference circuits and some design principles of the system; finally, puts forward the speech recognition software disposal processing for system function verification. Since the system adopts DSP processing technology, it has high efficiency; at the same time, is practical and low-cost. Otherwise, in the memory expansion and interface of the system design, FPGA (Field Programmable Gate Array) is used as the system decode device and interface between DSP and CODEC. In this way, the system realizes the function dividing, so computing circuit of the DSP has been used more appropriate. At the same time, the FPGA improves the flexibility and reduce the cost and the time to market.
{"title":"Design and implementation of voice signal processing system based on DSP and FPGA","authors":"Wei Zhang, Diancheng Wu, Zhiyuan Xue, Tiejun Zhang, Donghui Wang, C. Hou","doi":"10.1109/ICIST.2013.6747843","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747843","url":null,"abstract":"How to design a practical, low-cost voice signal processing system has been paid more attention since voice signal processing plays a significant role for information exchange in our highly developed information society. The paper firstly introduces the function block diagram of the voice signal processing system and its processing method; then expatiates the hardware design based on DSP (Digital Signal Processor), offers key reference circuits and some design principles of the system; finally, puts forward the speech recognition software disposal processing for system function verification. Since the system adopts DSP processing technology, it has high efficiency; at the same time, is practical and low-cost. Otherwise, in the memory expansion and interface of the system design, FPGA (Field Programmable Gate Array) is used as the system decode device and interface between DSP and CODEC. In this way, the system realizes the function dividing, so computing circuit of the DSP has been used more appropriate. At the same time, the FPGA improves the flexibility and reduce the cost and the time to market.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117115922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747804
Yanjun Hu, Yao Wang, Wentao Zhang, Yao-hua Xu, Lele Qiu, Yingguan Wang
The blasting spot monitoring is very important to reduce the occurrence of emergencies and to protect the workers' safety in practical applications. In this paper, we design an early warning system based on WSN (Wireless Sensor Network) which can be used in explosion operations. This system consists of two parts: the hardware part mainly uses several sensors to capture data we need and transmits them to the monitor center through wireless module; the software part mainly receives and processes the captured data, then analyzes the parameters to judge whether the environment parameters are abnormal, if yes, it will alarm in advance to protect the workers. Experiment results show that this system can alarm correctly when the environment parameters are out of limit, which improves the system's reliability and gets some social economic benefits in the meantime. This system does have a grand application prospect.
{"title":"An early warning system in explosion operations based on Wireless Sensor Network","authors":"Yanjun Hu, Yao Wang, Wentao Zhang, Yao-hua Xu, Lele Qiu, Yingguan Wang","doi":"10.1109/ICIST.2013.6747804","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747804","url":null,"abstract":"The blasting spot monitoring is very important to reduce the occurrence of emergencies and to protect the workers' safety in practical applications. In this paper, we design an early warning system based on WSN (Wireless Sensor Network) which can be used in explosion operations. This system consists of two parts: the hardware part mainly uses several sensors to capture data we need and transmits them to the monitor center through wireless module; the software part mainly receives and processes the captured data, then analyzes the parameters to judge whether the environment parameters are abnormal, if yes, it will alarm in advance to protect the workers. Experiment results show that this system can alarm correctly when the environment parameters are out of limit, which improves the system's reliability and gets some social economic benefits in the meantime. This system does have a grand application prospect.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125897031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747495
Jiamin Fu, Zhen Liu, Xin Gao
This paper analyzes the resting state fMRI signal of 21 ADHD subjects and 27 healthy volunteers, and proposes a novel method for extracting an effective feature in frequency domain. Utilizing this feature, the ADHD subjects and the control persons are classified with an accuracy of 95.83% by support vector machine (SVM). Furthermore, using this method, some specific brain regions such as the right amygdaloid nucleus, the left thalamus, cerebellum and vermis, with high classification accuracies, are relative to the pathological mechanism of ADHD which are consistent with the previous research results.
{"title":"Investigation of low frequency drift in attention deficit hyperactivity disorder fMRI Signal","authors":"Jiamin Fu, Zhen Liu, Xin Gao","doi":"10.1109/ICIST.2013.6747495","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747495","url":null,"abstract":"This paper analyzes the resting state fMRI signal of 21 ADHD subjects and 27 healthy volunteers, and proposes a novel method for extracting an effective feature in frequency domain. Utilizing this feature, the ADHD subjects and the control persons are classified with an accuracy of 95.83% by support vector machine (SVM). Furthermore, using this method, some specific brain regions such as the right amygdaloid nucleus, the left thalamus, cerebellum and vermis, with high classification accuracies, are relative to the pathological mechanism of ADHD which are consistent with the previous research results.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126082039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747694
Yang Xu
For an intelligent transportation system (ITS), traffic incident detection is one of the most important issues. In this paper, we propose a novel traffic incident detection method based on trajectory quantification and Hidden Markov Model (HMM) classifier. First, object detection algorithm that combines geodesic active contour model based on level set theory and background subtraction was proposed and accurate contour of moving object is got. Sencondly, the kalman filter is applied to predict the possible trajectories of moving object and then trajectory feature was extracted as HMM input. Finally, HMM was used for classification of U-turns, illegal turn left, illegal change lanes. The experimental result showed that the method proposed has better robustness and higher recognition rate.
{"title":"Traffic incident detection based on HMM","authors":"Yang Xu","doi":"10.1109/ICIST.2013.6747694","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747694","url":null,"abstract":"For an intelligent transportation system (ITS), traffic incident detection is one of the most important issues. In this paper, we propose a novel traffic incident detection method based on trajectory quantification and Hidden Markov Model (HMM) classifier. First, object detection algorithm that combines geodesic active contour model based on level set theory and background subtraction was proposed and accurate contour of moving object is got. Sencondly, the kalman filter is applied to predict the possible trajectories of moving object and then trajectory feature was extracted as HMM input. Finally, HMM was used for classification of U-turns, illegal turn left, illegal change lanes. The experimental result showed that the method proposed has better robustness and higher recognition rate.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114338596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747821
Lanzi Zhang, B. Lu, Zhimin Zhou, Xin Sun
In through-the-wall imaging, the clutter, because of its great energy, has great effect on the detection of the targets. For the purpose of clutter suppression, factor analysis method has been studied and applied to TWI data. Besides, a new evaluation criterion, image contrast, for demonstrating the suppression performance is introduced. Compared to the SCR, the clutter suppression technique based on the FA and image contrast can efficiently suppress the clutter without a priori knowledge about targets. Simulation demonstrates the efficiency of the method.
{"title":"The clutter suppression based on FA and image contrast in TWI application","authors":"Lanzi Zhang, B. Lu, Zhimin Zhou, Xin Sun","doi":"10.1109/ICIST.2013.6747821","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747821","url":null,"abstract":"In through-the-wall imaging, the clutter, because of its great energy, has great effect on the detection of the targets. For the purpose of clutter suppression, factor analysis method has been studied and applied to TWI data. Besides, a new evaluation criterion, image contrast, for demonstrating the suppression performance is introduced. Compared to the SCR, the clutter suppression technique based on the FA and image contrast can efficiently suppress the clutter without a priori knowledge about targets. Simulation demonstrates the efficiency of the method.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114280896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747798
Yaoran Zhang, Fei Song, Zhang Deng, C. Li
In cognitive radio ad hoc networks (CRAHNs), because mobile devices are mainly powered by battery, efficient consumption of energy is a key problem to be improved. In this paper we study how to find an energy efficient route for a session in CRAHNs. We propose a relative energy metric for routing in CRAHNs, and develop two relay users selection methods for CRAHNs, one of which is proactive and the other is reactive. The new routing scheme could select proper relay nodes, channels, and transmitter power for a session, aims to supply enough communication rate, to decrease the average total power consumption of each session, and to prolong the life of the total network at the same time. In addition, we compare the performance of a proactive route scheme with that of reactive method. Numerical results show that the effectiveness of our proposed routing scheme is with good generalization ability, and the reactive node selection method may better satisfy CRNs.
{"title":"An energy-aware routing for cognitive radio ad hoc networks","authors":"Yaoran Zhang, Fei Song, Zhang Deng, C. Li","doi":"10.1109/ICIST.2013.6747798","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747798","url":null,"abstract":"In cognitive radio ad hoc networks (CRAHNs), because mobile devices are mainly powered by battery, efficient consumption of energy is a key problem to be improved. In this paper we study how to find an energy efficient route for a session in CRAHNs. We propose a relative energy metric for routing in CRAHNs, and develop two relay users selection methods for CRAHNs, one of which is proactive and the other is reactive. The new routing scheme could select proper relay nodes, channels, and transmitter power for a session, aims to supply enough communication rate, to decrease the average total power consumption of each session, and to prolong the life of the total network at the same time. In addition, we compare the performance of a proactive route scheme with that of reactive method. Numerical results show that the effectiveness of our proposed routing scheme is with good generalization ability, and the reactive node selection method may better satisfy CRNs.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122648746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747820
Yin Wu, Wenbo Liu, Yongjun Zhu
Wireless sensor network (WSN) has got increasingly in-depth study and application because of its small size, flexible layout, strong reliability and other advantages, but in the mean time the life of a wireless sensor node is heavily dependent on the power supply batteries. This paper studies the design of a wireless sensor node which is powered by a micro wind turbine generator. It adopts an optimal power management to make the node working neutrally: never dies out of energy. This management consists of an AC-DC converter, an energy storage element and a maximum power transfer tracking (MPTT) circuit to sustain the operation of wireless sensor node over a wide range wind conditions. Extensive experimental results show that through the proposed power management, wind energy conversion efficiency improves to 80%, and the harvested power increases three times than before. Thus this wind powered wireless sensor node could work independently and has a good application prospect.
{"title":"Design of a wind energy harvesting wireless sensor node","authors":"Yin Wu, Wenbo Liu, Yongjun Zhu","doi":"10.1109/ICIST.2013.6747820","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747820","url":null,"abstract":"Wireless sensor network (WSN) has got increasingly in-depth study and application because of its small size, flexible layout, strong reliability and other advantages, but in the mean time the life of a wireless sensor node is heavily dependent on the power supply batteries. This paper studies the design of a wireless sensor node which is powered by a micro wind turbine generator. It adopts an optimal power management to make the node working neutrally: never dies out of energy. This management consists of an AC-DC converter, an energy storage element and a maximum power transfer tracking (MPTT) circuit to sustain the operation of wireless sensor node over a wide range wind conditions. Extensive experimental results show that through the proposed power management, wind energy conversion efficiency improves to 80%, and the harvested power increases three times than before. Thus this wind powered wireless sensor node could work independently and has a good application prospect.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122885268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}